[webapps] Domains & Hostings Manager PRO 3.0 - Authentication Bypass
Domains & Hostings Manager PRO 3.0 - Authentication Bypass
https://www.exploit-db.com/exploits/43569/?rss
Domains & Hostings Manager PRO 3.0 - Authentication Bypass
https://www.exploit-db.com/exploits/43569/?rss
[shellcode] Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)
Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)
https://www.exploit-db.com/exploits/43568/?rss
Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)
https://www.exploit-db.com/exploits/43568/?rss
[webapps] ImgHosting 1.5 - Cross-Site Scripting
ImgHosting 1.5 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43567/?rss
ImgHosting 1.5 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43567/?rss
[remote] SysGauge Server 3.6.18 - Buffer Overflow
SysGauge Server 3.6.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43588/?rss
SysGauge Server 3.6.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43588/?rss
[webapps] RISE 1.9 - 'search' SQL Injection
RISE 1.9 - 'search' SQL Injection
https://www.exploit-db.com/exploits/43591/?rss
RISE 1.9 - 'search' SQL Injection
https://www.exploit-db.com/exploits/43591/?rss
[webapps] PerfexCRM 1.9.7 - Arbitrary File Upload
PerfexCRM 1.9.7 - Arbitrary File Upload
https://www.exploit-db.com/exploits/43590/?rss
PerfexCRM 1.9.7 - Arbitrary File Upload
https://www.exploit-db.com/exploits/43590/?rss
[remote] Disk Pulse Enterprise 10.1.18 - Buffer Overflow
Disk Pulse Enterprise 10.1.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43589/?rss
Disk Pulse Enterprise 10.1.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43589/?rss
[webapps] Adminer 4.3.1 - Server-Side Request Forgery
Adminer 4.3.1 - Server-Side Request Forgery
https://www.exploit-db.com/exploits/43593/?rss
Adminer 4.3.1 - Server-Side Request Forgery
https://www.exploit-db.com/exploits/43593/?rss
[webapps] Oracle PeopleSoft 8.5x - Remote Code Execution
Oracle PeopleSoft 8.5x - Remote Code Execution
https://www.exploit-db.com/exploits/43594/?rss
Oracle PeopleSoft 8.5x - Remote Code Execution
https://www.exploit-db.com/exploits/43594/?rss
[shellcode] Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes)
Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes)
https://www.exploit-db.com/exploits/43599/?rss
Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes)
https://www.exploit-db.com/exploits/43599/?rss
[shellcode] Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
https://www.exploit-db.com/exploits/43598/?rss
Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
https://www.exploit-db.com/exploits/43598/?rss
[shellcode] Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
https://www.exploit-db.com/exploits/43597/?rss
Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
https://www.exploit-db.com/exploits/43597/?rss
[dos] OBS studio 20.1.3 - Local Buffer Overflow
OBS studio 20.1.3 - Local Buffer Overflow
https://www.exploit-db.com/exploits/43596/?rss
OBS studio 20.1.3 - Local Buffer Overflow
https://www.exploit-db.com/exploits/43596/?rss
[webapps] ILIAS < 5.2.4 - Cross-Site Scripting
ILIAS < 5.2.4 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43595/?rss
ILIAS < 5.2.4 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43595/?rss
[shellcode] Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
https://www.exploit-db.com/exploits/43607/?rss
Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
https://www.exploit-db.com/exploits/43607/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR Encoded Shellcode (87 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43606/?rss
Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43606/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR Encoded Shellcode (87 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43605/?rss
Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43605/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR Encoded Shellcode (87 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43604/?rss
Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43604/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shellcode (85 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shellcode (85 bytes)
https://www.exploit-db.com/exploits/43603/?rss
Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shellcode (85 bytes)
https://www.exploit-db.com/exploits/43603/?rss
[shellcode] Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)
Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)
https://www.exploit-db.com/exploits/43602/?rss
Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)
https://www.exploit-db.com/exploits/43602/?rss