[webapps] WordPress Plugin WF Cookie Consent 1.1.3 - Cross-Site Scripting
WordPress Plugin WF Cookie Consent 1.1.3 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44585/?rss
WordPress Plugin WF Cookie Consent 1.1.3 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44585/?rss
[remote] Google Chrome V8 - Object Allocation Size Integer Overflow
Google Chrome V8 - Object Allocation Size Integer Overflow
https://www.exploit-db.com/exploits/44584/?rss
Google Chrome V8 - Object Allocation Size Integer Overflow
https://www.exploit-db.com/exploits/44584/?rss
[webapps] CSP MySQL User Manager 2.3.1 - Authentication Bypass
CSP MySQL User Manager 2.3.1 - Authentication Bypass
https://www.exploit-db.com/exploits/44589/?rss
CSP MySQL User Manager 2.3.1 - Authentication Bypass
https://www.exploit-db.com/exploits/44589/?rss
[local] DeviceLock Plug and Play Auditor 5.72 - Unicode Buffer Overflow (SEH)
DeviceLock Plug and Play Auditor 5.72 - Unicode Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44590/?rss
DeviceLock Plug and Play Auditor 5.72 - Unicode Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44590/?rss
[webapps] WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
https://www.exploit-db.com/exploits/44595/?rss
WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
https://www.exploit-db.com/exploits/44595/?rss
[shellcode] Linux/x86 - execve(/bin/sh) NOT Encoded Shellcode (27 bytes)
Linux/x86 - execve(/bin/sh) NOT Encoded Shellcode (27 bytes)
https://www.exploit-db.com/exploits/44594/?rss
Linux/x86 - execve(/bin/sh) NOT Encoded Shellcode (27 bytes)
https://www.exploit-db.com/exploits/44594/?rss
[dos] HWiNFO 5.82-3410 - Denial of Service
HWiNFO 5.82-3410 - Denial of Service
https://www.exploit-db.com/exploits/44593/?rss
HWiNFO 5.82-3410 - Denial of Service
https://www.exploit-db.com/exploits/44593/?rss
[papers] Linux Restricted Shell Bypass Guide
Linux Restricted Shell Bypass Guide
https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf?rss
Linux Restricted Shell Bypass Guide
https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf?rss
[remote] FTPShell Client 6.7 - Buffer Overflow
FTPShell Client 6.7 - Buffer Overflow
https://www.exploit-db.com/exploits/44596/?rss
FTPShell Client 6.7 - Buffer Overflow
https://www.exploit-db.com/exploits/44596/?rss
[remote] Palo Alto Networks - readSessionVarsFromFile() Session Corruption (Metasploit)
Palo Alto Networks - readSessionVarsFromFile() Session Corruption (Metasploit)
https://www.exploit-db.com/exploits/44597/?rss
Palo Alto Networks - readSessionVarsFromFile() Session Corruption (Metasploit)
https://www.exploit-db.com/exploits/44597/?rss
[remote] PlaySMS 1.4 - sendfromfile.php Authenticated "Filename" Field Code Execution (Metasploit)
PlaySMS 1.4 - sendfromfile.php Authenticated "Filename" Field Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44599/?rss
PlaySMS 1.4 - sendfromfile.php Authenticated "Filename" Field Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44599/?rss
Exploit Database
PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit)
PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit). CVE-2017-9080 . remote exploit for PHP platform
[remote] PlaySMS - import.php Authenticated CSV File Upload Code Execution (Metasploit)
PlaySMS - import.php Authenticated CSV File Upload Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44598/?rss
PlaySMS - import.php Authenticated CSV File Upload Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44598/?rss
[dos] 2345 Security Guard 3.7 - Denial of Service
2345 Security Guard 3.7 - Denial of Service
https://www.exploit-db.com/exploits/44600/?rss
2345 Security Guard 3.7 - Denial of Service
https://www.exploit-db.com/exploits/44600/?rss
[local] GNU wget - Cookie Injection
GNU wget - Cookie Injection
https://www.exploit-db.com/exploits/44601/?rss
GNU wget - Cookie Injection
https://www.exploit-db.com/exploits/44601/?rss
[shellcode] Linux/x86 - Bind TCP Shell + fork() Shellcode (113 bytes)
Linux/x86 - Bind TCP Shell + fork() Shellcode (113 bytes)
https://www.exploit-db.com/exploits/44602/?rss
Linux/x86 - Bind TCP Shell + fork() Shellcode (113 bytes)
https://www.exploit-db.com/exploits/44602/?rss
[local] FxCop 10/12 - XML External Entity Injection
FxCop 10/12 - XML External Entity Injection
https://www.exploit-db.com/exploits/44603/?rss
FxCop 10/12 - XML External Entity Injection
https://www.exploit-db.com/exploits/44603/?rss
[dos] Allok Video Splitter 3.1.12.17 - Denial of Service
Allok Video Splitter 3.1.12.17 - Denial of Service
https://www.exploit-db.com/exploits/44605/?rss
Allok Video Splitter 3.1.12.17 - Denial of Service
https://www.exploit-db.com/exploits/44605/?rss
[papers] Web Forensics
Web Forensics
https://www.exploit-db.com/docs/vietnamese/44604-web-forensics.pdf?rss
Web Forensics
https://www.exploit-db.com/docs/vietnamese/44604-web-forensics.pdf?rss
[webapps] Fastweb FASTGate 0.00.47 - Cross-site Request Forgery
Fastweb FASTGate 0.00.47 - Cross-site Request Forgery
https://www.exploit-db.com/exploits/44606/?rss
Fastweb FASTGate 0.00.47 - Cross-site Request Forgery
https://www.exploit-db.com/exploits/44606/?rss
[webapps] ModbusPal 1.6b - XML External Entity Injection
ModbusPal 1.6b - XML External Entity Injection
https://www.exploit-db.com/exploits/44607/?rss
ModbusPal 1.6b - XML External Entity Injection
https://www.exploit-db.com/exploits/44607/?rss