Exploit-DB
2.4K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[local] Libuser - roothelper Privilege Escalation (Metasploit)
Libuser - roothelper Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/44633/?rss
[webapps] WordPress Plugin Metronet Tag Manager 1.2.7 - Cross-Site Request Forgery
WordPress Plugin Metronet Tag Manager 1.2.7 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44632/?rss
[remote] Inteno IOPSYS 2.0 - 4.2.0 p910nd - Remote Command Execution
Inteno IOPSYS 2.0 - 4.2.0 p910nd - Remote Command Execution
https://www.exploit-db.com/exploits/44635/?rss
[webapps] NodAPS 4.0 - SQL injection / Cross-Site Request Forgery
NodAPS 4.0 - SQL injection / Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44636/?rss
[webapps] Intelbras NCLOUD 300 1.0 - Authentication bypass
Intelbras NCLOUD 300 1.0 - Authentication bypass
https://www.exploit-db.com/exploits/44637/?rss
[remote] Nanopool Claymore Dual Miner 7.3 - Remote Code Execution
Nanopool Claymore Dual Miner 7.3 - Remote Code Execution
https://www.exploit-db.com/exploits/44638/?rss
[webapps] SuperCom Online Shopping Ecommerce Cart 1 - Persistent Cross-Site scripting / Cross site request forgery / Authentication bypass
SuperCom Online Shopping Ecommerce Cart 1 - Persistent Cross-Site scripting / Cross site request forgery / Authentication bypass
https://www.exploit-db.com/exploits/44639/?rss
[webapps] Powerlogic/Schneider Electric IONXXXX Series - Cross-Site Request Forgery
Powerlogic/Schneider Electric IONXXXX Series - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44640/?rss
[dos] Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in compat adjtimex Syscall
Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in compat adjtimex Syscall
https://www.exploit-db.com/exploits/44641/?rss
[remote] Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44643/?rss
[remote] Jenkins CLI - HTTP Java Deserialization (Metasploit)
Jenkins CLI - HTTP Java Deserialization (Metasploit)
https://www.exploit-db.com/exploits/44642/?rss
[local] Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC)
Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC)
https://www.exploit-db.com/exploits/44644/?rss
[webapps] Healwire Online Pharmacy 3.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery
Healwire Online Pharmacy 3.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44645/?rss
[webapps] Monstra CMS before 3.0.4 - Cross-Site Scripting
Monstra CMS before 3.0.4 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44646/?rss
[webapps] SAP NetWeaver Web Dynpro 6.4 to 7.5 - Information disclosure
SAP NetWeaver Web Dynpro 6.4 to 7.5 - Information disclosure
https://www.exploit-db.com/exploits/44647/?rss
[remote] HPE iMC 7.3 - Remote Code Execution (Metasploit)
HPE iMC 7.3 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44648/?rss
[local] Prime95 29.4b8 - Stack Buffer Overflow (SEH)
Prime95 29.4b8 - Stack Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44649/?rss
[webapps] Cisco SA520W Security Appliance - Path Traversal
Cisco SA520W Security Appliance - Path Traversal
https://www.exploit-db.com/exploits/44650/?rss
[webapps] Infinity Market Classified Ads Script 1.6.2 - Cross-Site Request Forgery
Infinity Market Classified Ads Script 1.6.2 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44651/?rss
[local] DynoRoot DHCP - Client Command Injection
DynoRoot DHCP - Client Command Injection
https://www.exploit-db.com/exploits/44652/?rss