Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[shellcode] Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (113 bytes)
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (113 bytes)
https://www.exploit-db.com/exploits/44723/?rss
[webapps] Shipping System CMS 1.0 - SQL Injection
Shipping System CMS 1.0 - SQL Injection
https://www.exploit-db.com/exploits/44722/?rss
[dos] Siemens SCALANCE S613 - Remote Denial of Service
Siemens SCALANCE S613 - Remote Denial of Service
https://www.exploit-db.com/exploits/44721/?rss
[webapps] GPSTracker 1.0 - 'id' SQL Injection
GPSTracker 1.0 - 'id' SQL Injection
https://www.exploit-db.com/exploits/44720/?rss
[webapps] Online Store System CMS 1.0 - SQL Injection
Online Store System CMS 1.0 - SQL Injection
https://www.exploit-db.com/exploits/44719/?rss
[webapps] Gigs 2.0 - 'username' SQL Injection
Gigs 2.0 - 'username' SQL Injection
https://www.exploit-db.com/exploits/44718/?rss
[dos] FTPShell Server 6.80 - Denial of Service
FTPShell Server 6.80 - Denial of Service
https://www.exploit-db.com/exploits/44717/?rss
[webapps] Mobile Card Selling Platform 1 - Cross-Site Request Forgery
Mobile Card Selling Platform 1 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44716/?rss
[webapps] PHP Dashboards 4.5 - SQL Injection
PHP Dashboards 4.5 - SQL Injection
https://www.exploit-db.com/exploits/44715/?rss
[webapps] PHP Dashboards 4.5 - 'email' SQL Injection
PHP Dashboards 4.5 - 'email' SQL Injection
https://www.exploit-db.com/exploits/44714/?rss
[local] FTPShell Server 6.80 - Buffer Overflow (SEH)
FTPShell Server 6.80 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44713/?rss
[webapps] MySQL Blob Uploader 1.7 - 'home-filet-edit.php' SQL Injection
MySQL Blob Uploader 1.7 - 'home-filet-edit.php' SQL Injection
https://www.exploit-db.com/exploits/44712/?rss
[webapps] ASP.NET jVideo Kit - 'query' SQL Injection
ASP.NET jVideo Kit - 'query' SQL Injection
https://www.exploit-db.com/exploits/44739/?rss
[shellcode] Linux/x86 - Reverse (10.10.2.4:4444/TCP) Shell Shellcode (68 bytes)
Linux/x86 - Reverse (10.10.2.4:4444/TCP) Shell Shellcode (68 bytes)
https://www.exploit-db.com/exploits/44738/?rss
[local] Flash ActiveX 18.0.0.194 - Code Execution
Flash ActiveX 18.0.0.194 - Code Execution
https://www.exploit-db.com/exploits/44742/?rss
[local] Microsoft Internet Explorer 11 (Windows 7 x64/x86) - vbscript Code Execution
Microsoft Internet Explorer 11 (Windows 7 x64/x86) - vbscript Code Execution
https://www.exploit-db.com/exploits/44741/?rss
[shellcode] Linux/x86 - Reverse (10.0.7.17:4444/TCP) Shell (/bin/sh) Shellcode (101 Bytes)
Linux/x86 - Reverse (10.0.7.17:4444/TCP) Shell (/bin/sh) Shellcode (101 Bytes)
https://www.exploit-db.com/exploits/44740/?rss
[local] Flash ActiveX 28.0.0.137 - Code Execution (2)
Flash ActiveX 28.0.0.137 - Code Execution (2)
https://www.exploit-db.com/exploits/44745/?rss
[local] Flash ActiveX 28.0.0.137 - Code Execution (1)
Flash ActiveX 28.0.0.137 - Code Execution (1)
https://www.exploit-db.com/exploits/44744/?rss
[local] Microsoft Internet Explorer 11 - javascript Code Execution
Microsoft Internet Explorer 11 - javascript Code Execution
https://www.exploit-db.com/exploits/44743/?rss