Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[webapps] QNAP Qcenter Virtual Appliance - Multiple Vulnerabilities
QNAP Qcenter Virtual Appliance - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/45015/?rss
[webapps] WAGO e!DISPLAY 7300T - Multiple Vulnerabilities
WAGO e!DISPLAY 7300T - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/45014/?rss
[remote] phpMyAdmin - Authenticated Remote Code Execution (Metasploit)
phpMyAdmin - Authenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45020/?rss
[remote] Apache CouchDB - Arbitrary Command Execution (Metasploit)
Apache CouchDB - Arbitrary Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45019/?rss
[remote] Manage Engine Exchange Reporter Plus - Unauthenticated RCE (Metasploit)
Manage Engine Exchange Reporter Plus - Unauthenticated RCE (Metasploit)
https://www.exploit-db.com/exploits/45018/?rss
[webapps] Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/45022/?rss
[remote] Hadoop YARN ResourceManager - Unauthenticated Command Execution (Metasploit)
Hadoop YARN ResourceManager - Unauthenticated Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45025/?rss
[local] Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)
Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)
https://www.exploit-db.com/exploits/45024/?rss
[webapps] Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection
Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection
https://www.exploit-db.com/exploits/45027/?rss
[local] Microsoft Enterprise Mode Site List Manager - XML External Entity Injection
Microsoft Enterprise Mode Site List Manager - XML External Entity Injection
https://www.exploit-db.com/exploits/45026/?rss
[dos] Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
https://www.exploit-db.com/exploits/45033/?rss
[dos] macOS/iOS - JavaScript Injection Bug in OfficeImporter
macOS/iOS - JavaScript Injection Bug in OfficeImporter
https://www.exploit-db.com/exploits/45032/?rss
[webapps] WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting
WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45031/?rss
[webapps] VelotiSmart WiFi B-380 Camera - Directory Traversal
VelotiSmart WiFi B-380 Camera - Directory Traversal
https://www.exploit-db.com/exploits/45030/?rss
[shellcode] Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
https://www.exploit-db.com/exploits/45029/?rss
[papers] Exploiting the Obvious - Bluetooth Trust Relationships
Exploiting the Obvious - Bluetooth Trust Relationships
https://www.exploit-db.com/docs/english/45028-exploiting-the-obvious---bluetooth-trust-relationships.pdf?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
https://www.exploit-db.com/exploits/45035/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/45034/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
https://www.exploit-db.com/exploits/45037/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
https://www.exploit-db.com/exploits/45036/?rss