[dos] Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
https://www.exploit-db.com/exploits/45033/?rss
Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
https://www.exploit-db.com/exploits/45033/?rss
[dos] macOS/iOS - JavaScript Injection Bug in OfficeImporter
macOS/iOS - JavaScript Injection Bug in OfficeImporter
https://www.exploit-db.com/exploits/45032/?rss
macOS/iOS - JavaScript Injection Bug in OfficeImporter
https://www.exploit-db.com/exploits/45032/?rss
[webapps] WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting
WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45031/?rss
WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45031/?rss
[webapps] VelotiSmart WiFi B-380 Camera - Directory Traversal
VelotiSmart WiFi B-380 Camera - Directory Traversal
https://www.exploit-db.com/exploits/45030/?rss
VelotiSmart WiFi B-380 Camera - Directory Traversal
https://www.exploit-db.com/exploits/45030/?rss
[shellcode] Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
https://www.exploit-db.com/exploits/45029/?rss
Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
https://www.exploit-db.com/exploits/45029/?rss
[papers] Exploiting the Obvious - Bluetooth Trust Relationships
Exploiting the Obvious - Bluetooth Trust Relationships
https://www.exploit-db.com/docs/english/45028-exploiting-the-obvious---bluetooth-trust-relationships.pdf?rss
Exploiting the Obvious - Bluetooth Trust Relationships
https://www.exploit-db.com/docs/english/45028-exploiting-the-obvious---bluetooth-trust-relationships.pdf?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
https://www.exploit-db.com/exploits/45035/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
https://www.exploit-db.com/exploits/45035/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/45034/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/45034/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
https://www.exploit-db.com/exploits/45037/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
https://www.exploit-db.com/exploits/45037/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
https://www.exploit-db.com/exploits/45036/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
https://www.exploit-db.com/exploits/45036/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root
https://www.exploit-db.com/exploits/45038/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root
https://www.exploit-db.com/exploits/45038/?rss
[shellcode] Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/45039/?rss
Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/45039/?rss
[remote] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
https://www.exploit-db.com/exploits/45040/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
https://www.exploit-db.com/exploits/45040/?rss
[local] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
https://www.exploit-db.com/exploits/45041/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
https://www.exploit-db.com/exploits/45041/?rss
[remote] Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
https://www.exploit-db.com/exploits/45044/?rss
Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
https://www.exploit-db.com/exploits/45044/?rss
[remote] QNAP Q'Center - change_passwd Command Execution (Metasploit)
QNAP Q'Center - change_passwd Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45043/?rss
QNAP Q'Center - change_passwd Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45043/?rss
[papers] Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
https://www.exploit-db.com/papers/45045/?rss
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
https://www.exploit-db.com/papers/45045/?rss
Exploit-Db
Papers
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
[webapps] PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
https://www.exploit-db.com/exploits/45047/?rss
PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
https://www.exploit-db.com/exploits/45047/?rss
[webapps] PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
https://www.exploit-db.com/exploits/45046/?rss
PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
https://www.exploit-db.com/exploits/45046/?rss
[local] JavaScript Core - Arbitrary Code Execution
JavaScript Core - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45048/?rss
JavaScript Core - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45048/?rss