[dos] Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
https://www.exploit-db.com/exploits/46502
Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
https://www.exploit-db.com/exploits/46502
Exploit Database
Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem. CVE-2019-9213 . dos exploit for Linux platform
[remote] Java Debug Wire Protocol (JDWP) - Remote Code Execution
Java Debug Wire Protocol (JDWP) - Remote Code Execution
https://www.exploit-db.com/exploits/46501
Java Debug Wire Protocol (JDWP) - Remote Code Execution
https://www.exploit-db.com/exploits/46501
Exploit Database
Java Debug Wire Protocol (JDWP) - Remote Code Execution
Java Debug Wire Protocol (JDWP) - Remote Code Execution.. remote exploit for Java platform
[webapps] OpenDocMan 1.3.4 - 'search.php where' SQL Injection
OpenDocMan 1.3.4 - 'search.php where' SQL Injection
https://www.exploit-db.com/exploits/46500
OpenDocMan 1.3.4 - 'search.php where' SQL Injection
https://www.exploit-db.com/exploits/46500
Exploit Database
OpenDocMan 1.3.4 - 'search.php where' SQL Injection
OpenDocMan 1.3.4 - 'search.php where' SQL Injection.. webapps exploit for PHP platform
[shellcode] Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
https://www.exploit-db.com/exploits/46499
Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
https://www.exploit-db.com/exploits/46499
Exploit Database
Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes).. shellcode exploit for Linux_x86 platform
[remote] Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() RCE (Metasploit)
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() RCE (Metasploit)
https://www.exploit-db.com/exploits/46510
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() RCE (Metasploit)
https://www.exploit-db.com/exploits/46510
Exploit Database
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). CVE-2019-6340 . remote exploit for PHP platform
[remote] Imperva SecureSphere 13.x - PWS Command Injection (Metasploit)
Imperva SecureSphere 13.x - PWS Command Injection (Metasploit)
https://www.exploit-db.com/exploits/46509
Imperva SecureSphere 13.x - PWS Command Injection (Metasploit)
https://www.exploit-db.com/exploits/46509
Exploit Database
Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit)
Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit).. remote exploit for Linux platform
[local] FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46508
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46508
Exploit Database
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit). CVE-2012-0217 . local exploit for FreeBSD_x86-64 platform
[local] Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow - (UNICODE)(SEH)
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow - (UNICODE)(SEH)
https://www.exploit-db.com/exploits/46507
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow - (UNICODE)(SEH)
https://www.exploit-db.com/exploits/46507
Exploit Database
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH)
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH).. local exploit for Windows platform
[remote] QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46506
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46506
Exploit Database
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit).. remote exploit for Hardware platform
[webapps] Kados R10 GreenBee - Multiple SQL Injection
Kados R10 GreenBee - Multiple SQL Injection
https://www.exploit-db.com/exploits/46505
Kados R10 GreenBee - Multiple SQL Injection
https://www.exploit-db.com/exploits/46505
Exploit Database
Kados R10 GreenBee - Multiple SQL Injection
Kados R10 GreenBee - Multiple SQL Injection.. webapps exploit for PHP platform
[remote] OpenSSH SCP Client - Write Arbitrary Files
OpenSSH SCP Client - Write Arbitrary Files
https://www.exploit-db.com/exploits/46516
OpenSSH SCP Client - Write Arbitrary Files
https://www.exploit-db.com/exploits/46516
Exploit Database
OpenSSH SCP Client - Write Arbitrary Files
OpenSSH SCP Client - Write Arbitrary Files. CVE-2019-6111CVE-2019-6110 . remote exploit for Multiple platform
[papers] File transfer skills in the red team post penetration test
File transfer skills in the red team post penetration test
https://www.exploit-db.com/docs/english/46515-file-transfer-skills-in-the-red-team-post-penetration-test.pdf
File transfer skills in the red team post penetration test
https://www.exploit-db.com/docs/english/46515-file-transfer-skills-in-the-red-team-post-penetration-test.pdf
[remote] TeamCity < 9.0.2 - Disabled Registration Bypass
TeamCity < 9.0.2 - Disabled Registration Bypass
https://www.exploit-db.com/exploits/46514
TeamCity < 9.0.2 - Disabled Registration Bypass
https://www.exploit-db.com/exploits/46514
Exploit Database
TeamCity < 9.0.2 - Disabled Registration Bypass
TeamCity < 9.0.2 - Disabled Registration Bypass.. remote exploit for Multiple platform
[remote] Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
https://www.exploit-db.com/exploits/46513
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
https://www.exploit-db.com/exploits/46513
Exploit Database
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass). CVE-2018-3245CVE-2018-2628 . remote exploit for Multiple platform
[webapps] phpBB 3.2.3 - Remote Code Execution
phpBB 3.2.3 - Remote Code Execution
https://www.exploit-db.com/exploits/46512
phpBB 3.2.3 - Remote Code Execution
https://www.exploit-db.com/exploits/46512
Exploit Database
phpBB 3.2.3 - Remote Code Execution
phpBB 3.2.3 - Remote Code Execution.. webapps exploit for PHP platform
[webapps] WordPress Core 5.0 - Remote Code Execution
WordPress Core 5.0 - Remote Code Execution
https://www.exploit-db.com/exploits/46511
WordPress Core 5.0 - Remote Code Execution
https://www.exploit-db.com/exploits/46511
Exploit Database
WordPress Core 5.0 - Remote Code Execution
WordPress Core 5.0 - Remote Code Execution. CVE-2019-8943CVE-2019-8942 . webapps exploit for PHP platform
[shellcode] Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
https://www.exploit-db.com/exploits/46519
Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
https://www.exploit-db.com/exploits/46519
Exploit Database
Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes).. shellcode exploit for Linux_x86 platform
[webapps] McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
https://www.exploit-db.com/exploits/46518
McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
https://www.exploit-db.com/exploits/46518
Exploit Database
McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
McAfee ePO 5.9.1 - Registered Executable Local Access Bypass. CVE-2018-6671 . webapps exploit for Windows platform
[webapps] OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting
OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting
https://www.exploit-db.com/exploits/46517
OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting
https://www.exploit-db.com/exploits/46517
Exploit Database
OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting
OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting.. webapps exploit for Multiple platform
[papers] Flexpaper <= 2.3.6 Remote Code Execution Whitepaper
Flexpaper <= 2.3.6 Remote Code Execution Whitepaper
https://www.exploit-db.com/docs/english/46521-flexpaper-=-2.3.6-remote-code-execution-whitepaper.pdf
Flexpaper <= 2.3.6 Remote Code Execution Whitepaper
https://www.exploit-db.com/docs/english/46521-flexpaper-=-2.3.6-remote-code-execution-whitepaper.pdf