[shellcode] Linux/x64 - XANAX Encoder Shellcode (127 bytes)
Linux/x64 - XANAX Encoder Shellcode (127 bytes)
https://www.exploit-db.com/exploits/46679
Linux/x64 - XANAX Encoder Shellcode (127 bytes)
https://www.exploit-db.com/exploits/46679
Exploit Database
Linux/x64 - XANAX Encoder Shellcode (127 bytes)
Linux/x64 - XANAX Encoder Shellcode (127 bytes).. shellcode exploit for Generator platform
[remote] TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
https://www.exploit-db.com/exploits/46678
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
https://www.exploit-db.com/exploits/46678
Exploit Database
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow. CVE-2019-6989 . remote exploit for Hardware platform
[webapps] D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
https://www.exploit-db.com/exploits/46687
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
https://www.exploit-db.com/exploits/46687
Exploit Database
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting. CVE-2019-11017 . webapps exploit for Hardware platform
[local] FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
https://www.exploit-db.com/exploits/46686
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
https://www.exploit-db.com/exploits/46686
Exploit Database
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer.. local exploit for Windows platform
[local] FTPShell Server 6.83 - 'Account name to ban' Local Buffer
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
https://www.exploit-db.com/exploits/46685
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
https://www.exploit-db.com/exploits/46685
Exploit Database
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
FTPShell Server 6.83 - 'Account name to ban' Local Buffer.. local exploit for Windows platform
[webapps] Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/46684
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/46684
Exploit Database
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform
[webapps] ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46691
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46691
Exploit Database
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit). CVE-2019-11446 . webapps exploit for PHP platform
[local] Microsoft Internet Explorer 11 - XML External Entity Injection
Microsoft Internet Explorer 11 - XML External Entity Injection
https://www.exploit-db.com/exploits/46690
Microsoft Internet Explorer 11 - XML External Entity Injection
https://www.exploit-db.com/exploits/46690
Exploit Database
Microsoft Internet Explorer 11 - XML External Entity Injection
Microsoft Internet Explorer 11 - XML External Entity Injection.. local exploit for Windows platform
[shellcode] Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
https://www.exploit-db.com/exploits/46689
Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
https://www.exploit-db.com/exploits/46689
Exploit Database
Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes)
Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes).. shellcode exploit for Linux_x86 platform
[local] CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
https://www.exploit-db.com/exploits/46688
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
https://www.exploit-db.com/exploits/46688
Exploit Database
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass. CVE-2018-14894 . local exploit for Windows platform
[remote] Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
https://www.exploit-db.com/exploits/46693
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
https://www.exploit-db.com/exploits/46693
Exploit Database
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). CVE-2019-9670CVE-2019-9621 . remote exploit for Linux platform
[local] Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46692
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46692
Exploit Database
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit).. local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/46718
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/46718
Exploit Database
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation. CVE-2019-0836 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
https://www.exploit-db.com/exploits/46717
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
https://www.exploit-db.com/exploits/46717
Exploit Database
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation. CVE-2019-0805 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
https://www.exploit-db.com/exploits/46716
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
https://www.exploit-db.com/exploits/46716
Exploit Database
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass. CVE-2019-0732 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
https://www.exploit-db.com/exploits/46715
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
https://www.exploit-db.com/exploits/46715
Exploit Database
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation. CVE-2019-0796 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
https://www.exploit-db.com/exploits/46714
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
https://www.exploit-db.com/exploits/46714
Exploit Database
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation. CVE-2019-0731 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
https://www.exploit-db.com/exploits/46713
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
https://www.exploit-db.com/exploits/46713
Exploit Database
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation. CVE-2019-0730 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
https://www.exploit-db.com/exploits/46712
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
https://www.exploit-db.com/exploits/46712
Exploit Database
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation. CVE-2019-0735 . local exploit for Windows platform
[dos] AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46711
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46711
Exploit Database
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC).. dos exploit for Windows platform