المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59

  1. [shellcode] Linux/x86 - Force unmount /media/disk Shellcode (33 bytes)
  2. [shellcode] Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (26 bytes)
  3. [remote] Master IP CAM 01 - Multiple Vulnerabilities
  4. [shellcode] Linux/x86 - sys_setdomainname("th1s s3rv3r h4s b33n h1j4ck3d !!") Shellco
  5. [shellcode] Linux/x86 - sys_rmdir("/tmp/willdeleted") Shellcode (41 bytes)
  6. [shellcode] Linux/x86 - sys_execve(/bin/sh, -c, ping localhost) Shellcode (55 bytes)
  7. [shellcode] Linux/x86 - sys_sync Shellcode (6 bytes)
  8. [shellcode] Linux/x86 - sys_exit(0) Shellcode (8 bytes)
  9. [shellcode] Linux/x86 - sys_sethostname(PwNeD !!, 8) Shellcode (32 bytes)
  10. [shellcode] Linux/x86 - CDRom Ejecting Shellcode (46 bytes)
  11. [shellcode] Linux/x86 - Remote File Download Shellcode (42 bytes)
  12. [shellcode] Linux/x86 - pwrite(/etc/shadow, (md5 hash of agix), 32, 8) Shellcode (89
  13. [webapps] SugarCRM 3.5.1 - Cross-Site Scripting
  14. [webapps] Belkin N600DB Wireless Router - Multiple Vulnerabilities
  15. [shellcode] Linux/x86 - setuid(0) + chmod(/etc/shadow, 0666) Shellcode (37 bytes)
  16. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh, 0, 0) Shellcode (27 bytes)
  17. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (29 bytes)
  18. [webapps] D-Link DSL-2640R - Unauthenticated DNS Change
  19. [shellcode] Linux/x86 - /sbin/iptables --flush Shellcode (69 bytes)
  20. [webapps] Reservo Image Hosting Script 1.5 - Cross-Site Scripting
  21. [shellcode] Linux/x86 - Bind TCP (45295/TCP) Shell (/bin/sh) + fork() Shellcode (131
  22. [shellcode] Linux/x86 - Reverse TCP (www.netric.org:45295/TCP) Shell (/bin/sh) Shellc
  23. [shellcode] Linux/x86 - setresuid(0,0,0) + execve(/bin/sh) + exit() Shellcode (41 byt
  24. [shellcode] Linux/x86 - socket-proxy Shellcode (372 bytes) (Generator)
  25. [shellcode] Linux/x86 - chmod(/bin/sh,04775) + set sh +s Shellcode (31 bytes)
  26. [shellcode] Linux/x86 - setuid() + execve() + exit() Shellcode (44 bytes)
  27. [shellcode] Linux/x86 - Add Root User To /etc/passwd + No Password + exit() Shellcode
  28. [shellcode] Linux/x86 - execve(/bin/ash) + exit Shellcode (34 bytes)
  29. [webapps] Zomato Clone Script - Arbitrary File Upload
  30. [shellcode] Linux/x86 - execve(/bin/sh /tmp/p00p) Shellcode (70 bytes)
  31. [remote] Transmission - RPC DNS Rebinding
  32. [shellcode] Linux/x86 - execve(/sbin/iptables -F) Shellcode (70 bytes)
  33. [shellcode] Linux/x86 - execve(/sbin/ipchains -F) Shellcode (70 bytes)
  34. [shellcode] Linux/x86 - Add Root User (w000t) + No Password Shellcode (177 bytes)
  35. [shellcode] Linux/x86 - fork() + setreuid(0, 0) + execve(cp /bin/sh /tmp/sh; chmod 47
  36. [remote] Seagate Personal Cloud - Multiple Vulnerabilities
  37. [shellcode] Linux/x86 - Audio (knock knock knock) via /dev/dsp + setreuid(0,0) + exec
  38. [shellcode] Linux/x86 - execve(/bin/sh,0,0) Shellcode (21 bytes)
  39. [shellcode] Linux/x86 - setuid(0) + execve("/bin/sh",0,0) Shellcode (28 bytes)
  40. [shellcode] Linux/x86 - Bind TCP (64713/TCP) Shell (/bin/sh) Shellcode (83 bytes)
  41. [shellcode] Linux/x86 - execve(/sbin/halt,/sbin/halt) Shellcode (27 bytes)
  42. [shellcode] Linux/x86 - execve(/sbin/reboot,/sbin/reboot) Shellcode (28 bytes)
  43. [shellcode] Linux/x86 - execve(/sbin/shutdown,/sbin/shutdown 0) Shellcode (36 bytes)
  44. [shellcode] Linux/x86 - setuid(0) + setgid(0) + execve(/bin/sh,[/bin/sh,NULL])) Shell
  45. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh,0) Shellcode (25 bytes)
  46. [shellcode] Linux/x86 - exit(0) / exit(1) Shellcode (3/4 bytes)
  47. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (27 bytes)
  48. [shellcode] Linux/x86 - Disable Shadowing Shellcode (42 bytes)
  49. [shellcode] Linux/x86 - Add Root User (w00w00) To /etc/passwd Shellcode (104 bytes)
  50. [shellcode] Linux/x86 - Bind TCP (3879/TCP) Shell (/bin/sh) Shellcode (113 bytes)
  51. [shellcode] BSD/x86 - execve(/bin/sh) Shellcode (28 bytes)
  52. [shellcode] BSD/x86 - execve(/bin/sh) + seteuid(0) Shellcode (31 bytes)
  53. [shellcode] Linux/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes
  54. [shellcode] BSD/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes)
  55. [shellcode] Linux/x86 - symlink /bin/sh sh Shellcode (36 bytes)
  56. [shellcode] BSD/x86 - symlink /bin/sh sh Shellcode (39 bytes)
  57. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (58 bytes)
  58. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) + exit() Shellcode (
  59. [shellcode] Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) + exit() Shellcode (
  60. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes)
  61. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
  62. [shellcode] OpenBSD/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (74 byt
  63. [shellcode] OpenBSD/x86 - Load Kernel Module (/tmp/o.o) Shellcode (66 bytes)
  64. [shellcode] BSD/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)
  65. [shellcode] Linux/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)
  66. [shellcode] Linux/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (67 bytes
  67. [shellcode] BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
  68. [shellcode] BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 byt
  69. [shellcode] BSD - setuid(0) + chroot() + execute /bin/sh Shellcode (57 bytes)
  70. [shellcode] Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 byt
  71. [shellcode] Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
  72. [shellcode] Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
  73. [shellcode] Solaris/SPARC - Bind TCP Shell Shellcode
  74. [shellcode] Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
  75. [shellcode] Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/s
  76. [shellcode] Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff)
  77. [shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traf
  78. [shellcode] OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
  79. [shellcode] OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
  80. [shellcode] OSX/PPC - execve(/bin/sh) Shellcode
  81. [shellcode] OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (30
  82. [shellcode] OSX/PPC - Stager Sock Reverse Shellcode
  83. [shellcode] OSX/PPC - Stager Sock Find Shellcode
  84. [shellcode] OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
  85. [shellcode] OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
  86. [shellcode] OSX/PPC - Remote findsock by recv() Key Shellcode
  87. [remote] Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condit
  88. [shellcode] OpenBSD/x86 - reboot() Shellcode (15 bytes)
  89. [shellcode] Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
  90. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR E
  91. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR E
  92. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR E
  93. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded S
  94. [shellcode] Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/
  95. [shellcode] Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shell
  96. [webapps] Flash Operator Panel 2.31.03 - Command Execution
  97. [webapps] Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
  98. [shellcode] Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118
  99. [shellcode] Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
  100. [shellcode] Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
  101. [dos] OBS studio 20.1.3 - Local Buffer Overflow
  102. [webapps] ILIAS < 5.2.4 - Cross-Site Scripting
  103. [webapps] Oracle PeopleSoft 8.5x - Remote Code Execution
  104. [webapps] Adminer 4.3.1 - Server-Side Request Forgery
  105. [webapps] RISE 1.9 - 'search' SQL Injection
  106. [webapps] PerfexCRM 1.9.7 - Arbitrary File Upload
  107. [remote] Disk Pulse Enterprise 10.1.18 - Buffer Overflow
  108. [remote] SysGauge Server 3.6.18 - Buffer Overflow
  109. [shellcode] Linux/x86-64 - Bind TCP Password (doomedra) Shell (/bin/sh) (4444/TCP) Sh
  110. [webapps] Domains & Hostings Manager PRO 3.0 - Authentication Bypass
  111. [shellcode] Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1
  112. [webapps] ImgHosting 1.5 - Cross-Site Scripting
  113. [shellcode] Linux/x86-64 - Bind TCP Password (Password) /bin/sh Shell (4444/TCP) Shel
  114. [shellcode] Linux/x86-64 - Read /etc/passwd Shellcode (82 bytes)
  115. [shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using echo cmd Shellcode (273 byte
  116. [shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (
  117. [shellcode] Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 byte
  118. [shellcode] Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (2
  119. [webapps] pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
  120. [shellcode] Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcod
  121. [shellcode] Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/
  122. [shellcode] Linux/x86-64 - Read /etc/passwd + Write To /tmp/outfile Shellcode (105 by
  123. [shellcode] Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
  124. [shellcode] Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
  125. [shellcode] Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
  126. [shellcode] Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) S
  127. [shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96
  128. [shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110
  129. [shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
  130. [shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
  131. [dos] PyroBatchFTP < 3.19 - Buffer Overflow
  132. [dos] Kentico CMS 11.0 - Buffer Overflow
  133. [shellcode] Linux/SPARC - setreuid(0,0) + standard execve() Shellcode (72 bytes)
  134. [shellcode] Linux/SPARC - setreuid(0,0) + execve(/bin/sh) Shellcode (64 bytes)
  135. [webapps] Taxi Booking Script 1.0 - Cross-site Scripting
  136. [shellcode] Linux/SuperH (sh4) - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (132 by
  137. [shellcode] Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)
  138. [shellcode] Linux/StrongARM - Bind TCP /bin/sh Shell Shellcode (203 bytes)
  139. [shellcode] Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
  140. [shellcode] Linux/StrongARM - setuid() Shellcode (20 bytes)
  141. [shellcode] Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shel
  142. [webapps] Xnami 1.0 - Cross-Site Scripting
  143. [shellcode] Linux/ARM - execve("/bin/sh",NULL,0) Shellcode (31 bytes)
  144. [shellcode] Linux/ARM - execve("/bin/sh", [], [0 vars]) Shellcode (35 bytes)
  145. [shellcode] Linux/ARM - creat("/root/pwned", 0777) Shellcode (39 bytes)
  146. [remote] ALLMediaServer 0.95 - Buffer Overflow
  147. [dos] Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
  148. [dos] macOS - 'process_policy' Stack Leak Through Uninitialized Field
  149. [shellcode] Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
  150. [remote] phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
  151. [remote] LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
  152. [dos] Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Esca
  153. [dos] Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalati
  154. [dos] Android - Hardware Service Manager Arbitrary Service Replacement due to getpidc
  155. [dos] Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
  156. [shellcode] IRIX - stdin-read Shellcode (40 bytes)
  157. [shellcode] IRIX - execve(/bin/sh) Shellcode (68 bytes)
  158. [shellcode] IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
  159. [shellcode] IRIX - execve(/bin/sh) Shellcode (43 bytes)
  160. [shellcode] IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
  161. [shellcode] FreeBSD - reboot() Shellcode (15 Bytes)
  162. [shellcode] FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
  163. [shellcode] FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
  164. [shellcode] FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
  165. [shellcode] FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (12
  166. [shellcode] FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
  167. [dos] MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
  168. [local] Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
  169. [local] Parity Browser < 1.6.10 - Bypass Same Origin Policy
  170. [local] Jungo WinDriver 12.5.1 - Local Privilege Escalation
  171. [shellcode] Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null
  172. [webapps] D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execut
  173. [webapps] SAP NetWeaver J2EE Engine 7.40 - SQL Injection
  174. [local] Jungo Windriver 12.5.1 - Privilege Escalation
  175. [remote] HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasplo
  176. [remote] HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metas
  177. [dos] Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integ
  178. [dos] Multiple CPUs - Information Leak Using Speculative Execution
  179. [shellcode] Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
  180. [webapps] Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
  181. [webapps] WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request For
  182. [webapps] WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forge
  183. [webapps] WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Priv
  184. [webapps] WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request F
  185. [shellcode] BSD/x86 - setreuid(geteuid(), geteuid()) + execve("/bin/sh") Shellcode (3
  186. [shellcode] Alpha - setuid() Shellcode (156 bytes)
  187. [shellcode] Alpha - execve() Shellcode (112 bytes)
  188. [shellcode] Alpha - /bin/sh Shellcode (80 bytes)
  189. [webapps] WordPress Plugin Events Calendar - 'event_id' SQL Injection
  190. [webapps] Muviko 1.1 - SQL Injection
  191. [remote] DiskBoss Enterprise 8.8.16 - Buffer Overflow
  192. [webapps] Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
  193. [shellcode] Linux/x86 - execve /bin/dash Shellcode (30 bytes)
  194. [webapps] Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
  195. [remote] Commvault Communications Service (cvd) - Command Injection (Metasploit)
  196. [dos] Microsoft Windows - 'nt!NtQuerySystemInformation (information class 138, QueryM
  197. [dos] Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly
  198. [dos] Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not In
  199. [dos] Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
  200. [dos] Microsoft Edge Chakra JIT - Escape Analysis Bug
  201. [dos] Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryP
  202. [dos] Android - Inter-Process munmap due to Race Condition in ashmem
  203. [local] Microsoft Windows - Local XPS Print Spooler Sandbox Escape
  204. [shellcode] Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
  205. [webapps] Vanilla < 2.1.5 - Cross-Site Request Forgery
  206. [webapps] WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
  207. [webapps] FiberHome LM53Q1 - Multiple Vulnerabilities
  208. [webapps] SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
  209. [remote] Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Comma
  210. [webapps] Photos in Wifi 1.0.1 - Path Traversal
  211. [dos] BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow
  212. [webapps] Synology DiskStation Manager (DSM) < 6.1.3-15152 - 'forget_passwd.cgi' User
  213. [dos] DiskBoss Enterprise 8.5.12 - Denial of Service
  214. [dos] Sync Breeze Enterprise 10.1.16 - Denial of Service
  215. [dos] Disk Pulse Enterprise 10.1.18 - Denial of Service
  216. [dos] VX Search Enterprise 10.1.12 - Denial of Service
  217. [remote] Cisco IOS - Remote Code Execution
  218. [local] VMware Workstation - ALSA Config File Local Privilege Escalation (Metasploit)
  219. [remote] Ayukov NFTP FTP Client 2.0 - Buffer Overflow (Metasploit)
  220. [webapps] Gespage 7.4.8 - SQL Injection
  221. [dos] Microsoft Windows win32k - Using SetClassLong to Switch Between CS_CLASSDC and
  222. [webapps] Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities
  223. [webapps] Max Web Portal < 1.30 - Multiple Vulnerabilities
  224. [webapps] MegaBrowser < 0.71b - Multiple Vulnerabilities
  225. [webapps] FTP Service < 1.2 - Multiple Vulnerabilities
  226. [webapps] WinMX < 2.6 - Design Error
  227. [webapps] P-Synch < 6.2.5 - Multiple Vulnerabilities
  228. [webapps] IP.Board < 1.1.1 - Plaintext Password
  229. [webapps] phpLinks < 2.1.2 - Multiple Vulnerabilities
  230. [webapps] PHP Topsites < 2.2 - Multiple Vulnerabilities
  231. [webapps] Zen Cart < 1.3.8a - SQL Injection
  232. [remote] WDMyCloud < 2.30.165 - Multiple Vulnerabilities
  233. [remote] D-Link DNS-320 ShareCenter - Backdoor Access
  234. [shellcode] Linux/x86 - Reverse TCP Shell (127.1.1.1:8888/TCP) Shellcode (69 bytes)
  235. [dos] GetGo Download Manager 5.3.0.2712 - 'Proxy' Buffer Overflow
  236. [webapps] gps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities
  237. [remote] Xplico - Remote Code Execution (Metasploit)
  238. [remote] Linksys WVBR0-25 - User-Agent Command Execution (Metasploit)
  239. [remote] Iopsys Router - 'dhcp' Remote Code Execution
  240. [local] Multiple CPUs - 'Spectre' Information Disclosure (PoC)
  241. [papers] Spectre - Trick Error-Free Applications Into Giving Up Secret Information
  242. [papers] Meltdown - Bypass Intel's Hardware Barrier Between Applications And The Comp
  243. [papers] Fortinet FortiClient - Local Privilege Escalation
  244. [papers] PoC || GTFO 0x17
  245. [papers] [Hebrew] Digital Whisper Security Magazine #90
  246. [webapps] EMC xPression 4.5SP1 Patch 13 - 'model.jobHistoryId' SQL Injection
  247. [local] Kingsoft Antivirus/Internet Security 9+ - Privilege Escalation
  248. [webapps] WordPress Plugin Smart Google Code Inserter < 3.5 - Authentication Bypass
  249. [papers] Fortinet FortiClient - Local Privilege Escalation
  250. [local] Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege E