WorkSuite PRM 2.4 – ‘password’ SQL Injection
from Exploit-DB.com RSS Feed https://ift.tt/2JgAinA
via IFTTT
WorkSuite PRM 2.4 – ‘password’ SQL Injection
from Exploit-DB.com RSS Feed https://ift.tt/2JgAinA
via IFTTT
LibreNMS 1.46 – ‘addhost’ Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2KT8AAL
via IFTTT
Linux/x86 – Chmod + Execute (/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2RHX0sr
via IFTTT
Windows/x86 – Start iexplore.exe (http://192.168.10.10/) Shellcode (191 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2KKFbbR
via IFTTT
Windows/x86 – bitsadmin Download and Execute (https://ift.tt/31SWQmN “c:\evil.exe”) Shellcode (210 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/31Y0yeU
via IFTTT
Linux/x86 – ASCII AND, SUB, PUSH, POPAD Encoder Shellcode
from Exploit-DB.com RSS Feed https://ift.tt/2NfzTHj
via IFTTT
Nagios XI 5.5.6 – Magpie_debug.php Root Remote Code Execution (Metasploit)
from Exploit-DB.com RSS Feed https://ift.tt/31Y0sUA
via IFTTT
Mozilla Spidermonkey – IonMonkey ‘Array.prototype.pop’ Type Confusion
from Exploit-DB.com RSS Feed https://ift.tt/2Net4Wr
via IFTTT
WordPress Plugin Live Chat Unlimited 2.8.3 – Cross-Site Scripting
from Exploit-DB.com RSS Feed https://ift.tt/2X0aUrb
via IFTTT
WordPress Plugin iLive 1.0.4 – Cross-Site Scripting
from Exploit-DB.com RSS Feed https://ift.tt/2X9g1tZ
via IFTTT