• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

local

  1. 1

    Exploits osTicket 1.11 Cross Site Scripting / Local File Inclusion

    osTicket version 1.11 suffers from cross site scripting and local file inclusion vulnerabilities. View the full article
  2. 1

    Exploits FTPShell Server 6.83 Account Name To Ban Local Buffer Overflow

    FTPShell Server version 6.83 Account name to ban local buffer overflow exploit. View the full article
  3. 1

    Exploits FTPShell Server 6.83 Virtual Path Mapping Local Buffer Overflow

    FTPShell Server version 6.83 Virtual Path Mapping local buffer overflow exploit. View the full article
  4. 1

    Exploits CARPE (DIEM) Apache 2.4.x Local Privilege Escalation

    Apache versions 2.4.17 up to 2.4.38 apache2ctl graceful logrotate local privilege escalation exploit. View the full article
  5. 1

    Exploits River Past Cam Do 3.7.6 Local Buffer Overflow

    River Past Cam Do version 3.7.6 suffers from an activation code local buffer overflow vulnerability. View the full article
  6. 1

    Exploits WordPress Form Maker 1.13.2 Cross Site Request Forgery / Local File Inclusion

    WordPress Form Maker plugin version 1.13.2 suffers from cross site request forgery and local file inclusion vulnerabilities. View the full article
  7. 1

    Exploits phpFileManager 1.7.8 Local File Inclusion

    phpFileManager version 1.7.8 suffers from a local file inclusion vulnerability. View the full article
  8. 1

    Exploits WordPress Anti-Malware Security And Brute-Force Firewall 4.18.63 Local File Inclusion

    WordPress Anti-Malware Security and Brute-Force Firewall plugin version 4.18.63 suffers from a local file inclusion vulnerability. View the full article
  9. 1

    Exploits Thomson Reuters Concourse And Firm Central Local File Inclusion / Directory Traversal

    Thomson Reuters Concourse and Firm Central versions prior to 2.13.0097 suffer from directory traversal and local file inclusion vulnerabilities. View the full article
  10. 1

    Exploits WordPress Loco Translate 2.2.1 Local File Inclusion

    WordPress Loco Translate plugin version 2.2.1 suffers from a local file inclusion vulnerability. View the full article
  11. 1

    Exploits Microsoft Windows Win32k CVE-2019-0808 Local Privilege Escalation

    Microsoft Windows Win32k local privilege escalation proof of concept exploit. View the full article
  12. 1

    Exploits X-NetStat Pro 5.63 Local Buffer Overflow

    X-NetStat Pro version 5.63 local buffer overflow exploit with egghunter. View the full article
  13. 1

    Exploits NetShareWatcher 1.5.8.0 Local SEH Buffer Overflow

    NetShareWatcher version 1.5.8.0 local SEH buffer overflow exploit. View the full article
  14. 1

    Exploits Advanced Host Monitor 11.92 Beta Local Buffer Overflow

    Advanced Host Monitor version 11.92 Beta suffers from a buffer overflow vulnerability. View the full article
  15. 1

    Exploits WordPress GraceMedia Media Player 1.0 Local File Inclusion

    WordPress GraceMedia Media Player plugin version 1.0 suffers from a local file inclusion vulnerability. View the full article
  16. 1

    Exploits McAfee ePO 5.9.1 Registered Executable Local Access Bypass

    McAfee ePO version 5.9.1 suffers from a local access bypass vulnerability. View the full article
  17. F B I

    Exploits Microsoft Windows 10 (Build 17134) - Local Privilege Escalation (UAC Bypass)

    Hidden content
  18. 1

    Exploits Apple macOS 10.13.5 Local Privilege Escalation

    Apple macOS version 10.13.5 local privilege escalation exploit. View the full article
  19. 1

    Exploits Social Bookmarking Software 1.2.3 Local File Inclusion

    Social Bookmarking Software version 1.2.3 suffers from a local file inclusion vulnerability. View the full article
  20. 1

    Exploits snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation

    This exploit bypasses access control checks to use a restricted API function (POST /v2/snaps) of the local snapd service. This allows the installation of arbitrary snaps. Snaps in "devmode" bypass the sandbox and may include an "install hook" that is run in the context of root at install time...
Back
Top