bwall

15 exploits Active since May 2014
EIP-2026-114322 EXPLOITDB perl WORKING POC
WordPress Theme Diary/Notebook Site5 - Email Spoofing
EIP-2026-114306 EXPLOITDB python WORKING POC
WordPress Theme Archin 3.2 - Configuration Access
EIP-2026-111659 EXPLOITDB ruby WORKING POC
Ra1NX PHP Bot - pubcall Authentication Bypass Remote Code Execution (Metasploit)
EIP-2026-109238 EXPLOITDB python WORKING POC
Madness Pro 1.14 - SQL Injection
EIP-2026-109237 EXPLOITDB python WORKING POC
Madness Pro 1.14 - Persistent Cross-Site Scripting
EIP-2026-105487 EXPLOITDB python WORKING POC
Bitbot (C2 Web Panel) - 'gate2.php' Multiple Vulnerabilities
EIP-2026-104778 EXPLOITDB ruby WORKING POC
STUNSHELL (Web Shell) - Remote Code Execution (Metasploit)
EIP-2026-104748 EXPLOITDB perl WORKING POC
pBot - Remote Code Execution
EIP-2026-104776 EXPLOITDB ruby WORKING POC
STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit)
EIP-2026-104777 EXPLOITDB ruby WORKING POC
STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit)
EIP-2026-104779 EXPLOITDB ruby WORKING POC
STUNSHELL (Web Shell) - Remote Code Execution (Metasploit)
EIP-2026-104221 EXPLOITDB python WORKING POC
Dexter (CasinoLoader) Panel - SQL Injection
EIP-2026-104115 EXPLOITDB ruby WORKING POC
v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
EIP-2026-104114 EXPLOITDB ruby WORKING POC
v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
CVE-2014-0749 EXPLOITDB python STUB
Adaptivecomputing Torque Resource Manager - Memory Corruption
Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.