<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Exploit-DB.com RSS Feed</title>
        <link>https://www.exploit-db.com</link>
        <atom:link href="https://www.exploit-db.com/rss.xml" rel="self" type="application/rss+xml" />
        <language>en-us</language>
        <description>The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.</description>
        <pubDate>Mon, 13 Apr 2026 22:20:03 +0000</pubDate>
        <lastBuildDate>Mon, 13 Apr 2026 22:20:03 +0000</lastBuildDate>
        <copyright></copyright>
         <item>
            <title>[local] NetBT e-Fatura - Privilege Escalation</title>
            <link>https://www.exploit-db.com/exploits/52509</link>
            <description>NetBT e-Fatura - Privilege Escalation</description>
            <pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52509</guid>
        </item>
         <item>
            <title>[webapps] D-Link DIR-650IN - Authenticated Command Injection</title>
            <link>https://www.exploit-db.com/exploits/52508</link>
            <description>D-Link DIR-650IN - Authenticated Command Injection</description>
            <pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52508</guid>
        </item>
         <item>
            <title>[webapps] React Server 19.2.0 - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52506</link>
            <description>React Server 19.2.0 - Remote Code Execution</description>
            <pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52506</guid>
        </item>
         <item>
            <title>[webapps] RomM  4.4.0 -  XSS_CSRF Chain</title>
            <link>https://www.exploit-db.com/exploits/52505</link>
            <description>RomM  4.4.0 -  XSS_CSRF Chain</description>
            <pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52505</guid>
        </item>
         <item>
            <title>[webapps] Jumbo Website Manager  - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52504</link>
            <description>Jumbo Website Manager  - Remote Code Execution</description>
            <pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52504</guid>
        </item>
         <item>
            <title>[local] ZSH 5.9 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52503</link>
            <description>ZSH 5.9 - RCE</description>
            <pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52503</guid>
        </item>
         <item>
            <title>[webapps] FortiWeb  8.0.2 - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52502</link>
            <description>FortiWeb  8.0.2 - Remote Code Execution</description>
            <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52502</guid>
        </item>
         <item>
            <title>[local] 7-Zip 24.00 - Directory Traversal</title>
            <link>https://www.exploit-db.com/exploits/52501</link>
            <description>7-Zip 24.00 - Directory Traversal</description>
            <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52501</guid>
        </item>
         <item>
            <title>[webapps] xibocms 3.3.4 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52500</link>
            <description>xibocms 3.3.4 - RCE</description>
            <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52500</guid>
        </item>
         <item>
            <title>[local] SQLite 3.50.1 - Heap Overflow</title>
            <link>https://www.exploit-db.com/exploits/52499</link>
            <description>SQLite 3.50.1 - Heap Overflow</description>
            <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52499</guid>
        </item>
         <item>
            <title>[local] Microsoft MMC MSC EvilTwin - Local Admin Creation</title>
            <link>https://www.exploit-db.com/exploits/52498</link>
            <description>Microsoft MMC MSC EvilTwin - Local Admin Creation</description>
            <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52498</guid>
        </item>
         <item>
            <title>[webapps] Horilla v1.3 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52497</link>
            <description>Horilla v1.3 - RCE</description>
            <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52497</guid>
        </item>
         <item>
            <title>[local] is-localhost-ip 2.0.0 - SSRF</title>
            <link>https://www.exploit-db.com/exploits/52496</link>
            <description>is-localhost-ip 2.0.0 - SSRF</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52496</guid>
        </item>
         <item>
            <title>[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass</title>
            <link>https://www.exploit-db.com/exploits/52495</link>
            <description>Fortinet FortiWeb v8.0.1 - Auth Bypass</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52495</guid>
        </item>
         <item>
            <title>[local] Windows Kernel - Elevation of Privilege</title>
            <link>https://www.exploit-db.com/exploits/52494</link>
            <description>Windows Kernel - Elevation of Privilege</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52494</guid>
        </item>
         <item>
            <title>[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</title>
            <link>https://www.exploit-db.com/exploits/52493</link>
            <description>Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52493</guid>
        </item>
         <item>
            <title>[webapps] ASP.net  8.0.10 - Bypass</title>
            <link>https://www.exploit-db.com/exploits/52492</link>
            <description>ASP.net  8.0.10 - Bypass</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52492</guid>
        </item>
         <item>
            <title>[webapps] Grafana 11.6.0 - SSRF</title>
            <link>https://www.exploit-db.com/exploits/52491</link>
            <description>Grafana 11.6.0 - SSRF</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52491</guid>
        </item>
         <item>
            <title>[webapps] Zhiyuan OA - arbitrary file upload leading</title>
            <link>https://www.exploit-db.com/exploits/52490</link>
            <description>Zhiyuan OA - arbitrary file upload leading</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52490</guid>
        </item>
         <item>
            <title>[webapps] WBCE CMS 1.6.4 - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52489</link>
            <description>WBCE CMS 1.6.4 - Remote Code Execution</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52489</guid>
        </item>
         <item>
            <title>[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52488</link>
            <description>RiteCMS 3.1.0 - Authenticated Remote Code Execution</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52488</guid>
        </item>
         <item>
            <title>[webapps] WordPress  Madara - Local File Inclusion</title>
            <link>https://www.exploit-db.com/exploits/52487</link>
            <description>WordPress  Madara - Local File Inclusion</description>
            <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52487</guid>
        </item>
         <item>
            <title>[webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution</title>
            <link>https://www.exploit-db.com/exploits/52486</link>
            <description>WordPress Backup Migration 1.3.7 - Remote Command Execution</description>
            <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52486</guid>
        </item>
         <item>
            <title>[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning</title>
            <link>https://www.exploit-db.com/exploits/52485</link>
            <description>mailcow 2025-01a - Host Header Password Reset Poisoning</description>
            <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52485</guid>
        </item>
         <item>
            <title>[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow</title>
            <link>https://www.exploit-db.com/exploits/52484</link>
            <description>Easy File Sharing Web Server v7.2 - Buffer Overflow</description>
            <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52484</guid>
        </item>
         <item>
            <title>[webapps] WeGIA 3.5.0 - SQL Injection</title>
            <link>https://www.exploit-db.com/exploits/52483</link>
            <description>WeGIA 3.5.0 - SQL Injection</description>
            <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52483</guid>
        </item>
         <item>
            <title>[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)</title>
            <link>https://www.exploit-db.com/exploits/52482</link>
            <description>Boss Mini v1.4.0 - Local File Inclusion (LFI)</description>
            <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52482</guid>
        </item>
         <item>
            <title>[webapps] motionEye 0.43.1b4 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52481</link>
            <description>motionEye 0.43.1b4 - RCE</description>
            <pubDate>Wed, 11 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52481</guid>
        </item>
         <item>
            <title>[remote] Windows 10.0.17763.7009 - spoofing vulnerability</title>
            <link>https://www.exploit-db.com/exploits/52480</link>
            <description>Windows 10.0.17763.7009 - spoofing vulnerability</description>
            <pubDate>Wed, 11 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52480</guid>
        </item>
         <item>
            <title>[local] glibc 2.38 - Buffer Overflow</title>
            <link>https://www.exploit-db.com/exploits/52479</link>
            <description>glibc 2.38 - Buffer Overflow</description>
            <pubDate>Wed, 11 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52479</guid>
        </item>
         <item>
            <title>[remote] windows 10/11 - NTLM Hash Disclosure Spoofing</title>
            <link>https://www.exploit-db.com/exploits/52478</link>
            <description>windows 10/11 - NTLM Hash Disclosure Spoofing</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52478</guid>
        </item>
         <item>
            <title>[remote] Redis 8.0.2 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52477</link>
            <description>Redis 8.0.2 - RCE</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52477</guid>
        </item>
         <item>
            <title>[webapps] OctoPrint 1.11.2 - File Upload</title>
            <link>https://www.exploit-db.com/exploits/52476</link>
            <description>OctoPrint 1.11.2 - File Upload</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52476</guid>
        </item>
         <item>
            <title>[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE</title>
            <link>https://www.exploit-db.com/exploits/52475</link>
            <description>Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52475</guid>
        </item>
         <item>
            <title>[webapps] aiohttp 3.9.1 - directory traversal PoC</title>
            <link>https://www.exploit-db.com/exploits/52474</link>
            <description>aiohttp 3.9.1 - directory traversal PoC</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52474</guid>
        </item>
         <item>
            <title>[webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52473</link>
            <description>FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52473</guid>
        </item>
         <item>
            <title>[local] Docker Desktop 4.44.3 - Unauthenticated  API Exposure</title>
            <link>https://www.exploit-db.com/exploits/52472</link>
            <description>Docker Desktop 4.44.3 - Unauthenticated  API Exposure</description>
            <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52472</guid>
        </item>
         <item>
            <title>[webapps] Piranha CMS 12.0 - Stored XSS in Text Block</title>
            <link>https://www.exploit-db.com/exploits/52471</link>
            <description>Piranha CMS 12.0 - Stored XSS in Text Block</description>
            <pubDate>Mon, 02 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52471</guid>
        </item>
         <item>
            <title>[webapps] RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)</title>
            <link>https://www.exploit-db.com/exploits/52470</link>
            <description>RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)</description>
            <pubDate>Mon, 02 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52470</guid>
        </item>
         <item>
            <title>[hardware] D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)</title>
            <link>https://www.exploit-db.com/exploits/52469</link>
            <description>D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)</description>
            <pubDate>Mon, 02 Feb 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52469</guid>
        </item>
         <item>
            <title>[webapps] RPi-Jukebox-RFID 2.8.0 - Remote Command Execution</title>
            <link>https://www.exploit-db.com/exploits/52468</link>
            <description>RPi-Jukebox-RFID 2.8.0 - Remote Command Execution</description>
            <pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52468</guid>
        </item>
         <item>
            <title>[webapps] Siklu EtherHaul Series EH-8010 - Arbitrary File Upload</title>
            <link>https://www.exploit-db.com/exploits/52467</link>
            <description>Siklu EtherHaul Series EH-8010 - Arbitrary File Upload</description>
            <pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52467</guid>
        </item>
         <item>
            <title>[webapps] Siklu EtherHaul Series EH-8010 - Remote Command Execution</title>
            <link>https://www.exploit-db.com/exploits/52466</link>
            <description>Siklu EtherHaul Series EH-8010 - Remote Command Execution</description>
            <pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52466</guid>
        </item>
         <item>
            <title>[webapps] WordPress Quiz Maker 6.7.0.56 - SQL Injection</title>
            <link>https://www.exploit-db.com/exploits/52465</link>
            <description>WordPress Quiz Maker 6.7.0.56 - SQL Injection</description>
            <pubDate>Thu, 25 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52465</guid>
        </item>
         <item>
            <title>[webapps] Chained Quiz  1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie</title>
            <link>https://www.exploit-db.com/exploits/52464</link>
            <description>Chained Quiz  1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie</description>
            <pubDate>Thu, 25 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52464</guid>
        </item>
         <item>
            <title>[webapps] FreeBSD rtsold 15.x - Remote Code Execution via DNSSL</title>
            <link>https://www.exploit-db.com/exploits/52463</link>
            <description>FreeBSD rtsold 15.x - Remote Code Execution via DNSSL</description>
            <pubDate>Thu, 25 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52463</guid>
        </item>
         <item>
            <title>[webapps] Summar Employee Portal  3.98.0 - Authenticated SQL Injection</title>
            <link>https://www.exploit-db.com/exploits/52462</link>
            <description>Summar Employee Portal  3.98.0 - Authenticated SQL Injection</description>
            <pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52462</guid>
        </item>
         <item>
            <title>[webapps] esm-dev 136 - Path Traversal</title>
            <link>https://www.exploit-db.com/exploits/52461</link>
            <description>esm-dev 136 - Path Traversal</description>
            <pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52461</guid>
        </item>
         <item>
            <title>[webapps] Pluck 4.7.7-dev2 -  PHP Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52460</link>
            <description>Pluck 4.7.7-dev2 -  PHP Code Execution</description>
            <pubDate>Mon, 08 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52460</guid>
        </item>
         <item>
            <title>[webapps] phpMyFAQ 2.9.8 - Cross-Site Request Forgery(CSRF)</title>
            <link>https://www.exploit-db.com/exploits/52459</link>
            <description>phpMyFAQ 2.9.8 - Cross-Site Request Forgery(CSRF)</description>
            <pubDate>Wed, 03 Dec 2025 00:00:00 +0000</pubDate>
            <guid isPermaLink='true'>https://www.exploit-db.com/exploits/52459</guid>
        </item>
    </channel>
</rss>