<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"
  xmlns:dc="http://purl.org/dc/elements/1.1/">
  <author>
    <name>Marshall Whittaker</name>
  </author>
  <id>https://oxasploits.com/exploits/</id>
  <title>The Oxasploits Exploit Feed</title>
  <updated>2026-03-06T13:33:19-05:00</updated>
  <entry>
    <id>https://oxasploits.com/exploits/dbman-HPe-iMC-PLAT-remote-powershell-RCE-sploit.pl/</id>
    <link href="https://oxasploits.com/exploits/dbman-HPe-iMC-PLAT-remote-powershell-RCE-sploit.pl/"/>
    <title>Exploit for getting Administrator remote code exec on HP iMC PLATs dbman.exe with command injection</title>
    <updated>2022-04-02T00:00:00-04:00</updated>
    <dc:date>2022-04-02T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/aol-binary-file-planting-8.0.1.5.sh/</id>
    <link href="https://oxasploits.com/exploits/aol-binary-file-planting-8.0.1.5.sh/"/>
    <title>Binary file planting exploit via AIM advertising code bug</title>
    <updated>2014-09-01T00:00:00-04:00</updated>
    <dc:date>2014-09-01T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2023-48251-boche-netrunner-hardcoded-password-rce.rb/</id>
    <link href="https://oxasploits.com/exploits/cve-2023-48251-boche-netrunner-hardcoded-password-rce.rb/"/>
    <title>A hardcoded root password was used in the firmware for the Boche Netrunner.</title>
    <updated>2024-05-22T00:00:00-04:00</updated>
    <dc:date>2024-05-22T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2023-38941-django-sspanel-good-create-rce.rb/</id>
    <link href="https://oxasploits.com/exploits/cve-2023-38941-django-sspanel-good-create-rce.rb/"/>
    <title>A code injection vuln exploited in the good_create function of Django SSPanel</title>
    <updated>2024-08-02T00:00:00-04:00</updated>
    <dc:date>2024-08-02T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2026-24479-hustoj-problem-import-rce.rb/</id>
    <link href="https://oxasploits.com/exploits/cve-2026-24479-hustoj-problem-import-rce.rb/"/>
    <title>In HustOJ &lt; 26.01.24 A crafted zip file can traverse into the web root and drop php files, leading to RCE</title>
    <updated>2026-02-10T00:00:00-05:00</updated>
    <dc:date>2026-02-10T00:00:00-05:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2019-12881-linux-kernel-i915-drm-exploit.c/</id>
    <link href="https://oxasploits.com/exploits/cve-2019-12881-linux-kernel-i915-drm-exploit.c/"/>
    <title>i915 Driver null pointer derefrence exploit for the Linux kernel</title>
    <updated>2019-04-06T00:00:00-04:00</updated>
    <dc:date>2019-04-06T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/makeitrain-bitcoin-core-crash-dumps.sh/</id>
    <link href="https://oxasploits.com/exploits/makeitrain-bitcoin-core-crash-dumps.sh/"/>
    <title>Bitcoin service core dumps contain wallet.dats in memory</title>
    <updated>2019-11-03T00:00:00-04:00</updated>
    <dc:date>2019-11-03T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2025-6514-mcp-remote-401-to-auth-routine-rce.rb/</id>
    <link href="https://oxasploits.com/exploits/cve-2025-6514-mcp-remote-401-to-auth-routine-rce.rb/"/>
    <title>MCP-remote when dominos tumble from a 401 unauthorized to RCE in the authentication subroutine</title>
    <updated>2025-07-21T00:00:00-04:00</updated>
    <dc:date>2025-07-21T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/mount-under-2.42-dup-uuid.sh/</id>
    <link href="https://oxasploits.com/exploits/mount-under-2.42-dup-uuid.sh/"/>
    <title>Exploit for mount that abuses UUIDs and filesystems created and edited via uesr</title>
    <updated>2025-04-08T00:00:00-04:00</updated>
    <dc:date>2025-04-08T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2024-23824-nginxui-api-injection.rb/</id>
    <link href="https://oxasploits.com/exploits/cve-2024-23824-nginxui-api-injection.rb/"/>
    <title>API injection allows for editing config and spawning a root shell on the webterm, which can be hooked with websockets.</title>
    <updated>2024-03-09T00:00:00-05:00</updated>
    <dc:date>2024-03-09T00:00:00-05:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2010-2626-perl-pipe-exploit.pl/</id>
    <link href="https://oxasploits.com/exploits/cve-2010-2626-perl-pipe-exploit.pl/"/>
    <title>Exploit general perl pipe RCE</title>
    <updated>2010-05-14T00:00:00-04:00</updated>
    <dc:date>2010-05-14T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/pk5001z00pin-router-exploit.c/</id>
    <link href="https://oxasploits.com/exploits/pk5001z00pin-router-exploit.c/"/>
    <title>A known credential pk5001z router RCE exploit</title>
    <updated>2015-09-14T00:00:00-04:00</updated>
    <dc:date>2015-09-14T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2021-3560-polkit-race-condition-LPE.sh/</id>
    <link href="https://oxasploits.com/exploits/cve-2021-3560-polkit-race-condition-LPE.sh/"/>
    <title>A polkit race condition turned LPE exploit</title>
    <updated>2021-01-23T00:00:00-05:00</updated>
    <dc:date>2021-01-23T00:00:00-05:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2025-55182-RSC-deserialization-to-rce-react2shell.rb/</id>
    <link href="https://oxasploits.com/exploits/cve-2025-55182-RSC-deserialization-to-rce-react2shell.rb/"/>
    <title>A deserialization vulnerability exists in RSC Next.js that leads to RCE</title>
    <updated>2025-12-30T00:00:00-05:00</updated>
    <dc:date>2025-12-30T00:00:00-05:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/sshd9.2-woahisread.sh/</id>
    <link href="https://oxasploits.com/exploits/sshd9.2-woahisread.sh/"/>
    <title>Adding a symbolic link under the banner directive in the sshd config file can give you read to any file as root.</title>
    <updated>2018-02-05T00:00:00-05:00</updated>
    <dc:date>2018-02-05T00:00:00-05:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2018-17336-udisks-2.8.0-format-string-DoS.sh/</id>
    <link href="https://oxasploits.com/exploits/cve-2018-17336-udisks-2.8.0-format-string-DoS.sh/"/>
    <title>A UDisks2 2.8.0 Format string denail of servie exploit</title>
    <updated>2018-07-07T00:00:00-04:00</updated>
    <dc:date>2018-07-07T00:00:00-04:00</dc:date>
  </entry>
  <entry>
    <id>https://oxasploits.com/exploits/cve-2006-3392-webmin-session-hijacked-cookie-via-dir-traversal-rce.sh/</id>
    <link href="https://oxasploits.com/exploits/cve-2006-3392-webmin-session-hijacked-cookie-via-dir-traversal-rce.sh/"/>
    <title>Exploit for getting RCE with a dir traversal and session hijacked cookie on Webmin &amp;lt1.29</title>
    <updated>2016-12-19T00:00:00-05:00</updated>
    <dc:date>2016-12-19T00:00:00-05:00</dc:date>
  </entry>
  <dc:date>2026-03-06T13:33:19-05:00</dc:date>
</feed>
