[webapps] vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
https://www.exploit-db.com/exploits/43362/?rss
vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
https://www.exploit-db.com/exploits/43362/?rss
[webapps] vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/43361/?rss
vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/43361/?rss
[remote] GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
https://www.exploit-db.com/exploits/43360/?rss
GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
https://www.exploit-db.com/exploits/43360/?rss
[local] Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
https://www.exploit-db.com/exploits/43359/?rss
Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
https://www.exploit-db.com/exploits/43359/?rss
[webapps] Linksys WVBR0 - 'User-Agent' Remote Command Injection
Linksys WVBR0 - 'User-Agent' Remote Command Injection
https://www.exploit-db.com/exploits/43363/?rss
Linksys WVBR0 - 'User-Agent' Remote Command Injection
https://www.exploit-db.com/exploits/43363/?rss
[webapps] Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
https://www.exploit-db.com/exploits/43365/?rss
Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
https://www.exploit-db.com/exploits/43365/?rss
[webapps] BrightSign Digital Signage - Multiple Vulnerablities
BrightSign Digital Signage - Multiple Vulnerablities
https://www.exploit-db.com/exploits/43364/?rss
BrightSign Digital Signage - Multiple Vulnerablities
https://www.exploit-db.com/exploits/43364/?rss
[remote] Jenkins - XStream Groovy classpath Deserialization (Metasploit)
Jenkins - XStream Groovy classpath Deserialization (Metasploit)
https://www.exploit-db.com/exploits/43375/?rss
Jenkins - XStream Groovy classpath Deserialization (Metasploit)
https://www.exploit-db.com/exploits/43375/?rss
[remote] Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
https://www.exploit-db.com/exploits/43374/?rss
Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
https://www.exploit-db.com/exploits/43374/?rss
[dos] Intel Content Protection HECI Service - Type Confusion Privilege Escalation
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
[dos] Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
[dos] Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss
[dos] Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
https://www.exploit-db.com/exploits/43370/?rss
Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
https://www.exploit-db.com/exploits/43370/?rss
[dos] Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
https://www.exploit-db.com/exploits/43369/?rss
Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
https://www.exploit-db.com/exploits/43369/?rss
[dos] Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
https://www.exploit-db.com/exploits/43368/?rss
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
https://www.exploit-db.com/exploits/43368/?rss
[dos] Microsoft Windows - 'jscript!NameTbl::GetValDef' Use-After-Free
Microsoft Windows - 'jscript!NameTbl::GetValDef' Use-After-Free
https://www.exploit-db.com/exploits/43367/?rss
Microsoft Windows - 'jscript!NameTbl::GetValDef' Use-After-Free
https://www.exploit-db.com/exploits/43367/?rss
[local] TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC)
TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC)
https://www.exploit-db.com/exploits/43366/?rss
TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC)
https://www.exploit-db.com/exploits/43366/?rss
[remote] Samsung Internet Browser - SOP Bypass (Metasploit)
Samsung Internet Browser - SOP Bypass (Metasploit)
https://www.exploit-db.com/exploits/43376/?rss
Samsung Internet Browser - SOP Bypass (Metasploit)
https://www.exploit-db.com/exploits/43376/?rss
[dos] Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
https://www.exploit-db.com/exploits/43380/?rss
Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
https://www.exploit-db.com/exploits/43380/?rss
[webapps] BEIMS ContractorWeb 5.18.0.0 - SQL Injection
BEIMS ContractorWeb 5.18.0.0 - SQL Injection
https://www.exploit-db.com/exploits/43379/?rss
BEIMS ContractorWeb 5.18.0.0 - SQL Injection
https://www.exploit-db.com/exploits/43379/?rss
[webapps] Ability Mail Server 3.3.2 - Cross-Site Scripting
Ability Mail Server 3.3.2 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43378/?rss
Ability Mail Server 3.3.2 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43378/?rss