[webapps] Drupal < 7.58 - 'drupalgeddon3' Authenticated Remote Code Execution (PoC)
Drupal < 7.58 - 'drupalgeddon3' Authenticated Remote Code Execution (PoC)
https://www.exploit-db.com/exploits/44542/?rss
Drupal < 7.58 - 'drupalgeddon3' Authenticated Remote Code Execution (PoC)
https://www.exploit-db.com/exploits/44542/?rss
[webapps] Jfrog Artifactory < 4.16 - Unauthenticated Arbitrary File Upload / Remote Command Execution
Jfrog Artifactory < 4.16 - Unauthenticated Arbitrary File Upload / Remote Command Execution
https://www.exploit-db.com/exploits/44543/?rss
Jfrog Artifactory < 4.16 - Unauthenticated Arbitrary File Upload / Remote Command Execution
https://www.exploit-db.com/exploits/44543/?rss
[webapps] WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion
WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion
https://www.exploit-db.com/exploits/44544/?rss
WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion
https://www.exploit-db.com/exploits/44544/?rss
[webapps] SickRage < v2018.03.09 - Clear-Text Credentials HTTP Response
SickRage < v2018.03.09 - Clear-Text Credentials HTTP Response
https://www.exploit-db.com/exploits/44545/?rss
SickRage < v2018.03.09 - Clear-Text Credentials HTTP Response
https://www.exploit-db.com/exploits/44545/?rss
[webapps] October CMS User Plugin v1.4.5 - Persistent Cross-Site Scripting
October CMS User Plugin v1.4.5 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44546/?rss
October CMS User Plugin v1.4.5 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44546/?rss
[webapps] TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Unauthenticated Remote Reboot
TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Unauthenticated Remote Reboot
https://www.exploit-db.com/exploits/44550/?rss
TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Unauthenticated Remote Reboot
https://www.exploit-db.com/exploits/44550/?rss
[local] Allok AVI to DVD SVCD VCD Converter 4.0.1217 - Buffer Overflow (SEH)
Allok AVI to DVD SVCD VCD Converter 4.0.1217 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44549/?rss
Allok AVI to DVD SVCD VCD Converter 4.0.1217 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44549/?rss
[webapps] GitList 0.6 - Unauthenticated Remote Code Execution
GitList 0.6 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/44548/?rss
GitList 0.6 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/44548/?rss
[webapps] MyBB Threads to Link Plugin 1.3 - Cross-Site Scripting
MyBB Threads to Link Plugin 1.3 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44547/?rss
MyBB Threads to Link Plugin 1.3 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44547/?rss
[webapps] Frog CMS 0.9.5 - Persistent Cross-Site Scripting
Frog CMS 0.9.5 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44551/?rss
Frog CMS 0.9.5 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44551/?rss
[remote] Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution
Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution
https://www.exploit-db.com/exploits/44552/?rss
Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution
https://www.exploit-db.com/exploits/44552/?rss
[remote] Android Bluetooth - 'Blueborne' Information Leak (2)
Android Bluetooth - 'Blueborne' Information Leak (2)
https://www.exploit-db.com/exploits/44555/?rss
Android Bluetooth - 'Blueborne' Information Leak (2)
https://www.exploit-db.com/exploits/44555/?rss
[remote] Android Bluetooth - 'Blueborne' Information Leak (1)
Android Bluetooth - 'Blueborne' Information Leak (1)
https://www.exploit-db.com/exploits/44554/?rss
Android Bluetooth - 'Blueborne' Information Leak (1)
https://www.exploit-db.com/exploits/44554/?rss
[remote] Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/44556/?rss
Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/44556/?rss
[dos] Navicat < 12.0.27 - Oracle Connection Overflow
Navicat < 12.0.27 - Oracle Connection Overflow
https://www.exploit-db.com/exploits/44558/?rss
Navicat < 12.0.27 - Oracle Connection Overflow
https://www.exploit-db.com/exploits/44558/?rss
[remote] Drupal < 7.58 - 'Drupalgeddon3' Authenticated Remote Code (Metasploit)
Drupal < 7.58 - 'Drupalgeddon3' Authenticated Remote Code (Metasploit)
https://www.exploit-db.com/exploits/44557/?rss
Drupal < 7.58 - 'Drupalgeddon3' Authenticated Remote Code (Metasploit)
https://www.exploit-db.com/exploits/44557/?rss
[webapps] Nagios XI 5.2.[6-9], 5.3, 5.4 - Chained Remote Root
Nagios XI 5.2.[6-9], 5.3, 5.4 - Chained Remote Root
https://www.exploit-db.com/exploits/44560/?rss
Nagios XI 5.2.[6-9], 5.3, 5.4 - Chained Remote Root
https://www.exploit-db.com/exploits/44560/?rss
[webapps] WordPress Plugin Form Maker 1.12.20 - CSV Injection
WordPress Plugin Form Maker 1.12.20 - CSV Injection
https://www.exploit-db.com/exploits/44559/?rss
WordPress Plugin Form Maker 1.12.20 - CSV Injection
https://www.exploit-db.com/exploits/44559/?rss
[dos] macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules
macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules
https://www.exploit-db.com/exploits/44562/?rss
macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules
https://www.exploit-db.com/exploits/44562/?rss
[dos] macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules
macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules
https://www.exploit-db.com/exploits/44561/?rss
macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules
https://www.exploit-db.com/exploits/44561/?rss