Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[remote] HPE Intelligent Management Center (iMC) 7.2 (E0403P10) - Code Execution
HPE Intelligent Management Center (iMC) 7.2 (E0403P10) - Code Execution
https://www.exploit-db.com/exploits/44073/?rss
[dos] Microsoft Edge Chakra JIT - Array Type Confusion via InitProto Instructions
Microsoft Edge Chakra JIT - Array Type Confusion via InitProto Instructions
https://www.exploit-db.com/exploits/44078/?rss
[dos] Microsoft Edge Chakra JIT - ImplicitCallFlags Checks Bypass
Microsoft Edge Chakra JIT - ImplicitCallFlags Checks Bypass
https://www.exploit-db.com/exploits/44077/?rss
[dos] Microsoft Edge Chakra JIT - Memory Corruption
Microsoft Edge Chakra JIT - Memory Corruption
https://www.exploit-db.com/exploits/44076/?rss
[dos] Microsoft Edge Chakra JIT - 'GlobOpt::OptTagChecks' Must Consider IsLoopPrePass Properly (2)
Microsoft Edge Chakra JIT - 'GlobOpt::OptTagChecks' Must Consider IsLoopPrePass Properly (2)
https://www.exploit-db.com/exploits/44075/?rss
[dos] Microsoft Edge Chakra JIT - 'LdThis' Type Confusion
Microsoft Edge Chakra JIT - 'LdThis' Type Confusion
https://www.exploit-db.com/exploits/44081/?rss
[dos] Microsoft Edge Chakra JIT - 'NewScObjectNoCtor' Array Type Confusion
Microsoft Edge Chakra JIT - 'NewScObjectNoCtor' Array Type Confusion
https://www.exploit-db.com/exploits/44080/?rss
[dos] Microsoft Edge Chakra JIT - 'Array.prototype.reverse' Array Type Confusion
Microsoft Edge Chakra JIT - 'Array.prototype.reverse' Array Type Confusion
https://www.exploit-db.com/exploits/44079/?rss
[dos] Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow
Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow
https://www.exploit-db.com/exploits/44084/?rss
[dos] Pdfium - Out-of-Bounds Read with Shading Pattern Backed by Pattern Colorspace
Pdfium - Out-of-Bounds Read with Shading Pattern Backed by Pattern Colorspace
https://www.exploit-db.com/exploits/44083/?rss
[dos] Pdfium - Pattern Shading Integer Overflows
Pdfium - Pattern Shading Integer Overflows
https://www.exploit-db.com/exploits/44082/?rss
[webapps] Oracle Primavera P6 Enterprise Project Portfolio Management - HTTP Response Splitting
Oracle Primavera P6 Enterprise Project Portfolio Management - HTTP Response Splitting
https://www.exploit-db.com/exploits/44141/?rss
[webapps] PSNews Website 1.0.0 - 'Keywords' SQL Injection
PSNews Website 1.0.0 - 'Keywords' SQL Injection
https://www.exploit-db.com/exploits/44140/?rss
[papers] MySQL UDF Exploitation
MySQL UDF Exploitation
http://www.exploit-db.com/docs/english/44139-mysql-udf-exploitation.pdf?rss
[webapps] PHIMS - Hospital Management Information System - 'Password' SQL Injection
PHIMS - Hospital Management Information System - 'Password' SQL Injection
https://www.exploit-db.com/exploits/44138/?rss
[webapps] Front Accounting ERP 2.4.3 - Cross-Site Request Forgery
Front Accounting ERP 2.4.3 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44137/?rss
[webapps] Joomla! Component Saxum Picker 3.2.10 - SQL Injection
Joomla! Component Saxum Picker 3.2.10 - SQL Injection
https://www.exploit-db.com/exploits/44136/?rss
[webapps] Joomla! Component SquadManagement 1.0.3 - SQL Injection
Joomla! Component SquadManagement 1.0.3 - SQL Injection
https://www.exploit-db.com/exploits/44135/?rss
[webapps] Joomla! Component Saxum Numerology 3.0.4 - SQL Injection
Joomla! Component Saxum Numerology 3.0.4 - SQL Injection
https://www.exploit-db.com/exploits/44134/?rss
[webapps] Joomla! Component Saxum Astro 4.0.14 - SQL Injection
Joomla! Component Saxum Astro 4.0.14 - SQL Injection
https://www.exploit-db.com/exploits/44133/?rss