[remote] Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution
Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution
https://www.exploit-db.com/exploits/44552/?rss
Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution
https://www.exploit-db.com/exploits/44552/?rss
[remote] Android Bluetooth - 'Blueborne' Information Leak (2)
Android Bluetooth - 'Blueborne' Information Leak (2)
https://www.exploit-db.com/exploits/44555/?rss
Android Bluetooth - 'Blueborne' Information Leak (2)
https://www.exploit-db.com/exploits/44555/?rss
[remote] Android Bluetooth - 'Blueborne' Information Leak (1)
Android Bluetooth - 'Blueborne' Information Leak (1)
https://www.exploit-db.com/exploits/44554/?rss
Android Bluetooth - 'Blueborne' Information Leak (1)
https://www.exploit-db.com/exploits/44554/?rss
[remote] Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/44556/?rss
Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/44556/?rss
[dos] Navicat < 12.0.27 - Oracle Connection Overflow
Navicat < 12.0.27 - Oracle Connection Overflow
https://www.exploit-db.com/exploits/44558/?rss
Navicat < 12.0.27 - Oracle Connection Overflow
https://www.exploit-db.com/exploits/44558/?rss
[remote] Drupal < 7.58 - 'Drupalgeddon3' Authenticated Remote Code (Metasploit)
Drupal < 7.58 - 'Drupalgeddon3' Authenticated Remote Code (Metasploit)
https://www.exploit-db.com/exploits/44557/?rss
Drupal < 7.58 - 'Drupalgeddon3' Authenticated Remote Code (Metasploit)
https://www.exploit-db.com/exploits/44557/?rss
[webapps] Nagios XI 5.2.[6-9], 5.3, 5.4 - Chained Remote Root
Nagios XI 5.2.[6-9], 5.3, 5.4 - Chained Remote Root
https://www.exploit-db.com/exploits/44560/?rss
Nagios XI 5.2.[6-9], 5.3, 5.4 - Chained Remote Root
https://www.exploit-db.com/exploits/44560/?rss
[webapps] WordPress Plugin Form Maker 1.12.20 - CSV Injection
WordPress Plugin Form Maker 1.12.20 - CSV Injection
https://www.exploit-db.com/exploits/44559/?rss
WordPress Plugin Form Maker 1.12.20 - CSV Injection
https://www.exploit-db.com/exploits/44559/?rss
[dos] macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules
macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules
https://www.exploit-db.com/exploits/44562/?rss
macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules
https://www.exploit-db.com/exploits/44562/?rss
[dos] macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules
macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules
https://www.exploit-db.com/exploits/44561/?rss
macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules
https://www.exploit-db.com/exploits/44561/?rss
[webapps] Wordpress Responsive Cookie Consent v1.5 / v1.6 / v1.7 - Authenticated Persistent Cross-Site Scripting
Wordpress Responsive Cookie Consent v1.5 / v1.6 / v1.7 - Authenticated Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44563/?rss
Wordpress Responsive Cookie Consent v1.5 / v1.6 / v1.7 - Authenticated Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44563/?rss
[webapps] IceWarp Mail Server < 11.1.1 - Local File Inclusion
IceWarp Mail Server < 11.1.1 - Local File Inclusion
https://www.exploit-db.com/exploits/44587/?rss
IceWarp Mail Server < 11.1.1 - Local File Inclusion
https://www.exploit-db.com/exploits/44587/?rss
[local] Windows WMI - Recieve Notification Exploit (Metasploit)
Windows WMI - Recieve Notification Exploit (Metasploit)
https://www.exploit-db.com/exploits/44586/?rss
Windows WMI - Recieve Notification Exploit (Metasploit)
https://www.exploit-db.com/exploits/44586/?rss
[webapps] WordPress Plugin WF Cookie Consent 1.1.3 - Cross-Site Scripting
WordPress Plugin WF Cookie Consent 1.1.3 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44585/?rss
WordPress Plugin WF Cookie Consent 1.1.3 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44585/?rss
[remote] Google Chrome V8 - Object Allocation Size Integer Overflow
Google Chrome V8 - Object Allocation Size Integer Overflow
https://www.exploit-db.com/exploits/44584/?rss
Google Chrome V8 - Object Allocation Size Integer Overflow
https://www.exploit-db.com/exploits/44584/?rss
[webapps] CSP MySQL User Manager 2.3.1 - Authentication Bypass
CSP MySQL User Manager 2.3.1 - Authentication Bypass
https://www.exploit-db.com/exploits/44589/?rss
CSP MySQL User Manager 2.3.1 - Authentication Bypass
https://www.exploit-db.com/exploits/44589/?rss
[local] DeviceLock Plug and Play Auditor 5.72 - Unicode Buffer Overflow (SEH)
DeviceLock Plug and Play Auditor 5.72 - Unicode Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44590/?rss
DeviceLock Plug and Play Auditor 5.72 - Unicode Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/44590/?rss
[webapps] WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
https://www.exploit-db.com/exploits/44595/?rss
WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
https://www.exploit-db.com/exploits/44595/?rss
[shellcode] Linux/x86 - execve(/bin/sh) NOT Encoded Shellcode (27 bytes)
Linux/x86 - execve(/bin/sh) NOT Encoded Shellcode (27 bytes)
https://www.exploit-db.com/exploits/44594/?rss
Linux/x86 - execve(/bin/sh) NOT Encoded Shellcode (27 bytes)
https://www.exploit-db.com/exploits/44594/?rss