[webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
https://www.exploit-db.com/exploits/42372/?rss
REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
https://www.exploit-db.com/exploits/42372/?rss
[dos] WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
https://www.exploit-db.com/exploits/42363/?rss
WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
https://www.exploit-db.com/exploits/42363/?rss
[webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
https://www.exploit-db.com/exploits/42371/?rss
REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
https://www.exploit-db.com/exploits/42371/?rss
[dos] WebKit - 'WebCore::Node::nextSibling' Use-After-Free
WebKit - 'WebCore::Node::nextSibling' Use-After-Free
https://www.exploit-db.com/exploits/42362/?rss
WebKit - 'WebCore::Node::nextSibling' Use-After-Free
https://www.exploit-db.com/exploits/42362/?rss
[remote] VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command Execution (Metasploit)
VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command Execution (Metasploit)
https://www.exploit-db.com/exploits/42370/?rss
VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command Execution (Metasploit)
https://www.exploit-db.com/exploits/42370/?rss
[dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
[remote] IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/42369/?rss
IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/42369/?rss
[dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
[local] Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
https://www.exploit-db.com/exploits/42368/?rss
Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
https://www.exploit-db.com/exploits/42368/?rss
[webapps] PaulShop - SQL Injection / Cross-Site Scripting
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
[dos] WebKit - 'WebCore::getCachedWrapper' Use-After-Free
WebKit - 'WebCore::getCachedWrapper' Use-After-Free
https://www.exploit-db.com/exploits/42367/?rss
WebKit - 'WebCore::getCachedWrapper' Use-After-Free
https://www.exploit-db.com/exploits/42367/?rss
[dos] WebKit - 'WebCore::Node::getFlag' Use-After-Free
WebKit - 'WebCore::Node::getFlag' Use-After-Free
https://www.exploit-db.com/exploits/42366/?rss
WebKit - 'WebCore::Node::getFlag' Use-After-Free
https://www.exploit-db.com/exploits/42366/?rss
[dos] WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
https://www.exploit-db.com/exploits/42365/?rss
WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
https://www.exploit-db.com/exploits/42365/?rss
[dos] WebKit - 'WebCore::InputType::element' Use-After-Free
WebKit - 'WebCore::InputType::element' Use-After-Free
https://www.exploit-db.com/exploits/42364/?rss
WebKit - 'WebCore::InputType::element' Use-After-Free
https://www.exploit-db.com/exploits/42364/?rss
[dos] WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
https://www.exploit-db.com/exploits/42363/?rss
WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
https://www.exploit-db.com/exploits/42363/?rss
[dos] WebKit - 'WebCore::Node::nextSibling' Use-After-Free
WebKit - 'WebCore::Node::nextSibling' Use-After-Free
https://www.exploit-db.com/exploits/42362/?rss
WebKit - 'WebCore::Node::nextSibling' Use-After-Free
https://www.exploit-db.com/exploits/42362/?rss
[dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
[dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
[webapps] PaulShop - SQL Injection / Cross-Site Scripting
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
[local] AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/42385/?rss
AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/42385/?rss