[dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
[remote] IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/42369/?rss
IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/42369/?rss
[dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
[local] Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
https://www.exploit-db.com/exploits/42368/?rss
Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
https://www.exploit-db.com/exploits/42368/?rss
[webapps] PaulShop - SQL Injection / Cross-Site Scripting
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
[dos] WebKit - 'WebCore::getCachedWrapper' Use-After-Free
WebKit - 'WebCore::getCachedWrapper' Use-After-Free
https://www.exploit-db.com/exploits/42367/?rss
WebKit - 'WebCore::getCachedWrapper' Use-After-Free
https://www.exploit-db.com/exploits/42367/?rss
[dos] WebKit - 'WebCore::Node::getFlag' Use-After-Free
WebKit - 'WebCore::Node::getFlag' Use-After-Free
https://www.exploit-db.com/exploits/42366/?rss
WebKit - 'WebCore::Node::getFlag' Use-After-Free
https://www.exploit-db.com/exploits/42366/?rss
[dos] WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
https://www.exploit-db.com/exploits/42365/?rss
WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
https://www.exploit-db.com/exploits/42365/?rss
[dos] WebKit - 'WebCore::InputType::element' Use-After-Free
WebKit - 'WebCore::InputType::element' Use-After-Free
https://www.exploit-db.com/exploits/42364/?rss
WebKit - 'WebCore::InputType::element' Use-After-Free
https://www.exploit-db.com/exploits/42364/?rss
[dos] WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
https://www.exploit-db.com/exploits/42363/?rss
WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
https://www.exploit-db.com/exploits/42363/?rss
[dos] WebKit - 'WebCore::Node::nextSibling' Use-After-Free
WebKit - 'WebCore::Node::nextSibling' Use-After-Free
https://www.exploit-db.com/exploits/42362/?rss
WebKit - 'WebCore::Node::nextSibling' Use-After-Free
https://www.exploit-db.com/exploits/42362/?rss
[dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free
https://www.exploit-db.com/exploits/42361/?rss
[dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free
https://www.exploit-db.com/exploits/42360/?rss
[webapps] PaulShop - SQL Injection / Cross-Site Scripting
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
PaulShop - SQL Injection / Cross-Site Scripting
https://www.exploit-db.com/exploits/42359/?rss
[local] AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/42385/?rss
AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/42385/?rss
[local] AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/42385/?rss
AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/42385/?rss
[webapps] Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
https://www.exploit-db.com/exploits/42387/?rss
Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
https://www.exploit-db.com/exploits/42387/?rss
[webapps] Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
https://www.exploit-db.com/exploits/42387/?rss
Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
https://www.exploit-db.com/exploits/42387/?rss
[webapps] FortiOS < 5.6.0 - Cross-Site Scripting
FortiOS < 5.6.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/42388/?rss
FortiOS < 5.6.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/42388/?rss
[dos] libjpeg-turbo 1.5.1 - Denial of Service
libjpeg-turbo 1.5.1 - Denial of Service
https://www.exploit-db.com/exploits/42391/?rss
libjpeg-turbo 1.5.1 - Denial of Service
https://www.exploit-db.com/exploits/42391/?rss