[webapps] Linksys E Series - Multiple Vulnerabilities
Linksys E Series - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/43013/?rss
Linksys E Series - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/43013/?rss
[webapps] Wordpress Plugin Car Park Booking - SQL Injection
Wordpress Plugin Car Park Booking - SQL Injection
https://www.exploit-db.com/exploits/43012/?rss
Wordpress Plugin Car Park Booking - SQL Injection
https://www.exploit-db.com/exploits/43012/?rss
[webapps] Career Portal 1.0 - SQL Injection
Career Portal 1.0 - SQL Injection
https://www.exploit-db.com/exploits/43011/?rss
Career Portal 1.0 - SQL Injection
https://www.exploit-db.com/exploits/43011/?rss
[dos] Linux Kernel - 'AF_PACKET' Use-After-Free
Linux Kernel - 'AF_PACKET' Use-After-Free
https://www.exploit-db.com/exploits/43010/?rss
Linux Kernel - 'AF_PACKET' Use-After-Free
https://www.exploit-db.com/exploits/43010/?rss
[webapps] Apache Solr 7.0.1 - XML External Entity Expansion / Remote Code Execution
Apache Solr 7.0.1 - XML External Entity Expansion / Remote Code Execution
https://www.exploit-db.com/exploits/43009/?rss
Apache Solr 7.0.1 - XML External Entity Expansion / Remote Code Execution
https://www.exploit-db.com/exploits/43009/?rss
[remote] Tomcat - Remote Code Execution via JSP Upload Bypass (Metasploit)
Tomcat - Remote Code Execution via JSP Upload Bypass (Metasploit)
https://www.exploit-db.com/exploits/43008/?rss
Tomcat - Remote Code Execution via JSP Upload Bypass (Metasploit)
https://www.exploit-db.com/exploits/43008/?rss
[local] Shadowsocks - Log File Command Execution
Shadowsocks - Log File Command Execution
https://www.exploit-db.com/exploits/43007/?rss
Shadowsocks - Log File Command Execution
https://www.exploit-db.com/exploits/43007/?rss
[local] shadowsocks-libev 3.1.0 - Command Execution
shadowsocks-libev 3.1.0 - Command Execution
https://www.exploit-db.com/exploits/43006/?rss
shadowsocks-libev 3.1.0 - Command Execution
https://www.exploit-db.com/exploits/43006/?rss
[webapps] OpenText Documentum Content Server - Arbitrary File Download
OpenText Documentum Content Server - Arbitrary File Download
https://www.exploit-db.com/exploits/43005/?rss
OpenText Documentum Content Server - Arbitrary File Download
https://www.exploit-db.com/exploits/43005/?rss
[webapps] OpenText Documentum Content Server - dmr_content Privilege Escalation
OpenText Documentum Content Server - dmr_content Privilege Escalation
https://www.exploit-db.com/exploits/43004/?rss
OpenText Documentum Content Server - dmr_content Privilege Escalation
https://www.exploit-db.com/exploits/43004/?rss
[webapps] OpenText Documentum Content Server - Arbitrary File Download Privilege Escalation
OpenText Documentum Content Server - Arbitrary File Download Privilege Escalation
https://www.exploit-db.com/exploits/43003/?rss
OpenText Documentum Content Server - Arbitrary File Download Privilege Escalation
https://www.exploit-db.com/exploits/43003/?rss
[webapps] OpenText Documentum Content Server - Privilege Escalation
OpenText Documentum Content Server - Privilege Escalation
https://www.exploit-db.com/exploits/43002/?rss
OpenText Documentum Content Server - Privilege Escalation
https://www.exploit-db.com/exploits/43002/?rss
[dos] Microsoft Windows - 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memory Disclosure
Microsoft Windows - 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memory Disclosure
https://www.exploit-db.com/exploits/43001/?rss
Microsoft Windows - 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memory Disclosure
https://www.exploit-db.com/exploits/43001/?rss
[dos] Microsoft Edge Chakra JIT - 'RegexHelper::StringReplace' Must Call the Callback Function with Updating ImplicitCallFlags
Microsoft Edge Chakra JIT - 'RegexHelper::StringReplace' Must Call the Callback Function with Updating ImplicitCallFlags
https://www.exploit-db.com/exploits/43000/?rss
Microsoft Edge Chakra JIT - 'RegexHelper::StringReplace' Must Call the Callback Function with Updating ImplicitCallFlags
https://www.exploit-db.com/exploits/43000/?rss
[dos] Microsoft Edge Chakra - Accesses to Uninitialized Pointers in 'StackScriptFunction::BoxState::Box'
Microsoft Edge Chakra - Accesses to Uninitialized Pointers in 'StackScriptFunction::BoxState::Box'
https://www.exploit-db.com/exploits/42999/?rss
Microsoft Edge Chakra - Accesses to Uninitialized Pointers in 'StackScriptFunction::BoxState::Box'
https://www.exploit-db.com/exploits/42999/?rss
[dos] Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns
Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns
https://www.exploit-db.com/exploits/42998/?rss
Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns
https://www.exploit-db.com/exploits/42998/?rss
[dos] Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass
Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass
https://www.exploit-db.com/exploits/42997/?rss
Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass
https://www.exploit-db.com/exploits/42997/?rss
[remote] Apple iOS 10.2 (14C92) - Remote Code Execution
Apple iOS 10.2 (14C92) - Remote Code Execution
https://www.exploit-db.com/exploits/42996/?rss
Apple iOS 10.2 (14C92) - Remote Code Execution
https://www.exploit-db.com/exploits/42996/?rss
[dos] Microsoft Excel - OLE Arbitrary Code Execution
Microsoft Excel - OLE Arbitrary Code Execution
https://www.exploit-db.com/exploits/42995/?rss
Microsoft Excel - OLE Arbitrary Code Execution
https://www.exploit-db.com/exploits/42995/?rss
[dos] Microsoft Office Groove - 'Workspace Shortcut' Arbitrary Code Execution
Microsoft Office Groove - 'Workspace Shortcut' Arbitrary Code Execution
https://www.exploit-db.com/exploits/42994/?rss
Microsoft Office Groove - 'Workspace Shortcut' Arbitrary Code Execution
https://www.exploit-db.com/exploits/42994/?rss