Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[webapps] Joomla! Component My Projects 2.0 - SQL Injection
Joomla! Component My Projects 2.0 - SQL Injection
https://www.exploit-db.com/exploits/43358/?rss
[webapps] Joomla! Component User Bench 1.0 - 'userid' SQL Injection
Joomla! Component User Bench 1.0 - 'userid' SQL Injection
https://www.exploit-db.com/exploits/43357/?rss
[remote] Western Digital MyCloud - 'multi_uploadify' File Upload (Metasploit)
Western Digital MyCloud - 'multi_uploadify' File Upload (Metasploit)
https://www.exploit-db.com/exploits/43356/?rss
[dos] Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow
Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow
https://www.exploit-db.com/exploits/43355/?rss
[dos] Zoom Linux Client 2.0.106600.0904 - Command Injection
Zoom Linux Client 2.0.106600.0904 - Command Injection
https://www.exploit-db.com/exploits/43354/?rss
[remote] Outlook for Android - Attachment Download Directory Traversal
Outlook for Android - Attachment Download Directory Traversal
https://www.exploit-db.com/exploits/43353/?rss
[dos] CDex 1.96 - Buffer Overflow
CDex 1.96 - Buffer Overflow
https://www.exploit-db.com/exploits/43352/?rss
[local] Linux kernel < 4.10.15 - Race Condition Privilege Escalation
Linux kernel < 4.10.15 - Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/43345/?rss
[webapps] vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
https://www.exploit-db.com/exploits/43362/?rss
[webapps] vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/43361/?rss
[remote] GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
https://www.exploit-db.com/exploits/43360/?rss
[local] Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
https://www.exploit-db.com/exploits/43359/?rss
[webapps] Linksys WVBR0 - 'User-Agent' Remote Command Injection
Linksys WVBR0 - 'User-Agent' Remote Command Injection
https://www.exploit-db.com/exploits/43363/?rss
[webapps] Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
https://www.exploit-db.com/exploits/43365/?rss
[webapps] BrightSign Digital Signage - Multiple Vulnerablities
BrightSign Digital Signage - Multiple Vulnerablities
https://www.exploit-db.com/exploits/43364/?rss
[remote] Jenkins - XStream Groovy classpath Deserialization (Metasploit)
Jenkins - XStream Groovy classpath Deserialization (Metasploit)
https://www.exploit-db.com/exploits/43375/?rss
[remote] Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
https://www.exploit-db.com/exploits/43374/?rss
[dos] Intel Content Protection HECI Service - Type Confusion Privilege Escalation
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
[dos] Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
[dos] Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss