[dos] Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow
Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow
https://www.exploit-db.com/exploits/43355/?rss
Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow
https://www.exploit-db.com/exploits/43355/?rss
[dos] Zoom Linux Client 2.0.106600.0904 - Command Injection
Zoom Linux Client 2.0.106600.0904 - Command Injection
https://www.exploit-db.com/exploits/43354/?rss
Zoom Linux Client 2.0.106600.0904 - Command Injection
https://www.exploit-db.com/exploits/43354/?rss
[remote] Outlook for Android - Attachment Download Directory Traversal
Outlook for Android - Attachment Download Directory Traversal
https://www.exploit-db.com/exploits/43353/?rss
Outlook for Android - Attachment Download Directory Traversal
https://www.exploit-db.com/exploits/43353/?rss
[dos] CDex 1.96 - Buffer Overflow
CDex 1.96 - Buffer Overflow
https://www.exploit-db.com/exploits/43352/?rss
CDex 1.96 - Buffer Overflow
https://www.exploit-db.com/exploits/43352/?rss
[local] Linux kernel < 4.10.15 - Race Condition Privilege Escalation
Linux kernel < 4.10.15 - Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/43345/?rss
Linux kernel < 4.10.15 - Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/43345/?rss
[webapps] vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
https://www.exploit-db.com/exploits/43362/?rss
vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion
https://www.exploit-db.com/exploits/43362/?rss
[webapps] vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/43361/?rss
vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/43361/?rss
[remote] GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
https://www.exploit-db.com/exploits/43360/?rss
GoAhead httpd 2.5 < 3.6.5 - 'LD_PRELOAD' Remote Code Execution
https://www.exploit-db.com/exploits/43360/?rss
[local] Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
https://www.exploit-db.com/exploits/43359/?rss
Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape
https://www.exploit-db.com/exploits/43359/?rss
[webapps] Linksys WVBR0 - 'User-Agent' Remote Command Injection
Linksys WVBR0 - 'User-Agent' Remote Command Injection
https://www.exploit-db.com/exploits/43363/?rss
Linksys WVBR0 - 'User-Agent' Remote Command Injection
https://www.exploit-db.com/exploits/43363/?rss
[webapps] Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
https://www.exploit-db.com/exploits/43365/?rss
Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
https://www.exploit-db.com/exploits/43365/?rss
[webapps] BrightSign Digital Signage - Multiple Vulnerablities
BrightSign Digital Signage - Multiple Vulnerablities
https://www.exploit-db.com/exploits/43364/?rss
BrightSign Digital Signage - Multiple Vulnerablities
https://www.exploit-db.com/exploits/43364/?rss
[remote] Jenkins - XStream Groovy classpath Deserialization (Metasploit)
Jenkins - XStream Groovy classpath Deserialization (Metasploit)
https://www.exploit-db.com/exploits/43375/?rss
Jenkins - XStream Groovy classpath Deserialization (Metasploit)
https://www.exploit-db.com/exploits/43375/?rss
[remote] Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
https://www.exploit-db.com/exploits/43374/?rss
Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
https://www.exploit-db.com/exploits/43374/?rss
[dos] Intel Content Protection HECI Service - Type Confusion Privilege Escalation
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
[dos] Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
[dos] Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss
[dos] Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
https://www.exploit-db.com/exploits/43370/?rss
Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
https://www.exploit-db.com/exploits/43370/?rss
[dos] Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
https://www.exploit-db.com/exploits/43369/?rss
Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
https://www.exploit-db.com/exploits/43369/?rss
[dos] Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
https://www.exploit-db.com/exploits/43368/?rss
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
https://www.exploit-db.com/exploits/43368/?rss