Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[dos] Android - Inter-Process munmap due to Race Condition in ashmem
Android - Inter-Process munmap due to Race Condition in ashmem
https://www.exploit-db.com/exploits/43464/?rss
[dos] Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure
Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure
https://www.exploit-db.com/exploits/43470/?rss
[dos] Microsoft Edge Chakra JIT - Escape Analysis Bug
Microsoft Edge Chakra JIT - Escape Analysis Bug
https://www.exploit-db.com/exploits/43469/?rss
[dos] Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43468/?rss
[dos] Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches
Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches
https://www.exploit-db.com/exploits/43467/?rss
[dos] Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions
Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions
https://www.exploit-db.com/exploits/43466/?rss
[dos] Microsoft Windows - 'nt!NtQuerySystemInformation (information class 138, QueryMemoryTopologyInformation)' Kernel Pool Memory Disclosure
Microsoft Windows - 'nt!NtQuerySystemInformation (information class 138, QueryMemoryTopologyInformation)' Kernel Pool Memory Disclosure
https://www.exploit-db.com/exploits/43471/?rss
[remote] Commvault Communications Service (cvd) - Command Injection (Metasploit)
Commvault Communications Service (cvd) - Command Injection (Metasploit)
https://www.exploit-db.com/exploits/43472/?rss
[webapps] Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/43474/?rss
[shellcode] Linux/x86 - execve /bin/dash Shellcode (30 bytes)
Linux/x86 - execve /bin/dash Shellcode (30 bytes)
https://www.exploit-db.com/exploits/43476/?rss
[webapps] Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
https://www.exploit-db.com/exploits/43475/?rss
[webapps] Muviko 1.1 - SQL Injection
Muviko 1.1 - SQL Injection
https://www.exploit-db.com/exploits/43477/?rss
[remote] DiskBoss Enterprise 8.8.16 - Buffer Overflow
DiskBoss Enterprise 8.8.16 - Buffer Overflow
https://www.exploit-db.com/exploits/43478/?rss
[webapps] WordPress Plugin Events Calendar - 'event_id' SQL Injection
WordPress Plugin Events Calendar - 'event_id' SQL Injection
https://www.exploit-db.com/exploits/43479/?rss
[shellcode] Alpha - setuid() Shellcode (156 bytes)
Alpha - setuid() Shellcode (156 bytes)
https://www.exploit-db.com/exploits/43482/?rss
[shellcode] Alpha - execve() Shellcode (112 bytes)
Alpha - execve() Shellcode (112 bytes)
https://www.exploit-db.com/exploits/43481/?rss
[shellcode] Alpha - /bin/sh Shellcode (80 bytes)
Alpha - /bin/sh Shellcode (80 bytes)
https://www.exploit-db.com/exploits/43480/?rss
[shellcode] BSD/x86 - setreuid(geteuid(), geteuid()) + execve("/bin/sh") Shellcode (36 bytes)
BSD/x86 - setreuid(geteuid(), geteuid()) + execve("/bin/sh") Shellcode (36 bytes)
https://www.exploit-db.com/exploits/43483/?rss
[webapps] WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery
WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43487/?rss
[webapps] WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation
WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation
https://www.exploit-db.com/exploits/43486/?rss