[webapps] VirtueMart 3.1.14 - Persistent Cross-Site Scripting
VirtueMart 3.1.14 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44625/?rss
VirtueMart 3.1.14 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/44625/?rss
[webapps] MyBB Admin Notes Plugin v1.1 - Cross-Site Request Forgery
MyBB Admin Notes Plugin v1.1 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44624/?rss
MyBB Admin Notes Plugin v1.1 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44624/?rss
[webapps] Rockwell Scada System 27.011 - Cross-Site Scripting
Rockwell Scada System 27.011 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44626/?rss
Rockwell Scada System 27.011 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44626/?rss
[webapps] Multiplayer BlackJack Online Casino Game 2.5 - Persistent Cross-Site scripting
Multiplayer BlackJack Online Casino Game 2.5 - Persistent Cross-Site scripting
https://www.exploit-db.com/exploits/44627/?rss
Multiplayer BlackJack Online Casino Game 2.5 - Persistent Cross-Site scripting
https://www.exploit-db.com/exploits/44627/?rss
[webapps] Horse Market Sell & Rent Portal Script 1.5.7 - Cross-Site Request Forgery
Horse Market Sell & Rent Portal Script 1.5.7 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44628/?rss
Horse Market Sell & Rent Portal Script 1.5.7 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44628/?rss
[dos] WhatsApp 2.18.31 - Memory Corruption
WhatsApp 2.18.31 - Memory Corruption
https://www.exploit-db.com/exploits/44629/?rss
WhatsApp 2.18.31 - Memory Corruption
https://www.exploit-db.com/exploits/44629/?rss
[webapps] totemomail Encryption Gateway 6.0.0 Build 371 - Cross-Site Request Forgery
totemomail Encryption Gateway 6.0.0 Build 371 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44631/?rss
totemomail Encryption Gateway 6.0.0 Build 371 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44631/?rss
[local] Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation
Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation
https://www.exploit-db.com/exploits/44630/?rss
Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation
https://www.exploit-db.com/exploits/44630/?rss
[webapps] RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting
RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting
https://www.exploit-db.com/exploits/44634/?rss
RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting
https://www.exploit-db.com/exploits/44634/?rss
[local] Libuser - roothelper Privilege Escalation (Metasploit)
Libuser - roothelper Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/44633/?rss
Libuser - roothelper Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/44633/?rss
[webapps] WordPress Plugin Metronet Tag Manager 1.2.7 - Cross-Site Request Forgery
WordPress Plugin Metronet Tag Manager 1.2.7 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44632/?rss
WordPress Plugin Metronet Tag Manager 1.2.7 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44632/?rss
[remote] Inteno IOPSYS 2.0 - 4.2.0 p910nd - Remote Command Execution
Inteno IOPSYS 2.0 - 4.2.0 p910nd - Remote Command Execution
https://www.exploit-db.com/exploits/44635/?rss
Inteno IOPSYS 2.0 - 4.2.0 p910nd - Remote Command Execution
https://www.exploit-db.com/exploits/44635/?rss
[webapps] NodAPS 4.0 - SQL injection / Cross-Site Request Forgery
NodAPS 4.0 - SQL injection / Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44636/?rss
NodAPS 4.0 - SQL injection / Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44636/?rss
[webapps] Intelbras NCLOUD 300 1.0 - Authentication bypass
Intelbras NCLOUD 300 1.0 - Authentication bypass
https://www.exploit-db.com/exploits/44637/?rss
Intelbras NCLOUD 300 1.0 - Authentication bypass
https://www.exploit-db.com/exploits/44637/?rss
[remote] Nanopool Claymore Dual Miner 7.3 - Remote Code Execution
Nanopool Claymore Dual Miner 7.3 - Remote Code Execution
https://www.exploit-db.com/exploits/44638/?rss
Nanopool Claymore Dual Miner 7.3 - Remote Code Execution
https://www.exploit-db.com/exploits/44638/?rss
[webapps] SuperCom Online Shopping Ecommerce Cart 1 - Persistent Cross-Site scripting / Cross site request forgery / Authentication bypass
SuperCom Online Shopping Ecommerce Cart 1 - Persistent Cross-Site scripting / Cross site request forgery / Authentication bypass
https://www.exploit-db.com/exploits/44639/?rss
SuperCom Online Shopping Ecommerce Cart 1 - Persistent Cross-Site scripting / Cross site request forgery / Authentication bypass
https://www.exploit-db.com/exploits/44639/?rss
[webapps] Powerlogic/Schneider Electric IONXXXX Series - Cross-Site Request Forgery
Powerlogic/Schneider Electric IONXXXX Series - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44640/?rss
Powerlogic/Schneider Electric IONXXXX Series - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44640/?rss
[dos] Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in compat adjtimex Syscall
Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in compat adjtimex Syscall
https://www.exploit-db.com/exploits/44641/?rss
Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in compat adjtimex Syscall
https://www.exploit-db.com/exploits/44641/?rss
[remote] Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44643/?rss
Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44643/?rss
[remote] Jenkins CLI - HTTP Java Deserialization (Metasploit)
Jenkins CLI - HTTP Java Deserialization (Metasploit)
https://www.exploit-db.com/exploits/44642/?rss
Jenkins CLI - HTTP Java Deserialization (Metasploit)
https://www.exploit-db.com/exploits/44642/?rss