Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[remote] IBM QRadar SIEM - Unauthenticated Remote Code Execution (Metasploit)
IBM QRadar SIEM - Unauthenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45005/?rss
[webapps] Dicoogle PACS 2.5.0 - Directory Traversal
Dicoogle PACS 2.5.0 - Directory Traversal
https://www.exploit-db.com/exploits/45007/?rss
[local] Linux Kernel < 4.13.9 (Ubuntu 16.04/Fedora 27) - Local Privilege Escalation
Linux Kernel < 4.13.9 (Ubuntu 16.04/Fedora 27) - Local Privilege Escalation
https://www.exploit-db.com/exploits/45010/?rss
[dos] Microsoft Edge Chakra JIT - BoundFunction::NewInstance Out-of-Bounds Read
Microsoft Edge Chakra JIT - BoundFunction::NewInstance Out-of-Bounds Read
https://www.exploit-db.com/exploits/45012/?rss
[dos] Microsoft Edge Chakra JIT - Out-of-Bounds Reads/Writes
Microsoft Edge Chakra JIT - Out-of-Bounds Reads/Writes
https://www.exploit-db.com/exploits/45011/?rss
[dos] Microsoft Edge Chakra JIT - Type Confusion with Hoisted SetConcatStrMultiItemBE Instructions
Microsoft Edge Chakra JIT - Type Confusion with Hoisted SetConcatStrMultiItemBE Instructions
https://www.exploit-db.com/exploits/45013/?rss
[dos] G DATA Total Security 25.4.0.3 - Activex Buffer Overflow
G DATA Total Security 25.4.0.3 - Activex Buffer Overflow
https://www.exploit-db.com/exploits/45017/?rss
[webapps] Zeta Producer Desktop CMS 14.2.0 - Remote Code Execution / Local File Disclosure
Zeta Producer Desktop CMS 14.2.0 - Remote Code Execution / Local File Disclosure
https://www.exploit-db.com/exploits/45016/?rss
[webapps] QNAP Qcenter Virtual Appliance - Multiple Vulnerabilities
QNAP Qcenter Virtual Appliance - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/45015/?rss
[webapps] WAGO e!DISPLAY 7300T - Multiple Vulnerabilities
WAGO e!DISPLAY 7300T - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/45014/?rss
[remote] phpMyAdmin - Authenticated Remote Code Execution (Metasploit)
phpMyAdmin - Authenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45020/?rss
[remote] Apache CouchDB - Arbitrary Command Execution (Metasploit)
Apache CouchDB - Arbitrary Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45019/?rss
[remote] Manage Engine Exchange Reporter Plus - Unauthenticated RCE (Metasploit)
Manage Engine Exchange Reporter Plus - Unauthenticated RCE (Metasploit)
https://www.exploit-db.com/exploits/45018/?rss
[webapps] Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/45022/?rss
[remote] Hadoop YARN ResourceManager - Unauthenticated Command Execution (Metasploit)
Hadoop YARN ResourceManager - Unauthenticated Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45025/?rss
[local] Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)
Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)
https://www.exploit-db.com/exploits/45024/?rss
[webapps] Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection
Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection
https://www.exploit-db.com/exploits/45027/?rss
[local] Microsoft Enterprise Mode Site List Manager - XML External Entity Injection
Microsoft Enterprise Mode Site List Manager - XML External Entity Injection
https://www.exploit-db.com/exploits/45026/?rss
[dos] Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass
https://www.exploit-db.com/exploits/45033/?rss
[dos] macOS/iOS - JavaScript Injection Bug in OfficeImporter
macOS/iOS - JavaScript Injection Bug in OfficeImporter
https://www.exploit-db.com/exploits/45032/?rss