[dos] NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46176
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46176
Exploit Database
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC). CVE-2019-6444 . dos exploit for Linux platform
[dos] NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46175
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46175
Exploit Database
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC). CVE-2019-6443 . dos exploit for Linux platform
[webapps] Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
https://www.exploit-db.com/exploits/46180
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
https://www.exploit-db.com/exploits/46180
Exploit Database
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset. CVE-2019-6441 . webapps exploit for Hardware platform
[webapps] GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
https://www.exploit-db.com/exploits/46179
GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
https://www.exploit-db.com/exploits/46179
Exploit Database
GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal
GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal. CVE-2019-6275CVE-2019-6274CVE-2019-6273CVE-2019-6272 . webapps exploit for Hardware platform
[dos] WebKit JSC JIT - GetIndexedPropertyStorage Use-After-Free
WebKit JSC JIT - GetIndexedPropertyStorage Use-After-Free
https://www.exploit-db.com/exploits/46183
WebKit JSC JIT - GetIndexedPropertyStorage Use-After-Free
https://www.exploit-db.com/exploits/46183
Exploit Database
WebKit JSC JIT - GetIndexedPropertyStorage Use-After-Free
WebKit JSC JIT - GetIndexedPropertyStorage Use-After-Free. CVE-2018-4442 . dos exploit for Multiple platform
[webapps] Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
https://www.exploit-db.com/exploits/46182
Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
https://www.exploit-db.com/exploits/46182
Exploit Database
Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit. CVE-2018-9206 . webapps exploit for PHP platform
[dos] Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length
Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length
https://www.exploit-db.com/exploits/46181
Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length
https://www.exploit-db.com/exploits/46181
Exploit Database
Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length
Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length.. dos exploit for Multiple platform
[local] Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation
Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation
https://www.exploit-db.com/exploits/46185
Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation
https://www.exploit-db.com/exploits/46185
Exploit Database
Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation
Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation. CVE-2019-0555 . local exploit for Windows platform
[dos] Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free
Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free
https://www.exploit-db.com/exploits/46184
Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free
https://www.exploit-db.com/exploits/46184
Exploit Database
Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free
Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free. CVE-2019-0570 . dos exploit for Windows platform
[local] blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46186
blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46186
Exploit Database
blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit). CVE-2015-8612 . local exploit for Linux platform
[local] Microsoft Windows CONTACT - Remote Code Execution
Microsoft Windows CONTACT - Remote Code Execution
https://www.exploit-db.com/exploits/46188
Microsoft Windows CONTACT - Remote Code Execution
https://www.exploit-db.com/exploits/46188
Exploit Database
Microsoft Windows CONTACT - Remote Code Execution
Microsoft Windows CONTACT - Remote Code Execution.. local exploit for Windows platform
[webapps] Oracle Reports Developer Component 12.2.1.3 - Cross-site Scripting
Oracle Reports Developer Component 12.2.1.3 - Cross-site Scripting
https://www.exploit-db.com/exploits/46187
Oracle Reports Developer Component 12.2.1.3 - Cross-site Scripting
https://www.exploit-db.com/exploits/46187
Exploit Database
Oracle Reports Developer Component 12.2.1.3 - Cross-site Scripting
Oracle Reports Developer Component 12.2.1.3 - Cross-site Scripting. CVE-2019-2413 . webapps exploit for Multiple platform
[local] Check Point ZoneAlarm 8.8.1.110 - Local Privilege Escalation
Check Point ZoneAlarm 8.8.1.110 - Local Privilege Escalation
https://www.exploit-db.com/exploits/46189
Check Point ZoneAlarm 8.8.1.110 - Local Privilege Escalation
https://www.exploit-db.com/exploits/46189
Exploit Database
Check Point ZoneAlarm 8.8.1.110 - Local Privilege Escalation
Check Point ZoneAlarm 8.8.1.110 - Local Privilege Escalation.. local exploit for Windows platform
[webapps] OpenMRS Platform < 2.24.0 - Insecure Object Deserialization
OpenMRS Platform < 2.24.0 - Insecure Object Deserialization
https://www.exploit-db.com/exploits/46327
OpenMRS Platform < 2.24.0 - Insecure Object Deserialization
https://www.exploit-db.com/exploits/46327
Exploit Database
OpenMRS Platform < 2.24.0 - Insecure Object Deserialization
OpenMRS Platform < 2.24.0 - Insecure Object Deserialization. CVE-2018-19276 . webapps exploit for Java platform
[webapps] Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/46326
Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/46326
Exploit Database
Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery. CVE-2019-7391 . webapps exploit for Hardware platform
[webapps] devolo dLAN 550 duo+ Starter Kit - Remote Code Execution
devolo dLAN 550 duo+ Starter Kit - Remote Code Execution
https://www.exploit-db.com/exploits/46325
devolo dLAN 550 duo+ Starter Kit - Remote Code Execution
https://www.exploit-db.com/exploits/46325
Exploit Database
devolo dLAN 550 duo+ Starter Kit - Remote Code Execution
devolo dLAN 550 duo+ Starter Kit - Remote Code Execution.. webapps exploit for Hardware platform
[webapps] devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery
devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/46324
devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/46324
Exploit Database
devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery
devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery.. webapps exploit for Hardware platform
[shellcode] Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator)
Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator)
https://www.exploit-db.com/exploits/46323
Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator)
https://www.exploit-db.com/exploits/46323
Exploit Database
Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator)
Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator).. shellcode exploit for Linux_x86 platform
[dos] River Past Audio Converter 7.7.16 - Denial of Service (PoC)
River Past Audio Converter 7.7.16 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/46322
River Past Audio Converter 7.7.16 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/46322
Exploit Database
River Past Audio Converter 7.7.16 - Denial of Service (PoC)
River Past Audio Converter 7.7.16 - Denial of Service (PoC).. dos exploit for Windows platform
[dos] Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC)
Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/46321
Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/46321
Exploit Database
Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC)
Device Monitoring Studio 8.10.00.8925 - Denial of Service (PoC).. dos exploit for Windows platform