[remote] MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow
MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow
https://www.exploit-db.com/exploits/46719
MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow
https://www.exploit-db.com/exploits/46719
Exploit Database
MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow
MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow.. remote exploit for Windows platform
[local] LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46727
LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46727
Exploit Database
LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit). CVE-2018-16858 . local exploit for Multiple platform
[dos] Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC)
Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC)
https://www.exploit-db.com/exploits/46726
Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC)
https://www.exploit-db.com/exploits/46726
Exploit Database
Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC)
Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC). CVE-2018-16517 . dos exploit for Multiple platform
[remote] ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit)
ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46725
ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46725
Exploit Database
ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit)
ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit). CVE-2019-11448 . remote exploit for Windows platform
[local] Evernote 7.9 - Code Execution via Path Traversal
Evernote 7.9 - Code Execution via Path Traversal
https://www.exploit-db.com/exploits/46724
Evernote 7.9 - Code Execution via Path Traversal
https://www.exploit-db.com/exploits/46724
Exploit Database
Evernote 7.9 - Code Execution via Path Traversal
Evernote 7.9 - Code Execution via Path Traversal. CVE-2019-10038 . local exploit for macOS platform
[remote] Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
https://www.exploit-db.com/exploits/46731
Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
https://www.exploit-db.com/exploits/46731
[local] SystemTap 1.3 - MODPROBE_OPTIONS Privilege Escalation (Metasploit)
SystemTap 1.3 - MODPROBE_OPTIONS Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46730
SystemTap 1.3 - MODPROBE_OPTIONS Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46730
[webapps] Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection
Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection
https://www.exploit-db.com/exploits/46729
Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection
https://www.exploit-db.com/exploits/46729
[webapps] Oracle Business Intelligence 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - Directory Traversal
Oracle Business Intelligence 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - Directory Traversal
https://www.exploit-db.com/exploits/46728
Oracle Business Intelligence 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - Directory Traversal
https://www.exploit-db.com/exploits/46728
[remote] ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46740
ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46740
Exploit Database
ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit). CVE-2019-11469 . remote exploit for Multiple platform
[webapps] Msvod 10 - Cross-Site Request Forgery (Change User Information)
Msvod 10 - Cross-Site Request Forgery (Change User Information)
https://www.exploit-db.com/exploits/46739
Msvod 10 - Cross-Site Request Forgery (Change User Information)
https://www.exploit-db.com/exploits/46739
Exploit Database
Msvod 10 - Cross-Site Request Forgery (Change User Information)
Msvod 10 - Cross-Site Request Forgery (Change User Information). CVE-2019-11375 . webapps exploit for PHP platform
[webapps] 74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User)
74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User)
https://www.exploit-db.com/exploits/46738
74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User)
https://www.exploit-db.com/exploits/46738
Exploit Database
74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User)
74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User). CVE-2019-11374 . webapps exploit for PHP platform
[local] LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)
LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)
https://www.exploit-db.com/exploits/46737
LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)
https://www.exploit-db.com/exploits/46737
Exploit Database
LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)
LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret).. local exploit for Windows platform
[shellcode] Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
https://www.exploit-db.com/exploits/46736
Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
https://www.exploit-db.com/exploits/46736
Exploit Database
Linux/ARM - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (S59!) + Null-Free Shellcode (100 bytes)
Linux/ARM - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (S59!) + Null-Free Shellcode (100 bytes).. shellcode exploit for ARM platform
[dos] Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
https://www.exploit-db.com/exploits/46735
Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
https://www.exploit-db.com/exploits/46735
Exploit Database
Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC).. dos exploit for Multiple platform
[webapps] WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion
WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion
https://www.exploit-db.com/exploits/46734
WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion
https://www.exploit-db.com/exploits/46734
Exploit Database
WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion
WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion.. webapps exploit for PHP platform
[dos] QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
https://www.exploit-db.com/exploits/46733
QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
https://www.exploit-db.com/exploits/46733
Exploit Database
QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service. CVE-2019-7181 . dos exploit for Hardware platform
[dos] Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC)
Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46732
Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46732
Exploit Database
Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC)
Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC).. dos exploit for Windows platform
[webapps] UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting
UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting
https://www.exploit-db.com/exploits/46741
UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting
https://www.exploit-db.com/exploits/46741
Exploit Database
UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting
UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting. CVE-2019-11398 . webapps exploit for PHP platform
[dos] Linux - 'page->_refcount' Overflow via FUSE
Linux - 'page->_refcount' Overflow via FUSE
https://www.exploit-db.com/exploits/46745
Linux - 'page->_refcount' Overflow via FUSE
https://www.exploit-db.com/exploits/46745
Exploit Database
Linux - 'page->_refcount' Overflow via FUSE
Linux - 'page->_refcount' Overflow via FUSE.. dos exploit for Linux platform