[remote] Cisco IOS - Remote Code Execution
Cisco IOS - Remote Code Execution
https://www.exploit-db.com/exploits/43450/?rss
Cisco IOS - Remote Code Execution
https://www.exploit-db.com/exploits/43450/?rss
[dos] Disk Pulse Enterprise 10.1.18 - Denial of Service
Disk Pulse Enterprise 10.1.18 - Denial of Service
https://www.exploit-db.com/exploits/43452/?rss
Disk Pulse Enterprise 10.1.18 - Denial of Service
https://www.exploit-db.com/exploits/43452/?rss
[dos] VX Search Enterprise 10.1.12 - Denial of Service
VX Search Enterprise 10.1.12 - Denial of Service
https://www.exploit-db.com/exploits/43451/?rss
VX Search Enterprise 10.1.12 - Denial of Service
https://www.exploit-db.com/exploits/43451/?rss
[dos] Sync Breeze Enterprise 10.1.16 - Denial of Service
Sync Breeze Enterprise 10.1.16 - Denial of Service
https://www.exploit-db.com/exploits/43453/?rss
Sync Breeze Enterprise 10.1.16 - Denial of Service
https://www.exploit-db.com/exploits/43453/?rss
[dos] DiskBoss Enterprise 8.5.12 - Denial of Service
DiskBoss Enterprise 8.5.12 - Denial of Service
https://www.exploit-db.com/exploits/43454/?rss
DiskBoss Enterprise 8.5.12 - Denial of Service
https://www.exploit-db.com/exploits/43454/?rss
[dos] BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow
BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow
https://www.exploit-db.com/exploits/43456/?rss
BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow
https://www.exploit-db.com/exploits/43456/?rss
[webapps] Synology DiskStation Manager (DSM) < 6.1.3-15152 - 'forget_passwd.cgi' User Enumeration
Synology DiskStation Manager (DSM) < 6.1.3-15152 - 'forget_passwd.cgi' User Enumeration
https://www.exploit-db.com/exploits/43455/?rss
Synology DiskStation Manager (DSM) < 6.1.3-15152 - 'forget_passwd.cgi' User Enumeration
https://www.exploit-db.com/exploits/43455/?rss
[webapps] Photos in Wifi 1.0.1 - Path Traversal
Photos in Wifi 1.0.1 - Path Traversal
https://www.exploit-db.com/exploits/43457/?rss
Photos in Wifi 1.0.1 - Path Traversal
https://www.exploit-db.com/exploits/43457/?rss
[remote] Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution
Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution
https://www.exploit-db.com/exploits/43458/?rss
Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution
https://www.exploit-db.com/exploits/43458/?rss
[webapps] SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/43459/?rss
SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/43459/?rss
[webapps] WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
https://www.exploit-db.com/exploits/43461/?rss
WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
https://www.exploit-db.com/exploits/43461/?rss
[webapps] FiberHome LM53Q1 - Multiple Vulnerabilities
FiberHome LM53Q1 - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/43460/?rss
FiberHome LM53Q1 - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/43460/?rss
[webapps] Vanilla < 2.1.5 - Cross-Site Request Forgery
Vanilla < 2.1.5 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43462/?rss
Vanilla < 2.1.5 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43462/?rss
[shellcode] Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
https://www.exploit-db.com/exploits/43463/?rss
Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
https://www.exploit-db.com/exploits/43463/?rss
[local] Microsoft Windows - Local XPS Print Spooler Sandbox Escape
Microsoft Windows - Local XPS Print Spooler Sandbox Escape
https://www.exploit-db.com/exploits/43465/?rss
Microsoft Windows - Local XPS Print Spooler Sandbox Escape
https://www.exploit-db.com/exploits/43465/?rss
[dos] Android - Inter-Process munmap due to Race Condition in ashmem
Android - Inter-Process munmap due to Race Condition in ashmem
https://www.exploit-db.com/exploits/43464/?rss
Android - Inter-Process munmap due to Race Condition in ashmem
https://www.exploit-db.com/exploits/43464/?rss
[dos] Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure
Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure
https://www.exploit-db.com/exploits/43470/?rss
Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure
https://www.exploit-db.com/exploits/43470/?rss
[dos] Microsoft Edge Chakra JIT - Escape Analysis Bug
Microsoft Edge Chakra JIT - Escape Analysis Bug
https://www.exploit-db.com/exploits/43469/?rss
Microsoft Edge Chakra JIT - Escape Analysis Bug
https://www.exploit-db.com/exploits/43469/?rss
[dos] Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43468/?rss
Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43468/?rss
[dos] Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches
Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches
https://www.exploit-db.com/exploits/43467/?rss
Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches
https://www.exploit-db.com/exploits/43467/?rss
[dos] Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions
Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions
https://www.exploit-db.com/exploits/43466/?rss
Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions
https://www.exploit-db.com/exploits/43466/?rss