[webapps] TextPattern 4.6.2 - 'qty' SQL Injection
TextPattern 4.6.2 - 'qty' SQL Injection
https://www.exploit-db.com/exploits/44277/?rss
TextPattern 4.6.2 - 'qty' SQL Injection
https://www.exploit-db.com/exploits/44277/?rss
[webapps] Prisma Industriale Checkweigher PrismaWEB 1.21 - Hard-Coded Credentials
Prisma Industriale Checkweigher PrismaWEB 1.21 - Hard-Coded Credentials
https://www.exploit-db.com/exploits/44276/?rss
Prisma Industriale Checkweigher PrismaWEB 1.21 - Hard-Coded Credentials
https://www.exploit-db.com/exploits/44276/?rss
[local] SC 7.16 - Stack Buffer Overflow
SC 7.16 - Stack Buffer Overflow
https://www.exploit-db.com/exploits/44279/?rss
SC 7.16 - Stack Buffer Overflow
https://www.exploit-db.com/exploits/44279/?rss
[webapps] Advantech WebAccess < 8.3 - Directory Traversal / Remote Code Execution
Advantech WebAccess < 8.3 - Directory Traversal / Remote Code Execution
https://www.exploit-db.com/exploits/44278/?rss
Advantech WebAccess < 8.3 - Directory Traversal / Remote Code Execution
https://www.exploit-db.com/exploits/44278/?rss
[remote] Eclipse Equinoxe OSGi Console - Command Execution (Metasploit)
Eclipse Equinoxe OSGi Console - Command Execution (Metasploit)
https://www.exploit-db.com/exploits/44280/?rss
Eclipse Equinoxe OSGi Console - Command Execution (Metasploit)
https://www.exploit-db.com/exploits/44280/?rss
[webapps] ACL Analytics 11.X - 13.0.0.579 - Arbitrary Code Execution
ACL Analytics 11.X - 13.0.0.579 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/44281/?rss
ACL Analytics 11.X - 13.0.0.579 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/44281/?rss
[local] Sony Playstation 4 (PS4) 4.55 < 5.50 - WebKit Code Execution (PoC)
Sony Playstation 4 (PS4) 4.55 < 5.50 - WebKit Code Execution (PoC)
https://www.exploit-db.com/exploits/44282/?rss
Sony Playstation 4 (PS4) 4.55 < 5.50 - WebKit Code Execution (PoC)
https://www.exploit-db.com/exploits/44282/?rss
[remote] MikroTik RouterOS < 6.38.4 (x86) - 'Chimay Red' Stack Clash Remote Code Execution
MikroTik RouterOS < 6.38.4 (x86) - 'Chimay Red' Stack Clash Remote Code Execution
https://www.exploit-db.com/exploits/44284/?rss
MikroTik RouterOS < 6.38.4 (x86) - 'Chimay Red' Stack Clash Remote Code Execution
https://www.exploit-db.com/exploits/44284/?rss
[remote] MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution
MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution
https://www.exploit-db.com/exploits/44283/?rss
MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution
https://www.exploit-db.com/exploits/44283/?rss
[webapps] SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities
SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/44285/?rss
SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/44285/?rss
[webapps] Tuleap 9.17.99.189 - Blind SQL Injection
Tuleap 9.17.99.189 - Blind SQL Injection
https://www.exploit-db.com/exploits/44286/?rss
Tuleap 9.17.99.189 - Blind SQL Injection
https://www.exploit-db.com/exploits/44286/?rss
[papers] Rootkit analysis - Use case on HideDRV
Rootkit analysis - Use case on HideDRV
http://www.exploit-db.com/docs/english/44287-rootkit-analysis---use-case-on-hidedrv.pdf?rss
Rootkit analysis - Use case on HideDRV
http://www.exploit-db.com/docs/english/44287-rootkit-analysis---use-case-on-hidedrv.pdf?rss
[webapps] Spring Data REST < 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution
Spring Data REST < 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution
https://www.exploit-db.com/exploits/44289/?rss
Spring Data REST < 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution
https://www.exploit-db.com/exploits/44289/?rss
[webapps] WordPress Plugin Duplicator 1.2.32 - Cross-Site Scripting
WordPress Plugin Duplicator 1.2.32 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44288/?rss
WordPress Plugin Duplicator 1.2.32 - Cross-Site Scripting
https://www.exploit-db.com/exploits/44288/?rss
[remote] MikroTik RouterOS < 6.41.3/6.42rc27 - SMB Buffer Overflow
MikroTik RouterOS < 6.41.3/6.42rc27 - SMB Buffer Overflow
https://www.exploit-db.com/exploits/44290/?rss
MikroTik RouterOS < 6.41.3/6.42rc27 - SMB Buffer Overflow
https://www.exploit-db.com/exploits/44290/?rss
[dos] Android DRM Services - Buffer Overflow
Android DRM Services - Buffer Overflow
https://www.exploit-db.com/exploits/44291/?rss
Android DRM Services - Buffer Overflow
https://www.exploit-db.com/exploits/44291/?rss
[remote] SAP NetWeaver AS JAVA CRM - Log injection Remote Command Execution
SAP NetWeaver AS JAVA CRM - Log injection Remote Command Execution
https://www.exploit-db.com/exploits/44292/?rss
SAP NetWeaver AS JAVA CRM - Log injection Remote Command Execution
https://www.exploit-db.com/exploits/44292/?rss
[remote] Firefox 44.0.2 - ASM.JS JIT-Spray Remote Code Execution
Firefox 44.0.2 - ASM.JS JIT-Spray Remote Code Execution
https://www.exploit-db.com/exploits/44294/?rss
Firefox 44.0.2 - ASM.JS JIT-Spray Remote Code Execution
https://www.exploit-db.com/exploits/44294/?rss
[remote] Firefox 46.0.1 - ASM.JS JIT-Spray Remote Code Execution
Firefox 46.0.1 - ASM.JS JIT-Spray Remote Code Execution
https://www.exploit-db.com/exploits/44293/?rss
Firefox 46.0.1 - ASM.JS JIT-Spray Remote Code Execution
https://www.exploit-db.com/exploits/44293/?rss
[webapps] Contec Smart Home 4.15 - Unauthorized Password Reset
Contec Smart Home 4.15 - Unauthorized Password Reset
https://www.exploit-db.com/exploits/44295/?rss
Contec Smart Home 4.15 - Unauthorized Password Reset
https://www.exploit-db.com/exploits/44295/?rss