[dos] Intel Content Protection HECI Service - Type Confusion Privilege Escalation
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
https://www.exploit-db.com/exploits/43373/?rss
[dos] Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43372/?rss
[dos] Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
https://www.exploit-db.com/exploits/43371/?rss
[dos] Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
https://www.exploit-db.com/exploits/43370/?rss
Microsoft Windows - jscript.dll 'Array.sort' Heap Overflow
https://www.exploit-db.com/exploits/43370/?rss
[dos] Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
https://www.exploit-db.com/exploits/43369/?rss
Microsoft Windows - 'jscript!RegExpComp::Compile' Heap Overflow Through IE or Local Network via WPAD
https://www.exploit-db.com/exploits/43369/?rss
[dos] Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
https://www.exploit-db.com/exploits/43368/?rss
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
https://www.exploit-db.com/exploits/43368/?rss
[dos] Microsoft Windows - 'jscript!NameTbl::GetValDef' Use-After-Free
Microsoft Windows - 'jscript!NameTbl::GetValDef' Use-After-Free
https://www.exploit-db.com/exploits/43367/?rss
Microsoft Windows - 'jscript!NameTbl::GetValDef' Use-After-Free
https://www.exploit-db.com/exploits/43367/?rss
[local] TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC)
TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC)
https://www.exploit-db.com/exploits/43366/?rss
TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC)
https://www.exploit-db.com/exploits/43366/?rss
[remote] Samsung Internet Browser - SOP Bypass (Metasploit)
Samsung Internet Browser - SOP Bypass (Metasploit)
https://www.exploit-db.com/exploits/43376/?rss
Samsung Internet Browser - SOP Bypass (Metasploit)
https://www.exploit-db.com/exploits/43376/?rss
[dos] Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
https://www.exploit-db.com/exploits/43380/?rss
Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
https://www.exploit-db.com/exploits/43380/?rss
[webapps] BEIMS ContractorWeb 5.18.0.0 - SQL Injection
BEIMS ContractorWeb 5.18.0.0 - SQL Injection
https://www.exploit-db.com/exploits/43379/?rss
BEIMS ContractorWeb 5.18.0.0 - SQL Injection
https://www.exploit-db.com/exploits/43379/?rss
[webapps] Ability Mail Server 3.3.2 - Cross-Site Scripting
Ability Mail Server 3.3.2 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43378/?rss
Ability Mail Server 3.3.2 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43378/?rss
[webapps] Conarc iChannel - Improper Access Restrictions
Conarc iChannel - Improper Access Restrictions
https://www.exploit-db.com/exploits/43377/?rss
Conarc iChannel - Improper Access Restrictions
https://www.exploit-db.com/exploits/43377/?rss
[remote] Netcore / Netis Routers - UDP Backdoor
Netcore / Netis Routers - UDP Backdoor
https://www.exploit-db.com/exploits/43387/?rss
Netcore / Netis Routers - UDP Backdoor
https://www.exploit-db.com/exploits/43387/?rss
[remote] Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor
Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor
https://www.exploit-db.com/exploits/43386/?rss
Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor
https://www.exploit-db.com/exploits/43386/?rss
[remote] Technicolor DPC3928SL - SNMP Authentication Bypass
Technicolor DPC3928SL - SNMP Authentication Bypass
https://www.exploit-db.com/exploits/43384/?rss
Technicolor DPC3928SL - SNMP Authentication Bypass
https://www.exploit-db.com/exploits/43384/?rss
[remote] Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request Device Memory
Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request Device Memory
https://www.exploit-db.com/exploits/43383/?rss
Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request Device Memory
https://www.exploit-db.com/exploits/43383/?rss
[local] Ruby < 2.2.8 / < 2.3.5 / < 2.4.2 / < 2.5.0-preview1 - 'NET::Ftp' Command Injection
Ruby < 2.2.8 / < 2.3.5 / < 2.4.2 / < 2.5.0-preview1 - 'NET::Ftp' Command Injection
https://www.exploit-db.com/exploits/43381/?rss
Ruby < 2.2.8 / < 2.3.5 / < 2.4.2 / < 2.5.0-preview1 - 'NET::Ftp' Command Injection
https://www.exploit-db.com/exploits/43381/?rss
[remote] Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Control
Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Control
https://www.exploit-db.com/exploits/43388/?rss
Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Control
https://www.exploit-db.com/exploits/43388/?rss
[remote] COMTREND ADSL Router CT-5367 - Remote Code Execution
COMTREND ADSL Router CT-5367 - Remote Code Execution
https://www.exploit-db.com/exploits/43389/?rss
COMTREND ADSL Router CT-5367 - Remote Code Execution
https://www.exploit-db.com/exploits/43389/?rss