[dos] Apple OS X Yosemite - 'flow_divert-heap-overflow' Kernel Panic
Apple OS X Yosemite - 'flow_divert-heap-overflow' Kernel Panic
https://www.exploit-db.com/exploits/44238/?rss
Apple OS X Yosemite - 'flow_divert-heap-overflow' Kernel Panic
https://www.exploit-db.com/exploits/44238/?rss
[local] Apple macOS Sierra 10.12.1 - 'physmem' Local Privilege Escalation
Apple macOS Sierra 10.12.1 - 'physmem' Local Privilege Escalation
https://www.exploit-db.com/exploits/44237/?rss
Apple macOS Sierra 10.12.1 - 'physmem' Local Privilege Escalation
https://www.exploit-db.com/exploits/44237/?rss
[webapps] Parallels Remote Application Server 15.5 - Path Traversal
Parallels Remote Application Server 15.5 - Path Traversal
https://www.exploit-db.com/exploits/442321/?rss
Parallels Remote Application Server 15.5 - Path Traversal
https://www.exploit-db.com/exploits/442321/?rss
[remote] Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
https://www.exploit-db.com/exploits/442322/?rss
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
https://www.exploit-db.com/exploits/442322/?rss
[local] Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
https://www.exploit-db.com/exploits/442324/?rss
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
https://www.exploit-db.com/exploits/442324/?rss
[local] Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
https://www.exploit-db.com/exploits/442323/?rss
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
https://www.exploit-db.com/exploits/442323/?rss
[local] Sophos UTM 9.410 - loginuser Privilege Escalation via confd Service
Sophos UTM 9.410 - loginuser Privilege Escalation via confd Service
https://www.exploit-db.com/exploits/442326/?rss
Sophos UTM 9.410 - loginuser Privilege Escalation via confd Service
https://www.exploit-db.com/exploits/442326/?rss
[remote] NETGEAR - Magic Packet TelnetEnable (Metasploit)
NETGEAR - Magic Packet TelnetEnable (Metasploit)
https://www.exploit-db.com/exploits/442325/?rss
NETGEAR - Magic Packet TelnetEnable (Metasploit)
https://www.exploit-db.com/exploits/442325/?rss
[local] Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
https://www.exploit-db.com/exploits/44246/?rss
Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
https://www.exploit-db.com/exploits/44246/?rss
[remote] NETGEAR - 'TelnetEnable' Magic Packet (Metasploit)
NETGEAR - 'TelnetEnable' Magic Packet (Metasploit)
https://www.exploit-db.com/exploits/44245/?rss
NETGEAR - 'TelnetEnable' Magic Packet (Metasploit)
https://www.exploit-db.com/exploits/44245/?rss
[local] Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
https://www.exploit-db.com/exploits/44244/?rss
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
https://www.exploit-db.com/exploits/44244/?rss
[local] Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
https://www.exploit-db.com/exploits/44243/?rss
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
https://www.exploit-db.com/exploits/44243/?rss
[remote] Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
https://www.exploit-db.com/exploits/44242/?rss
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
https://www.exploit-db.com/exploits/44242/?rss
[webapps] Parallels Remote Application Server 15.5 - Path Traversal
Parallels Remote Application Server 15.5 - Path Traversal
https://www.exploit-db.com/exploits/44241/?rss
Parallels Remote Application Server 15.5 - Path Traversal
https://www.exploit-db.com/exploits/44241/?rss
[webapps] ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection
ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection
https://www.exploit-db.com/exploits/44250/?rss
ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection
https://www.exploit-db.com/exploits/44250/?rss
[dos] Suricata < 4.0.4 - IDS Detection Bypass
Suricata < 4.0.4 - IDS Detection Bypass
https://www.exploit-db.com/exploits/44247/?rss
Suricata < 4.0.4 - IDS Detection Bypass
https://www.exploit-db.com/exploits/44247/?rss
[dos] ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
https://www.exploit-db.com/exploits/44251/?rss
ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
https://www.exploit-db.com/exploits/44251/?rss
[webapps] Joomla! 'com_Joomanager' - Arbitrary File Download
Joomla! 'com_Joomanager' - Arbitrary File Download
https://www.exploit-db.com/exploits/44252/?rss
Joomla! 'com_Joomanager' - Arbitrary File Download
https://www.exploit-db.com/exploits/44252/?rss
[dos] Memcached - 'memcrashed' Denial of Service
Memcached - 'memcrashed' Denial of Service
https://www.exploit-db.com/exploits/44254/?rss
Memcached - 'memcrashed' Denial of Service
https://www.exploit-db.com/exploits/44254/?rss
[remote] Tenda AC15 Router - Pe-authenticated Remote Code Execution
Tenda AC15 Router - Pe-authenticated Remote Code Execution
https://www.exploit-db.com/exploits/44253/?rss
Tenda AC15 Router - Pe-authenticated Remote Code Execution
https://www.exploit-db.com/exploits/44253/?rss