[local] Sophos UTM 9.410 - loginuser Privilege Escalation via confd Service
Sophos UTM 9.410 - loginuser Privilege Escalation via confd Service
https://www.exploit-db.com/exploits/442326/?rss
Sophos UTM 9.410 - loginuser Privilege Escalation via confd Service
https://www.exploit-db.com/exploits/442326/?rss
[remote] NETGEAR - Magic Packet TelnetEnable (Metasploit)
NETGEAR - Magic Packet TelnetEnable (Metasploit)
https://www.exploit-db.com/exploits/442325/?rss
NETGEAR - Magic Packet TelnetEnable (Metasploit)
https://www.exploit-db.com/exploits/442325/?rss
[local] Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
https://www.exploit-db.com/exploits/44246/?rss
Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
https://www.exploit-db.com/exploits/44246/?rss
[remote] NETGEAR - 'TelnetEnable' Magic Packet (Metasploit)
NETGEAR - 'TelnetEnable' Magic Packet (Metasploit)
https://www.exploit-db.com/exploits/44245/?rss
NETGEAR - 'TelnetEnable' Magic Packet (Metasploit)
https://www.exploit-db.com/exploits/44245/?rss
[local] Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
https://www.exploit-db.com/exploits/44244/?rss
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
https://www.exploit-db.com/exploits/44244/?rss
[local] Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
https://www.exploit-db.com/exploits/44243/?rss
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
https://www.exploit-db.com/exploits/44243/?rss
[remote] Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
https://www.exploit-db.com/exploits/44242/?rss
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
https://www.exploit-db.com/exploits/44242/?rss
[webapps] Parallels Remote Application Server 15.5 - Path Traversal
Parallels Remote Application Server 15.5 - Path Traversal
https://www.exploit-db.com/exploits/44241/?rss
Parallels Remote Application Server 15.5 - Path Traversal
https://www.exploit-db.com/exploits/44241/?rss
[webapps] ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection
ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection
https://www.exploit-db.com/exploits/44250/?rss
ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection
https://www.exploit-db.com/exploits/44250/?rss
[dos] Suricata < 4.0.4 - IDS Detection Bypass
Suricata < 4.0.4 - IDS Detection Bypass
https://www.exploit-db.com/exploits/44247/?rss
Suricata < 4.0.4 - IDS Detection Bypass
https://www.exploit-db.com/exploits/44247/?rss
[dos] ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
https://www.exploit-db.com/exploits/44251/?rss
ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
https://www.exploit-db.com/exploits/44251/?rss
[webapps] Joomla! 'com_Joomanager' - Arbitrary File Download
Joomla! 'com_Joomanager' - Arbitrary File Download
https://www.exploit-db.com/exploits/44252/?rss
Joomla! 'com_Joomanager' - Arbitrary File Download
https://www.exploit-db.com/exploits/44252/?rss
[dos] Memcached - 'memcrashed' Denial of Service
Memcached - 'memcrashed' Denial of Service
https://www.exploit-db.com/exploits/44254/?rss
Memcached - 'memcrashed' Denial of Service
https://www.exploit-db.com/exploits/44254/?rss
[remote] Tenda AC15 Router - Pe-authenticated Remote Code Execution
Tenda AC15 Router - Pe-authenticated Remote Code Execution
https://www.exploit-db.com/exploits/44253/?rss
Tenda AC15 Router - Pe-authenticated Remote Code Execution
https://www.exploit-db.com/exploits/44253/?rss
[dos] Softros Network Time System Server 2.3.4 - Denial of Service
Softros Network Time System Server 2.3.4 - Denial of Service
https://www.exploit-db.com/exploits/44255/?rss
Softros Network Time System Server 2.3.4 - Denial of Service
https://www.exploit-db.com/exploits/44255/?rss
[dos] Chrome V8 JIT - Empty BytecodeJumpTable Out-of-Bounds Read
Chrome V8 JIT - Empty BytecodeJumpTable Out-of-Bounds Read
https://www.exploit-db.com/exploits/44260/?rss
Chrome V8 JIT - Empty BytecodeJumpTable Out-of-Bounds Read
https://www.exploit-db.com/exploits/44260/?rss
[dos] Chrome V8 JIT - 'GetSpecializationContext' Type Confusion
Chrome V8 JIT - 'GetSpecializationContext' Type Confusion
https://www.exploit-db.com/exploits/44259/?rss
Chrome V8 JIT - 'GetSpecializationContext' Type Confusion
https://www.exploit-db.com/exploits/44259/?rss
[dos] Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is "null"
Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is "null"
https://www.exploit-db.com/exploits/44258/?rss
Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is "null"
https://www.exploit-db.com/exploits/44258/?rss
[dos] Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement Optimization Bug
Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement Optimization Bug
https://www.exploit-db.com/exploits/44257/?rss
Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement Optimization Bug
https://www.exploit-db.com/exploits/44257/?rss
[webapps] Bravo Tejari Web Portal - Cross-Site Request Forgery
Bravo Tejari Web Portal - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44256/?rss
Bravo Tejari Web Portal - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44256/?rss