[dos] Softros Network Time System Server 2.3.4 - Denial of Service
Softros Network Time System Server 2.3.4 - Denial of Service
https://www.exploit-db.com/exploits/44255/?rss
Softros Network Time System Server 2.3.4 - Denial of Service
https://www.exploit-db.com/exploits/44255/?rss
[dos] Chrome V8 JIT - Empty BytecodeJumpTable Out-of-Bounds Read
Chrome V8 JIT - Empty BytecodeJumpTable Out-of-Bounds Read
https://www.exploit-db.com/exploits/44260/?rss
Chrome V8 JIT - Empty BytecodeJumpTable Out-of-Bounds Read
https://www.exploit-db.com/exploits/44260/?rss
[dos] Chrome V8 JIT - 'GetSpecializationContext' Type Confusion
Chrome V8 JIT - 'GetSpecializationContext' Type Confusion
https://www.exploit-db.com/exploits/44259/?rss
Chrome V8 JIT - 'GetSpecializationContext' Type Confusion
https://www.exploit-db.com/exploits/44259/?rss
[dos] Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is "null"
Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is "null"
https://www.exploit-db.com/exploits/44258/?rss
Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is "null"
https://www.exploit-db.com/exploits/44258/?rss
[dos] Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement Optimization Bug
Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement Optimization Bug
https://www.exploit-db.com/exploits/44257/?rss
Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement Optimization Bug
https://www.exploit-db.com/exploits/44257/?rss
[webapps] Bravo Tejari Web Portal - Cross-Site Request Forgery
Bravo Tejari Web Portal - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44256/?rss
Bravo Tejari Web Portal - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/44256/?rss
[webapps] antMan 0.9.0c - Authentication Bypass
antMan 0.9.0c - Authentication Bypass
https://www.exploit-db.com/exploits/44262/?rss
antMan 0.9.0c - Authentication Bypass
https://www.exploit-db.com/exploits/44262/?rss
[webapps] Redaxo CMS Addon MyEvents 2.2.1 - SQL Injection
Redaxo CMS Addon MyEvents 2.2.1 - SQL Injection
https://www.exploit-db.com/exploits/44261/?rss
Redaxo CMS Addon MyEvents 2.2.1 - SQL Injection
https://www.exploit-db.com/exploits/44261/?rss
[dos] Memcached < 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service With Shodan API
Memcached < 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service With Shodan API
https://www.exploit-db.com/exploits/44265/?rss
Memcached < 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service With Shodan API
https://www.exploit-db.com/exploits/44265/?rss
[local] Microsoft Office - 'Composite Moniker Remote Code Execution
Microsoft Office - 'Composite Moniker Remote Code Execution
https://www.exploit-db.com/exploits/44263/?rss
Microsoft Office - 'Composite Moniker Remote Code Execution
https://www.exploit-db.com/exploits/44263/?rss
[local] Chrome 35.0.1916.153 - Sandbox Escape / Command Execution
Chrome 35.0.1916.153 - Sandbox Escape / Command Execution
https://www.exploit-db.com/exploits/44269/?rss
Chrome 35.0.1916.153 - Sandbox Escape / Command Execution
https://www.exploit-db.com/exploits/44269/?rss
[dos] Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service
Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service
https://www.exploit-db.com/exploits/44268/?rss
Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service
https://www.exploit-db.com/exploits/44268/?rss
[local] TOR Browser (Firefox 41 < 50) - Code Execution
TOR Browser (Firefox 41 < 50) - Code Execution
https://www.exploit-db.com/exploits/44267/?rss
TOR Browser (Firefox 41 < 50) - Code Execution
https://www.exploit-db.com/exploits/44267/?rss
[local] Mozilla Firefox - Address Bar Spoofing
Mozilla Firefox - Address Bar Spoofing
https://www.exploit-db.com/exploits/44266/?rss
Mozilla Firefox - Address Bar Spoofing
https://www.exploit-db.com/exploits/44266/?rss
[dos] Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (1)
Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (1)
https://www.exploit-db.com/exploits/44264/?rss
Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (1)
https://www.exploit-db.com/exploits/44264/?rss
[dos] WebLog Expert Enterprise 9.4 - Denial of Service
WebLog Expert Enterprise 9.4 - Denial of Service
https://www.exploit-db.com/exploits/44271/?rss
WebLog Expert Enterprise 9.4 - Denial of Service
https://www.exploit-db.com/exploits/44271/?rss
[local] WebLog Expert Enterprise 9.4 - Authentication Bypass
WebLog Expert Enterprise 9.4 - Authentication Bypass
https://www.exploit-db.com/exploits/44270/?rss
WebLog Expert Enterprise 9.4 - Authentication Bypass
https://www.exploit-db.com/exploits/44270/?rss
[webapps] Bacula-Web < 8.0.0-rc2 - SQL Injection
Bacula-Web < 8.0.0-rc2 - SQL Injection
https://www.exploit-db.com/exploits/44272/?rss
Bacula-Web < 8.0.0-rc2 - SQL Injection
https://www.exploit-db.com/exploits/44272/?rss
[webapps] ManageEngine Applications Manager 13.5 - Remote Code Execution (Metasploit)
ManageEngine Applications Manager 13.5 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44274/?rss
ManageEngine Applications Manager 13.5 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/44274/?rss
[remote] DEWESoft X3 SP1 (64-bit) - Remote Command Execution
DEWESoft X3 SP1 (64-bit) - Remote Command Execution
https://www.exploit-db.com/exploits/44275/?rss
DEWESoft X3 SP1 (64-bit) - Remote Command Execution
https://www.exploit-db.com/exploits/44275/?rss