Open marcialwushu opened 6 years ago
inactive: [dos] Disk Pulse Enterprise 10.1.18 - Denial of Service https://www.exploit-db.com/exploits/43452/?rss
Disk Pulse Enterprise 10.1.18 - Denial of Service
inactive: [dos] Sync Breeze Enterprise 10.1.16 - Denial of Service https://www.exploit-db.com/exploits/43453/?rss
Sync Breeze Enterprise 10.1.16 - Denial of Service
inactive: [dos] VX Search Enterprise 10.1.12 - Denial of Service https://www.exploit-db.com/exploits/43451/?rss
VX Search Enterprise 10.1.12 - Denial of Service
inactive: [webapps] gps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities https://www.exploit-db.com/exploits/43431/?rss
gps-server.net GPS Tracking Software
inactive: [remote] Linksys WVBR0-25 - User-Agent Command Execution (Metasploit) https://www.exploit-db.com/exploits/43429/?rss
Linksys WVBR0-25 - User-Agent Command Execution (Metasploit)
inactive: [remote] Xplico - Remote Code Execution (Metasploit) https://www.exploit-db.com/exploits/43430/?rss
Xplico - Remote Code Execution (Metasploit)
inactive: Meltdown e Spectre – FAQ sobre os ataques contra CPUs Intel https://blog.leverage.inf.br/2018/01/04/meltdown-faq-sobre-o-ataque-contra-cpus-intel/
Um resumo do que você precisa saber sobre a falha de design nos processadores Intel que ameaça a segurança de computadores em todo o mundo. Observação: Este FAQ é um resumo da página… Continuar lendo →
inactive: [webapps] WordPress Plugin Smart Google Code Inserter < 3.5 - Authentication Bypass / SQL Injection https://www.exploit-db.com/exploits/43420/?rss
WordPress Plugin Smart Google Code Inserter
inactive: [papers] [Hebrew] Digital Whisper Security Magazine #90 http://www.exploit-db.com/docs/43416.pdf?rss
[Hebrew] Digital Whisper Security Magazine #90
inactive: [remote] HP Mercury LoadRunner Agent magentproc.exe - Remote Command Execution (Metasploit) https://www.exploit-db.com/exploits/43411/?rss
HP Mercury LoadRunner Agent magentproc.exe - Remote Command Execution (Metasploit)
inactive: [dos] D3DGear 5.00 Build 2175 - Buffer Overflow https://www.exploit-db.com/exploits/43410/?rss
D3DGear 5.00 Build 2175 - Buffer Overflow
inactive: [webapps] PHP Melody 2.7.1 - 'playlist' SQL Injection https://www.exploit-db.com/exploits/43409/?rss
PHP Melody 2.7.1 - 'playlist' SQL Injection
inactive: [remote] NetTransport 2.96L - Buffer Overflow (DEP Bypass) https://www.exploit-db.com/exploits/43408/?rss
NetTransport 2.96L - Buffer Overflow (DEP Bypass)
inactive: [remote] ALLMediaServer 0.95 - Buffer Overflow (Metasploit) https://www.exploit-db.com/exploits/43407/?rss
ALLMediaServer 0.95 - Buffer Overflow (Metasploit)
inactive: [dos] Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure https://www.exploit-db.com/exploits/43470/?rss
Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues)' Kernel Stack Memory Disclosure
inactive: [dos] Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions https://www.exploit-db.com/exploits/43466/?rss
Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly call User-Defined JavaScript Functions
inactive: [dos] Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read https://www.exploit-db.com/exploits/43468/?rss
Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
inactive: [dos] Microsoft Edge Chakra JIT - Escape Analysis Bug https://www.exploit-db.com/exploits/43469/?rss
Microsoft Edge Chakra JIT - Escape Analysis Bug
inactive: [dos] Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches https://www.exploit-db.com/exploits/43467/?rss
Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Insert Branches
inactive: [webapps] Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit) https://www.exploit-db.com/exploits/43474/?rss
Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
inactive: [shellcode] Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes) https://www.exploit-db.com/exploits/43497/?rss
Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)