NetBackup 7.0 – ‘NetBackup INET Daemon’ Unquoted Service Path
from Exploit-DB.com RSS Feed https://ift.tt/2x7xO8u
via IFTTT
NetBackup 7.0 – ‘NetBackup INET Daemon’ Unquoted Service Path
from Exploit-DB.com RSS Feed https://ift.tt/2x7xO8u
via IFTTT
Netlink GPON Router 1.0.11 – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/33CDfc5
via IFTTT
ManageEngine Desktop Central – Java Deserialization (Metasploit)
from Exploit-DB.com RSS Feed https://ift.tt/2TUhscm
via IFTTT
Rconfig 3.x – Chained Remote Code Execution (Metasploit)
from Exploit-DB.com RSS Feed https://ift.tt/2xIS40B
via IFTTT
PHPKB Multi-Language 9 – ‘image-upload.php’ Authenticated Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/3d399T9
via IFTTT
PHPKB Multi-Language 9 – Authenticated Directory Traversal
from Exploit-DB.com RSS Feed https://ift.tt/2WjoHfE
via IFTTT
PHPKB Multi-Language 9 – Authenticated Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2WhaT5b
via IFTTT
MiladWorkShop VIP System 1.0 – ‘lang’ SQL Injection
from Exploit-DB.com RSS Feed https://ift.tt/38T5nII
via IFTTT
Enhanced Multimedia Router 3.0.4.27 – Cross-Site Request Forgery (Add Admin)
from Exploit-DB.com RSS Feed https://ift.tt/3aTshkC
via IFTTT
Microsoft Windows 10 (1903/1909) – ‘SMBGhost’ SMB3.1.1 ‘SMB2_COMPRESSION_CAPABILITIES’ Buffer Overflow (PoC)
from Exploit-DB.com RSS Feed https://ift.tt/2WdDMPH
via IFTTT