Acronis True Image OEM 19.0.5128 – ‘afcdpsrv’ Unquoted Service Path
from Exploit-DB.com RSS Feed https://ift.tt/32C7Jc0
via IFTTT
Acronis True Image OEM 19.0.5128 – ‘afcdpsrv’ Unquoted Service Path
from Exploit-DB.com RSS Feed https://ift.tt/32C7Jc0
via IFTTT
Computrols CBAS-Web 19.0.0 – ‘username’ Reflected Cross-Site Scripting
from Exploit-DB.com RSS Feed https://ift.tt/33GEJRI
via IFTTT
Adrenalin Core HCM 5.4.0 – ‘prntDDLCntrlName’ Reflected Cross-Site Scripting
from Exploit-DB.com RSS Feed https://ift.tt/2QaHx5F
via IFTTT
Prima FlexAir Access Control 2.3.38 – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2KeyQUe
via IFTTT
Adrenalin Core HCM 5.4.0 – ‘strAction’ Reflected Cross-Site Scripting
from Exploit-DB.com RSS Feed https://ift.tt/2O8buk0
via IFTTT
Adobe Acrobat Reader DC for Windows – Use of Uninitialized Pointer due to Malformed OTF Font (CFF Table)
from Exploit-DB.com RSS Feed https://ift.tt/2X8xqjc
via IFTTT
Adobe Acrobat Reader DC for Windows – Use of Uninitialized Pointer due to Malformed JBIG2Globals Stream
from Exploit-DB.com RSS Feed https://ift.tt/2Xbi9hI
via IFTTT
iMessage – Decoding NSSharedKeyDictionary can read ObjC Object at Attacker Controlled Address
from Exploit-DB.com RSS Feed https://ift.tt/2X6U9Ms
via IFTTT
iOS IOUSBDeviceFamily 12.4.1 – ‘IOInterruptEventSource’ Heap Corruption (PoC)
from Exploit-DB.com RSS Feed https://ift.tt/2rE5xUz
via IFTTT
XML Notepad 2.8.0.4 – XML External Entity Injection
from Exploit-DB.com RSS Feed https://ift.tt/2Cy1zPz
via IFTTT