Adobe Acrobat Reader DC for Windows – Heap-Based Buffer Overflow due to Malformed JP2 Stream (2)
from Exploit-DB.com RSS Feed https://ift.tt/33Tl2FT
via IFTTT
Adobe Acrobat Reader DC for Windows – Heap-Based Buffer Overflow due to Malformed JP2 Stream (2)
from Exploit-DB.com RSS Feed https://ift.tt/33Tl2FT
via IFTTT
Trend Micro Anti-Threat Toolkit 1.62.0.1218 – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/32Dwt4r
via IFTTT
winrar 5.80 – XML External Entity Injection
from Exploit-DB.com RSS Feed https://ift.tt/2p7sRZV
via IFTTT
winrar 5.80 64bit – Denial of Service
from Exploit-DB.com RSS Feed https://ift.tt/2pJ54zc
via IFTTT
Joomla! 3.4.6 – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2J1vumz
via IFTTT
WorkgroupMail 7.5.1 – ‘WorkgroupMail’ Unquoted Service Path
from Exploit-DB.com RSS Feed https://ift.tt/2N7KHEf
via IFTTT
Web Companion versions 5.1.1035.1047 – ‘WCAssistantService’ Unquoted Service Path
from Exploit-DB.com RSS Feed https://ift.tt/2Bmw4HB
via IFTTT
BlackMoon FTP Server 3.1.2.1731 – ‘BMFTP-RELEASE’ Unquoted Serive Path
from Exploit-DB.com RSS Feed https://ift.tt/2VXJqDK
via IFTTT
Restaurant Management System 1.0 – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2BtZW4A
via IFTTT
ThinVNC 1.0b1 – Authentication Bypass
from Exploit-DB.com RSS Feed https://ift.tt/32sY0oY
via IFTTT