Microsoft Internet Explorer version 8 SetMouseCapture use-after-free exploit.
dc036f7561a91f3ec1de1adb5c4d23b74d6d6af8f98e8f05554baa77eae7a593
Dell KACE System Management Appliance (SMA) versions prior to 9.0.270 patch SEC2018_20180410 suffers from cross site scripting and remote SQL injection vulnerabilities.
969bf6a0293304984e1682d48394b25e30e76ba2f5b3cca9dc8443bce9dd9791
DELL EMC Avamar fails to restrict access to Configuration section that let Administrators set up Installation Manager configurations, or check for new packages from the Online Support site. An unauthenticated, remote attacker could add an Online Support Account for DELL EMC without any user interaction.
42f6942fd19142aaa2470d8266c6f9ada3b65f0227f43fd6c4a0fce736e249c1
D-Link DCS-936L suffers from a cross site request forgery vulnerability.
3251127ae5772aece5a596f9ae632c7495567ca8b9aa2dec93bb0433d7ca5898
Dell Active Roles versions 7.1, 7.0.4, 7.0.3, 7.0.2, and 7.0 suffer from an unquoted service path privilege escalation vulnerability.
07a00566104c4227a3ed1dab9176a2272fdf66ccdbc0cd002a9eab7ce0cd87a2
This exploit tests the target Oracle WebLogic Server for Java Deserialization remote code execution vulnerability. The ysoserial payload causes the target to send Ping requests to the attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload (chunk2) with that of your choice. Do not worry about modifying the payload length each time you change the payload as this script will do it for you on the fly. Versions affected include 10.3.6.0, 12.1.2.0, 12.1.3.0 and 12.2.1.0.
ac556f1550022f3147ba71eb384d81217f8f01394258077e4047ca66a5f06464
D-Link DCS Series cameras implement a weak crossdomain.xml.
50e8e437260ea37095cf7b417235509abfde4253d1cec1226635f8f3a293b3cb
Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5 SP2 suffers from faulty access controls, stored cross site scripting, and information disclosure vulnerabilities
637d47762288a065abb2a7389848251703d887b374e4c7cdadcc2d3c44a2c27a
Sophos Web Appliance version 4.3.1.1 suffers from a session fixation vulnerability.
50104c16e61bf331cca13385710e48feaf4c03fa10d141d75f89fe85b2673a48