X.Org X Server 1.20.4 – Local Stack Overflow
X.Org X Server 1.20.4 – Local Stack Overflow # Exploit Title: X.Org X Server 1.20.4 – Local Stack Overflow # Date: 2019-10-16 # Exploit
X.Org X Server 1.20.4 – Local Stack Overflow # Exploit Title: X.Org X Server 1.20.4 – Local Stack Overflow # Date: 2019-10-16 # Exploit
LiteManager 4.5.0 – ‘romservice’ Unquoted Serive Path # Exploit Title : LiteManager 4.5.0 – ‘romservice’ Unquoted Serive Path # Date : 2019-10-15 # Exploit
Solaris xscreensaver 11.4 – Privilege Escalation # Exploit Title: Solaris xscreensaver 11.4 – Escalonamento de privilégios # Data: 2019-10-16 # Exploit Autor: Marco Ivaldi
Mikogo 5.2.2.150317 – ‘Mikogo-Service’ Unquoted Serive Path # Exploit Title : Mikogo 5.2.2.150317 – ‘Mikogo-Service’ Unquoted Serive Path # Date : 2019-10-15 # Exploit Author
Whatsapp 2.19.216 – Remote Code Execution # Exploit Title: Whatsapp 2.19.216 – Execução remota de código # Data: 2019-10-16 # Exploit Autor: Valerio Brussani (@val_brux)
WordPress FooGallery 1.8.12 – Persistent Cross-Site Scripting # Exploit Title: WordPress FooGallery 1.8.12 – Script persistente entre sites # Google Dork: inurl: “\ wp-content \
WordPress Soliloquy Lite 2.5.6 – Persistent Cross-Site Scripting # Exploit Title: WordPress Soliloquy Lite 2.5.6 – Script persistente entre sites # Google Dork: inurl: “\
WordPress Popup Builder 3.49 – Persistent Cross-Site Scripting # Exploit Title: WordPress Popup Builder 3.49 – Script persistente entre sites # Google Dork: inurl: “\
ThinVNC 1.0b1 – Authentication Bypass # Exploit Title: ThinVNC 1.0b1 – Authentication Bypass # Date: 2019-10-17 # Exploit Author: Nikhith Tumamlapalli # Contributor WarMarX #
Restaurant Management System 1.0 – Remote Code Execution # Exploit Title: Restaurant Management System 1.0 – Remote Code Execution # Date: 2019-10-16 # Exploit Author:
© 2011 – 2025 Linux Force Security – Todos os direitos reservados | Desenvolvido por Cooder Tecnologia