[papers] – Exploiting Apache James Server 2.3.2
Posted by deepcore under Security (No Respond)
Axis Communications MPQT/PACS 5.20.x – Server Side Include (SSI) Daemon Remote Format String Exploit
Tags: 0day, remote exploitvBulletin 5.x/4.x – Persistent XSS in AdminCP/ApiLog via xmlrpc API (Post-Auth)
Tags: 0day, remote exploitInternet Explorer 11 (on Windows 10) – VBScript Memory Corruption Proof-of-Concept Exploit (MS16-051)
Tags: 0day, remote exploithttp://provisgis.ntwo.moph.go.th/hunter.html notified by HUNT3RXM
Tags: defacement