__–::: Deepquest :::–__

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

  • HOME
  • Archives
  • Coming soon
  • Links
  • /dev/null
  • rss feed
Tag: 0day
2023
02.20

[webapps] pfBlockerNG 2.1.4_26 – Remote Code Execution (RCE)

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
11.11

[webapps] Open Web Analytics 1.7.3 – Remote Code Execution (RCE)

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
11.11

[webapps] CVAT 2.0 – SSRF (Server Side Request Forgery)

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
11.11

[remote] MSNSwitch Firmware MNT.2408 – Remote Code Exectuion (RCE)

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
11.11

[remote] AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 – Path Traversal

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
11.11

[local] IOTransfer V4 – Unquoted Service Path

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
11.11

[remote] SmartRG Router SR510n 2.6.13 – RCE (Remote Code Execution)

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
10.17

[webapps] WordPress Plugin ImageMagick-Engine 1.7.4 – Remote Code Execution (RCE) (Authenticated)

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
10.06

[webapps] WordPress Plugin Zephyr Project Manager 3.2.42 – Multiple SQLi

Category: Security / Tag: 0day, remote exploit / Add Comment
2022
09.30

Exchange Server Zero-Day Being Actively Exploited

Category: exploit / Tag: 0day / Add Comment
« Previous Entries

    NSA/Echelon/Carnivor Jammer

    EZLN ARD Marxist political camera Grey Wolves Panama Mong Tai constitution JKLF NORAD chemical Air Force One c4 Harakat ul-Ansar
© __–::: Deepquest :::–__. Powered by humans