D-Link DIR-600M – Authentication Bypass (Metasploit)
>> TAG: #0day
D-Link DIR-600M – Authentication Bypass (Metasploit)
TortoiseSVN 1.12.1 – Remote Code Execution
Microsoft Windows 10 AppXSvc Deployment Service – Arbitrary File Deletion
ABC2MTEX 1.6.1 – Command Line Stack Overflow
ManageEngine opManager 12.3.150 – Authenticated Code Execution
Agent Tesla Botnet – Arbitrary Code Execution (Metasploit)
Agent Tesla Botnet – Arbitrary Code Execution
Azorult Botnet – SQL Injection
Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 – ‘ticketreply.php’ SQL Injection
osTicket 1.12 – Persistent Cross-Site Scripting via File Upload