TP-Link TL-WR1043ND 2 – Authentication Bypass
>> TAG: #remote exploit
TP-Link TL-WR1043ND 2 – Authentication Bypass
Windows Kernel – NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
Windows Kernel – Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
Windows Kernel – Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
SMA Solar Technology AG Sunny WebBox device – 1.6 – Cross-Site Request Forgery
Windows Kernel – Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
Windows Kernel – Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
Foscam Video Management System 1.1.6.6 – ‘UID’ Denial of Service (PoC)
DeviceViewer 3.12.0.1 – ‘add user’ Local Buffer Overflow (DEP Bypass)
XNU – Remote Double-Free via Data Race in IPComp Input Path