[webapps] Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/46684
  
  Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/46684
Exploit Database
  
  Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
  Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform
  [webapps] ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46691
  
  ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46691
Exploit Database
  
  ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
  ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit). CVE-2019-11446 . webapps exploit for PHP platform
  [local] Microsoft Internet Explorer 11 - XML External Entity Injection
Microsoft Internet Explorer 11 - XML External Entity Injection
https://www.exploit-db.com/exploits/46690
  
  Microsoft Internet Explorer 11 - XML External Entity Injection
https://www.exploit-db.com/exploits/46690
Exploit Database
  
  Microsoft Internet Explorer 11 - XML External Entity Injection
  Microsoft Internet Explorer 11 - XML External Entity Injection.. local exploit for Windows platform
  [shellcode] Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
https://www.exploit-db.com/exploits/46689
  
  Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
https://www.exploit-db.com/exploits/46689
Exploit Database
  
  Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes)
  Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes).. shellcode exploit for Linux_x86 platform
  [local] CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
https://www.exploit-db.com/exploits/46688
  
  CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
https://www.exploit-db.com/exploits/46688
Exploit Database
  
  CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
  CyberArk EPM 10.2.1.603 - Security Restrictions Bypass. CVE-2018-14894 . local exploit for Windows platform
  [remote] Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
https://www.exploit-db.com/exploits/46693
  
  Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
https://www.exploit-db.com/exploits/46693
Exploit Database
  
  Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
  Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). CVE-2019-9670CVE-2019-9621 . remote exploit for Linux platform
  [local] Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46692
  
  Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46692
Exploit Database
  
  Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
  Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit).. local exploit for Windows platform
  [local] Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/46718
  
  Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/46718
Exploit Database
  
  Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
  Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation. CVE-2019-0836 . local exploit for Windows platform
  [local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
https://www.exploit-db.com/exploits/46717
  
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
https://www.exploit-db.com/exploits/46717
Exploit Database
  
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation. CVE-2019-0805 . local exploit for Windows platform
  [local] Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
https://www.exploit-db.com/exploits/46716
  
  Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
https://www.exploit-db.com/exploits/46716
Exploit Database
  
  Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
  Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass. CVE-2019-0732 . local exploit for Windows platform
  [local] Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
https://www.exploit-db.com/exploits/46715
  
  Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
https://www.exploit-db.com/exploits/46715
Exploit Database
  
  Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
  Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation. CVE-2019-0796 . local exploit for Windows platform
  [local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
https://www.exploit-db.com/exploits/46714
  
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
https://www.exploit-db.com/exploits/46714
Exploit Database
  
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation. CVE-2019-0731 . local exploit for Windows platform
  [local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
https://www.exploit-db.com/exploits/46713
  
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
https://www.exploit-db.com/exploits/46713
Exploit Database
  
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
  Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation. CVE-2019-0730 . local exploit for Windows platform
  [local] Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
https://www.exploit-db.com/exploits/46712
  
  Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
https://www.exploit-db.com/exploits/46712
Exploit Database
  
  Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
  Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation. CVE-2019-0735 . local exploit for Windows platform
  [dos] AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46711
  
  AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46711
Exploit Database
  
  AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
  AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC).. dos exploit for Windows platform
  [webapps] Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
https://www.exploit-db.com/exploits/46710
  
  Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
https://www.exploit-db.com/exploits/46710
Exploit Database
  
  Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
  Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion. CVE-2019-10945 . webapps exploit for PHP platform
  [dos] PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46709
  
  PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46709
Exploit Database
  
  PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
  PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC).. dos exploit for Windows platform
  [dos] PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46708
  
  PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46708
Exploit Database
  
  PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
  PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC).. dos exploit for Windows platform
  [local] Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
https://www.exploit-db.com/exploits/46707
  
  Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
https://www.exploit-db.com/exploits/46707
Exploit Database
  
  Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
  Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation. CVE-2018-19374 . local exploit for Windows platform
  [webapps] Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
https://www.exploit-db.com/exploits/46706
  
  Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
https://www.exploit-db.com/exploits/46706
Exploit Database
  
  Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
  Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting. CVE-2019-9955 . webapps exploit for Hardware platform
  [remote] Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46705
  
  Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46705
Exploit Database
  
  Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
  Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit). CVE-2019-1663 . remote exploit for Hardware platform