[dos] Apple macOS 10.15.1 - Denial of Service (PoC)
Apple macOS 10.15.1 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47578
  
  Apple macOS 10.15.1 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47578
Exploit Database
  
  Apple macOS 10.15.1 - Denial of Service (PoC)
  Apple macOS 10.15.1 - Denial of Service (PoC).. dos exploit for macOS platform
  [local] Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
  
  Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Exploit Database
  
  Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
  Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path.. local exploit for Windows platform
  [remote] Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
  
  Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Exploit Database
  
  Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
  Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow.. remote exploit for Windows platform
  [local] OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
  
  OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
Exploit Database
  
  OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path
  OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path.. local exploit for Windows platform
  [local] Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
  
  Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Exploit Database
  
  Aida64 6.10.5200 - Buffer Overflow (SEH)
  Aida64 6.10.5200 - Buffer Overflow (SEH).. local exploit for Windows platform
  [local] Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
  
  Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Exploit Database
  
  Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
  Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path.. local exploit for Windows platform
  [webapps] Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
  
  Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Exploit Database
  
  Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
  Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure.. webapps exploit for Hardware platform
  [webapps] Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
  
  Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Exploit Database
  
  Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
  Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass.. webapps exploit for Hardware platform
  [local] QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
  
  QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
Exploit Database
  
  QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
  QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path.. local exploit for Windows platform
  [local] Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
  
  Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Exploit Database
  
  Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
  Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path.. local exploit for Windows platform
  [dos] macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
  
  macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
Exploit Database
  
  macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
  macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common().. dos exploit for macOS platform
  [dos] WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
  
  WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
Exploit Database
  
  WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
  WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive.. dos exploit for Multiple platform
  [dos] JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
  
  JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
Exploit Database
  
  JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
  JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects. CVE-2019-8820 . dos exploit for Multiple platform
  [webapps] SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
  
  SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
Exploit Database
  
  SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
  SD.NET RIM 4.7.3c - 'idtyp' SQL Injection.. webapps exploit for ASPX platform
  [webapps] html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
  
  html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
Exploit Database
  
  html5_snmp 1.11 - 'Router_ID' SQL Injection
  html5_snmp 1.11 - 'Router_ID' SQL Injection.. webapps exploit for PHP platform
  [webapps] html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
  
  html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
Exploit Database
  
  html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
  html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
  [dos] FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
  
  FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
Exploit Database
  
  FileOptimizer 14.00.2524 - Denial of Service (PoC)
  FileOptimizer 14.00.2524 - Denial of Service (PoC).. dos exploit for Windows platform
  [webapps] rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
  
  rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
Exploit Database
  
  rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
  rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection.. webapps exploit for PHP platform
  [local] Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
  
  Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Exploit Database
  
  Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
  Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path.. local exploit for Windows platform
  [webapps] thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
  
  thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
Exploit Database
  
  thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
  thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
  [local] Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
  
  Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Exploit Database
  
  Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
  Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path.. local exploit for Windows platform