[webapps] TP LINK TL-WR849N - Remote Code Execution
TP LINK TL-WR849N - Remote Code Execution
https://www.exploit-db.com/exploits/48155
  
  TP LINK TL-WR849N - Remote Code Execution
https://www.exploit-db.com/exploits/48155
Exploit Database
  
  TP LINK TL-WR849N - Remote Code Execution
  TP LINK TL-WR849N - Remote Code Execution. CVE-2020-9374 . webapps exploit for Hardware platform
  [webapps] Wing FTP Server 6.2.5 - Privilege Escalation
Wing FTP Server 6.2.5 - Privilege Escalation
https://www.exploit-db.com/exploits/48154
  
  Wing FTP Server 6.2.5 - Privilege Escalation
https://www.exploit-db.com/exploits/48154
Exploit Database
  
  Wing FTP Server 6.2.5 - Privilege Escalation
  Wing FTP Server 6.2.5 - Privilege Escalation.. webapps exploit for Multiple platform
  [remote] Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/48153
  
  Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/48153
Exploit Database
  
  Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
  Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution. CVE-2020-0688 . remote exploit for Windows platform
  [webapps] TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
https://www.exploit-db.com/exploits/48152
  
  TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
https://www.exploit-db.com/exploits/48152
Exploit Database
  
  TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
  TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware). CVE-2019-19143 . webapps exploit for Hardware platform
  [webapps] Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
https://www.exploit-db.com/exploits/48151
  
  Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
https://www.exploit-db.com/exploits/48151
Exploit Database
  
  WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
  WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User). CVE-2020-8615 . webapps exploit for PHP platform
  [webapps] RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48161
  
  RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48161
Exploit Database
  
  RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
  RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
  [webapps] Alfresco 5.2.4 - Persistent Cross-Site Scripting
Alfresco 5.2.4 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48162
  
  Alfresco 5.2.4 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48162
Exploit Database
  
  Alfresco 5.2.4 - Persistent Cross-Site Scripting
  Alfresco 5.2.4 - Persistent Cross-Site Scripting. CVE-2020-8778CVE-2020-8777CVE-2020-8776 . webapps exploit for PHP platform
  [webapps] RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
  
  RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
Exploit Database
  
  RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
  RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
  [webapps] GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
  
  GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
Exploit Database
  
  GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
  GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection.. webapps exploit for PHP platform
  [webapps] UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
  
  UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
Exploit Database
  
  UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
  UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read.. webapps exploit for PHP platform
  [remote] EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
  
  EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
Exploit Database
  
  EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
  EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit). CVE-2020-8657CVE-2020-8656CVE-2020-8655CVE-2020-8654 . remote exploit for Multiple platform
  [remote] Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
  
  Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exploit Database
  
  Exchange Control Panel - Viewstate Deserialization (Metasploit)
  Exchange Control Panel - Viewstate Deserialization (Metasploit). CVE-2020-0688 . remote exploit for Windows platform
  [remote] netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
  
  netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
Exploit Database
  
  netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
  netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution.. remote exploit for Linux platform
  [local] SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
  
  SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
Exploit Database
  
  SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
  SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path.. local exploit for Windows platform
  [local] Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
https://www.exploit-db.com/exploits/48171
  
  Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
https://www.exploit-db.com/exploits/48171
Exploit Database
  
  Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
  Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path.. local exploit for Windows platform
  [local] Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
https://www.exploit-db.com/exploits/48174
  
  Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
https://www.exploit-db.com/exploits/48174
Exploit Database
  
  Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
  Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path.. local exploit for Windows platform
  [local] ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
https://www.exploit-db.com/exploits/48173
  
  ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
https://www.exploit-db.com/exploits/48173
Exploit Database
  
  ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
  ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path.. local exploit for Windows platform
  [webapps] ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/48176
  
  ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/48176
Exploit Database
  
  ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
  ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution.. webapps exploit for Multiple platform
  [webapps] 60CycleCMS  - 'news.php' SQL Injection
60CycleCMS - 'news.php' SQL Injection
https://www.exploit-db.com/exploits/48177
  
  60CycleCMS - 'news.php' SQL Injection
https://www.exploit-db.com/exploits/48177
Exploit Database
  
  60CycleCMS - 'news.php' SQL Injection
  60CycleCMS - 'news.php' SQL Injection.. webapps exploit for PHP platform
  [webapps] Sentrifugo HRMS 3.2 - 'id' SQL Injection
Sentrifugo HRMS 3.2 - 'id' SQL Injection
https://www.exploit-db.com/exploits/48179
  
  Sentrifugo HRMS 3.2 - 'id' SQL Injection
https://www.exploit-db.com/exploits/48179
Exploit Database
  
  Sentrifugo HRMS 3.2 - 'id' SQL Injection
  Sentrifugo HRMS 3.2 - 'id' SQL Injection.. webapps exploit for PHP platform
  [local] Microsoft Windows - 'WizardOpium' Local Privilege Escalation
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
https://www.exploit-db.com/exploits/48180
  
  Microsoft Windows - 'WizardOpium' Local Privilege Escalation
https://www.exploit-db.com/exploits/48180
Exploit Database
  
  Microsoft Windows - 'WizardOpium' Local Privilege Escalation
  Microsoft Windows - 'WizardOpium' Local Privilege Escalation. CVE-2019-1458 . local exploit for Windows platform