[remote] Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48334
  
  Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48334
Exploit Database
  
  Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
  Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit).. remote exploit for Linux platform
  [remote] ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
https://www.exploit-db.com/exploits/48333
  
  ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
https://www.exploit-db.com/exploits/48333
Exploit Database
  
  ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
  ThinkPHP - Multiple PHP Injection RCEs (Metasploit). CVE-2019-9082CVE-2018-20062 . remote exploit for Linux platform
  [local] Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48397
  
  Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48397
Exploit Database
  
  Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
  Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC).. local exploit for Windows platform
  [local] Andrea ST Filters Service  1.0.64.7  - 'Andrea ST Filters Service ' Unquoted Service Path
Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
https://www.exploit-db.com/exploits/48396
  
  Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
https://www.exploit-db.com/exploits/48396
Exploit Database
  
  Andrea ST Filters Service  1.0.64.7  - 'Andrea ST Filters Service ' Unquoted Service Path
  Andrea ST Filters Service  1.0.64.7  - 'Andrea ST Filters Service ' Unquoted Service Path.. local exploit for Windows platform
  [webapps] Easy Transfer 1.7 for iOS - Directory Traversal
Easy Transfer 1.7 for iOS - Directory Traversal
https://www.exploit-db.com/exploits/48395
  
  Easy Transfer 1.7 for iOS - Directory Traversal
https://www.exploit-db.com/exploits/48395
Exploit Database
  
  Easy Transfer 1.7 for iOS - Directory Traversal
  Easy Transfer 1.7 for iOS - Directory Traversal.. webapps exploit for iOS platform
  [webapps] School ERP Pro 1.0 - Arbitrary File Read
School ERP Pro 1.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48394
  
  School ERP Pro 1.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48394
Exploit Database
  
  School ERP Pro 1.0 - Arbitrary File Read
  School ERP Pro 1.0 - Arbitrary File Read.. webapps exploit for PHP platform
  [webapps] Open-AudIT Professional 3.3.1 - Remote Code Execution
Open-AudIT Professional 3.3.1 - Remote Code Execution
https://www.exploit-db.com/exploits/48393
  
  Open-AudIT Professional 3.3.1 - Remote Code Execution
https://www.exploit-db.com/exploits/48393
Exploit Database
  
  Open-AudIT Professional 3.3.1 - Remote Code Execution
  Open-AudIT Professional 3.3.1 - Remote Code Execution.. webapps exploit for PHP platform
  [webapps] School ERP Pro 1.0 - Remote Code Execution
School ERP Pro 1.0 - Remote Code Execution
https://www.exploit-db.com/exploits/48392
  
  School ERP Pro 1.0 - Remote Code Execution
https://www.exploit-db.com/exploits/48392
Exploit Database
  
  School ERP Pro 1.0 - Remote Code Execution
  School ERP Pro 1.0 - Remote Code Execution.. webapps exploit for PHP platform
  [local] NVIDIA Update Service Daemon 1.0.21  - 'nvUpdatusService' Unquoted Service Path
NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path
https://www.exploit-db.com/exploits/48391
  
  NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path
https://www.exploit-db.com/exploits/48391
Exploit Database
  
  NVIDIA Update Service Daemon 1.0.21  - 'nvUpdatusService' Unquoted Service Path
  NVIDIA Update Service Daemon 1.0.21  - 'nvUpdatusService' Unquoted Service Path.. local exploit for Windows platform
  [webapps] School ERP Pro 1.0 - 'es_messagesid' SQL Injection
School ERP Pro 1.0 - 'es_messagesid' SQL Injection
https://www.exploit-db.com/exploits/48390
  
  School ERP Pro 1.0 - 'es_messagesid' SQL Injection
https://www.exploit-db.com/exploits/48390
Exploit Database
  
  School ERP Pro 1.0 - 'es_messagesid' SQL Injection
  School ERP Pro 1.0 - 'es_messagesid' SQL Injection.. webapps exploit for PHP platform
  [remote] CloudMe 1.11.2 - Buffer Overflow (PoC)
CloudMe 1.11.2 - Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48389
  CloudMe 1.11.2 - Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48389
[local] Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48388
  
  Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48388
Exploit Database
  
  Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
  Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit). CVE-2019-15752 . local exploit for Windows platform
  [local] Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/48387
  
  Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/48387
Exploit Database
  
  Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
  Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution. CVE-2020-12242 . local exploit for macOS platform
  [webapps] Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
https://www.exploit-db.com/exploits/48386
  
  Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
https://www.exploit-db.com/exploits/48386
Exploit Database
  
  Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
  Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin).. webapps exploit for PHP platform
  [webapps] Online Course Registration 2.0 - Authentication Bypass
Online Course Registration 2.0 - Authentication Bypass
https://www.exploit-db.com/exploits/48385
  
  Online Course Registration 2.0 - Authentication Bypass
https://www.exploit-db.com/exploits/48385
Exploit Database
  
  Online Course Registration 2.0 - Authentication Bypass
  Online Course Registration 2.0 - Authentication Bypass.. webapps exploit for PHP platform
  [webapps] Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
https://www.exploit-db.com/exploits/48384
  
  Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
https://www.exploit-db.com/exploits/48384
Exploit Database
  
  Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
  Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak.. webapps exploit for Hardware platform
  [webapps] Online shopping system advanced 1.0 - 'p' SQL Injection
Online shopping system advanced 1.0 - 'p' SQL Injection
https://www.exploit-db.com/exploits/48383
  
  Online shopping system advanced 1.0 - 'p' SQL Injection
https://www.exploit-db.com/exploits/48383
Exploit Database
  
  Online shopping system advanced 1.0 - 'p' SQL Injection
  Online shopping system advanced 1.0 - 'p' SQL Injection.. webapps exploit for PHP platform
  [webapps] Netis E1+ 1.2.32533 - Backdoor Account (root)
Netis E1+ 1.2.32533 - Backdoor Account (root)
https://www.exploit-db.com/exploits/48382
  
  Netis E1+ 1.2.32533 - Backdoor Account (root)
https://www.exploit-db.com/exploits/48382
Exploit Database
  
  Netis E1+ 1.2.32533 - Backdoor Account (root)
  Netis E1+ 1.2.32533 - Backdoor Account (root).. webapps exploit for Hardware platform
  [webapps] PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload
PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload
https://www.exploit-db.com/exploits/48381
  
  PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload
https://www.exploit-db.com/exploits/48381
Exploit Database
  
  PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload
  PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload.. webapps exploit for PHP platform
  [webapps] Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution
Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution
https://www.exploit-db.com/exploits/48380
  
  Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution
https://www.exploit-db.com/exploits/48380
Exploit Database
  
  Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution
  Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution.. webapps exploit for Java platform
  [local] Popcorn Time 6.2 - 'Update service' Unquoted Service Path
Popcorn Time 6.2 - 'Update service' Unquoted Service Path
https://www.exploit-db.com/exploits/48378
  
  Popcorn Time 6.2 - 'Update service' Unquoted Service Path
https://www.exploit-db.com/exploits/48378
Exploit Database
  
  Popcorn Time 6.2 - 'Update service' Unquoted Service Path
  Popcorn Time 6.2 - 'Update service' Unquoted Service Path.. local exploit for Windows platform