[local] Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Exploit Database
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path.. local exploit for Windows platform
[remote] Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Exploit Database
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow.. remote exploit for Windows platform
[local] OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
Exploit Database
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path.. local exploit for Windows platform
[local] Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Exploit Database
Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH).. local exploit for Windows platform
[local] Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Exploit Database
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Exploit Database
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure.. webapps exploit for Hardware platform
[webapps] Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Exploit Database
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass.. webapps exploit for Hardware platform
[local] QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
Exploit Database
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path.. local exploit for Windows platform
[local] Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Exploit Database
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path.. local exploit for Windows platform
[dos] macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
Exploit Database
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common().. dos exploit for macOS platform
[dos] WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
Exploit Database
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive.. dos exploit for Multiple platform
[dos] JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
Exploit Database
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects. CVE-2019-8820 . dos exploit for Multiple platform
[webapps] SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
Exploit Database
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection.. webapps exploit for ASPX platform
[webapps] html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
Exploit Database
html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection.. webapps exploit for PHP platform
[webapps] html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
Exploit Database
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[dos] FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
Exploit Database
FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC).. dos exploit for Windows platform
[webapps] rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
Exploit Database
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection.. webapps exploit for PHP platform
[local] Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Exploit Database
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path.. local exploit for Windows platform
[webapps] thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
Exploit Database
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[local] Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Exploit Database
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path.. local exploit for Windows platform