[webapps] Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Exploit Database
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure.. webapps exploit for Hardware platform
[webapps] Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Exploit Database
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass.. webapps exploit for Hardware platform
[local] QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
Exploit Database
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path.. local exploit for Windows platform
[local] Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Exploit Database
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path.. local exploit for Windows platform
[dos] macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
Exploit Database
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common().. dos exploit for macOS platform
[dos] WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
Exploit Database
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive.. dos exploit for Multiple platform
[dos] JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
Exploit Database
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects. CVE-2019-8820 . dos exploit for Multiple platform
[webapps] SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
Exploit Database
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection.. webapps exploit for ASPX platform
[webapps] html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
Exploit Database
html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection.. webapps exploit for PHP platform
[webapps] html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
Exploit Database
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[dos] FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
Exploit Database
FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC).. dos exploit for Windows platform
[webapps] rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
Exploit Database
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection.. webapps exploit for PHP platform
[local] Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Exploit Database
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path.. local exploit for Windows platform
[webapps] thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
Exploit Database
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[local] Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Exploit Database
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path.. local exploit for Windows platform
[webapps] thejshen Globitek CMS 1.4 - 'id' SQL Injection
thejshen Globitek CMS 1.4 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47581
thejshen Globitek CMS 1.4 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47581
Exploit Database
thejshen Globitek CMS 1.4 - 'id' SQL Injection
thejshen Globitek CMS 1.4 - 'id' SQL Injection.. webapps exploit for PHP platform
[local] Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/47580
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/47580
Exploit Database
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit). CVE-2019-11660 . local exploit for Linux platform
[webapps] Nextcloud 17 - Cross-Site Request Forgery
Nextcloud 17 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47603
Nextcloud 17 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47603
Exploit Database
Nextcloud 17 - Cross-Site Request Forgery
Nextcloud 17 - Cross-Site Request Forgery.. webapps exploit for PHP platform
[remote] rConfig - install Command Execution (Metasploit)
rConfig - install Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47602
rConfig - install Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47602
Exploit Database
rConfig - install Command Execution (Metasploit)
rConfig - install Command Execution (Metasploit). CVE-2019-16662 . remote exploit for Linux platform
[local] Android Janus - APK Signature Bypass (Metasploit)
Android Janus - APK Signature Bypass (Metasploit)
https://www.exploit-db.com/exploits/47601
Android Janus - APK Signature Bypass (Metasploit)
https://www.exploit-db.com/exploits/47601
Exploit Database
Android Janus - APK Signature Bypass (Metasploit)
Android Janus - APK Signature Bypass (Metasploit). CVE-2017-13156 . local exploit for Android platform