[dos] JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
Exploit Database
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects. CVE-2019-8820 . dos exploit for Multiple platform
[webapps] SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
Exploit Database
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection.. webapps exploit for ASPX platform
[webapps] html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
Exploit Database
html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection.. webapps exploit for PHP platform
[webapps] html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
Exploit Database
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[dos] FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
FileOptimizer 14.00.2524 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47586
Exploit Database
FileOptimizer 14.00.2524 - Denial of Service (PoC)
FileOptimizer 14.00.2524 - Denial of Service (PoC).. dos exploit for Windows platform
[webapps] rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
https://www.exploit-db.com/exploits/47585
Exploit Database
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection
rimbalinux AhadPOS 1.11 - 'alamatCustomer' SQL Injection.. webapps exploit for PHP platform
[local] Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
https://www.exploit-db.com/exploits/47584
Exploit Database
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path.. local exploit for Windows platform
[webapps] thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47583
Exploit Database
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting
thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[local] Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
https://www.exploit-db.com/exploits/47582
Exploit Database
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path
Blue Stacks App Player 2.4.44.62.57 - "BstHdLogRotatorSvc" Unquote Service Path.. local exploit for Windows platform
[webapps] thejshen Globitek CMS 1.4 - 'id' SQL Injection
thejshen Globitek CMS 1.4 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47581
thejshen Globitek CMS 1.4 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47581
Exploit Database
thejshen Globitek CMS 1.4 - 'id' SQL Injection
thejshen Globitek CMS 1.4 - 'id' SQL Injection.. webapps exploit for PHP platform
[local] Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/47580
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/47580
Exploit Database
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit). CVE-2019-11660 . local exploit for Linux platform
[webapps] Nextcloud 17 - Cross-Site Request Forgery
Nextcloud 17 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47603
Nextcloud 17 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47603
Exploit Database
Nextcloud 17 - Cross-Site Request Forgery
Nextcloud 17 - Cross-Site Request Forgery.. webapps exploit for PHP platform
[remote] rConfig - install Command Execution (Metasploit)
rConfig - install Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47602
rConfig - install Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47602
Exploit Database
rConfig - install Command Execution (Metasploit)
rConfig - install Command Execution (Metasploit). CVE-2019-16662 . remote exploit for Linux platform
[local] Android Janus - APK Signature Bypass (Metasploit)
Android Janus - APK Signature Bypass (Metasploit)
https://www.exploit-db.com/exploits/47601
Android Janus - APK Signature Bypass (Metasploit)
https://www.exploit-db.com/exploits/47601
Exploit Database
Android Janus - APK Signature Bypass (Metasploit)
Android Janus - APK Signature Bypass (Metasploit). CVE-2017-13156 . local exploit for Android platform
[webapps] Adive Framework 2.0.7 - Privilege Escalation
Adive Framework 2.0.7 - Privilege Escalation
https://www.exploit-db.com/exploits/47600
Adive Framework 2.0.7 - Privilege Escalation
https://www.exploit-db.com/exploits/47600
Exploit Database
Adive Framework 2.0.7 - Privilege Escalation
Adive Framework 2.0.7 - Privilege Escalation. CVE-2019-14347 . webapps exploit for PHP platform
[local] SolarWinds Kiwi Syslog Server 8.3.52 - 'Kiwi Syslog Server' Unquoted Service Path
SolarWinds Kiwi Syslog Server 8.3.52 - 'Kiwi Syslog Server' Unquoted Service Path
https://www.exploit-db.com/exploits/47599
SolarWinds Kiwi Syslog Server 8.3.52 - 'Kiwi Syslog Server' Unquoted Service Path
https://www.exploit-db.com/exploits/47599
Exploit Database
SolarWinds Kiwi Syslog Server 8.3.52 - 'Kiwi Syslog Server' Unquoted Service Path
SolarWinds Kiwi Syslog Server 8.3.52 - 'Kiwi Syslog Server' Unquoted Service Path.. local exploit for Windows platform
[webapps] Jenkins build-metrics plugin 1.3 - 'label' Cross-Site Scripting
Jenkins build-metrics plugin 1.3 - 'label' Cross-Site Scripting
https://www.exploit-db.com/exploits/47598
Jenkins build-metrics plugin 1.3 - 'label' Cross-Site Scripting
https://www.exploit-db.com/exploits/47598
Exploit Database
Jenkins build-metrics plugin 1.3 - 'label' Cross-Site Scripting
Jenkins build-metrics plugin 1.3 - 'label' Cross-Site Scripting. CVE-2019-10475 . webapps exploit for Java platform
[local] ScanGuard Antivirus 2020 - Insecure Folder Permissions
ScanGuard Antivirus 2020 - Insecure Folder Permissions
https://www.exploit-db.com/exploits/47656
ScanGuard Antivirus 2020 - Insecure Folder Permissions
https://www.exploit-db.com/exploits/47656
Exploit Database
ScanGuard Antivirus 2020 - Insecure Folder Permissions
ScanGuard Antivirus 2020 - Insecure Folder Permissions.. local exploit for Windows platform
[webapps] Fastweb Fastgate 0.00.81 - Remote Code Execution
Fastweb Fastgate 0.00.81 - Remote Code Execution
https://www.exploit-db.com/exploits/47654
Fastweb Fastgate 0.00.81 - Remote Code Execution
https://www.exploit-db.com/exploits/47654
Exploit Database
Fastweb Fastgate 0.00.81 - Remote Code Execution
Fastweb Fastgate 0.00.81 - Remote Code Execution.. webapps exploit for Hardware platform
[webapps] gSOAP 2.8 - Directory Traversal
gSOAP 2.8 - Directory Traversal
https://www.exploit-db.com/exploits/47653
gSOAP 2.8 - Directory Traversal
https://www.exploit-db.com/exploits/47653
Exploit Database
gSOAP 2.8 - Directory Traversal
gSOAP 2.8 - Directory Traversal.. webapps exploit for PHP platform