[local] NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths
NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths
https://www.exploit-db.com/exploits/47668
NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths
https://www.exploit-db.com/exploits/47668
Exploit Database
NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths
NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths.. local exploit for Windows platform
[local] MobileGo 8.5.0 - Insecure File Permissions
MobileGo 8.5.0 - Insecure File Permissions
https://www.exploit-db.com/exploits/47667
MobileGo 8.5.0 - Insecure File Permissions
https://www.exploit-db.com/exploits/47667
Exploit Database
MobileGo 8.5.0 - Insecure File Permissions
MobileGo 8.5.0 - Insecure File Permissions.. local exploit for Windows platform
[webapps] Crystal Live HTTP Server 6.01 - Directory Traversal
Crystal Live HTTP Server 6.01 - Directory Traversal
https://www.exploit-db.com/exploits/47666
Crystal Live HTTP Server 6.01 - Directory Traversal
https://www.exploit-db.com/exploits/47666
Exploit Database
Crystal Live HTTP Server 6.01 - Directory Traversal
Crystal Live HTTP Server 6.01 - Directory Traversal.. webapps exploit for ASP platform
[dos] Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC)
Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC)
https://www.exploit-db.com/exploits/47665
Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC)
https://www.exploit-db.com/exploits/47665
Exploit Database
Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC)
Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC).. dos exploit for iOS platform
[local] ASUS HM Com Service 1.00.31 - 'asHMComSvc' Unquoted Service Path
ASUS HM Com Service 1.00.31 - 'asHMComSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/47664
ASUS HM Com Service 1.00.31 - 'asHMComSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/47664
Exploit Database
ASUS HM Com Service 1.00.31 - 'asHMComSvc' Unquoted Service Path
ASUS HM Com Service 1.00.31 - 'asHMComSvc' Unquoted Service Path.. local exploit for Windows platform
[webapps] Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal
Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal
https://www.exploit-db.com/exploits/47663
Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal
https://www.exploit-db.com/exploits/47663
Exploit Database
Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal
Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal. CVE-2019-16758 . webapps exploit for Hardware platform
[dos] iSmartViewPro 1.3.34 - Denial of Service (PoC)
iSmartViewPro 1.3.34 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47662
iSmartViewPro 1.3.34 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47662
Exploit Database
iSmartViewPro 1.3.34 - Denial of Service (PoC)
iSmartViewPro 1.3.34 - Denial of Service (PoC).. dos exploit for Windows platform
[local] Emerson PAC Machine Edition 9.70 Build 8595 - 'FxControlRuntime' Unquoted Service Path
Emerson PAC Machine Edition 9.70 Build 8595 - 'FxControlRuntime' Unquoted Service Path
https://www.exploit-db.com/exploits/47661
Emerson PAC Machine Edition 9.70 Build 8595 - 'FxControlRuntime' Unquoted Service Path
https://www.exploit-db.com/exploits/47661
Exploit Database
Emerson PAC Machine Edition 9.70 Build 8595 - 'FxControlRuntime' Unquoted Service Path
Emerson PAC Machine Edition 9.70 Build 8595 - 'FxControlRuntime' Unquoted Service Path.. local exploit for Windows platform
[webapps] WordPress Core < 5.2.3 - Viewing Unauthenticated/Password/Private Posts
WordPress Core < 5.2.3 - Viewing Unauthenticated/Password/Private Posts
https://www.exploit-db.com/exploits/47690
WordPress Core < 5.2.3 - Viewing Unauthenticated/Password/Private Posts
https://www.exploit-db.com/exploits/47690
Exploit Database
WordPress Core < 5.2.3 - Viewing Unauthenticated/Password/Private Posts
WordPress Core < 5.2.3 - Viewing Unauthenticated/Password/Private Posts. CVE-2019-17671 . webapps exploit for Multiple platform
[webapps] Apache Httpd mod_rewrite - Open Redirects
Apache Httpd mod_rewrite - Open Redirects
https://www.exploit-db.com/exploits/47689
Apache Httpd mod_rewrite - Open Redirects
https://www.exploit-db.com/exploits/47689
Exploit Database
Apache Httpd mod_rewrite - Open Redirects
Apache Httpd mod_rewrite - Open Redirects. CVE-2019-10098 . webapps exploit for Multiple platform
[webapps] Apache Httpd mod_proxy - Error Page Cross-Site Scripting
Apache Httpd mod_proxy - Error Page Cross-Site Scripting
https://www.exploit-db.com/exploits/47688
Apache Httpd mod_proxy - Error Page Cross-Site Scripting
https://www.exploit-db.com/exploits/47688
Exploit Database
Apache Httpd mod_proxy - Error Page Cross-Site Scripting
Apache Httpd mod_proxy - Error Page Cross-Site Scripting. CVE-2019-10092 . webapps exploit for Multiple platform
[remote] Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
https://www.exploit-db.com/exploits/47686
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
https://www.exploit-db.com/exploits/47686
Exploit Database
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution. CVE-2019-1821 . remote exploit for Linux platform
[local] DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
https://www.exploit-db.com/exploits/47685
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
https://www.exploit-db.com/exploits/47685
Exploit Database
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'.. local exploit for Windows_x86-64 platform
[local] Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
https://www.exploit-db.com/exploits/47684
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
https://www.exploit-db.com/exploits/47684
Exploit Database
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation. CVE-2019-1405CVE-2019-1322 . local exploit for Windows platform
[remote] Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
https://www.exploit-db.com/exploits/47683
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
https://www.exploit-db.com/exploits/47683
Exploit Database
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free. CVE-2019-0708 . remote exploit for Windows_x86 platform
[local] macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
https://www.exploit-db.com/exploits/47708
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
https://www.exploit-db.com/exploits/47708
Exploit Database
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache.. local exploit for macOS platform
[dos] Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
https://www.exploit-db.com/exploits/47707
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
https://www.exploit-db.com/exploits/47707
Exploit Database
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback. CVE-2019-1429 . dos exploit for Windows platform
[local] LiteManager 4.5.0 - Insecure File Permissions
LiteManager 4.5.0 - Insecure File Permissions
https://www.exploit-db.com/exploits/47706
LiteManager 4.5.0 - Insecure File Permissions
https://www.exploit-db.com/exploits/47706
Exploit Database
LiteManager 4.5.0 - Insecure File Permissions
LiteManager 4.5.0 - Insecure File Permissions.. local exploit for Windows platform
[local] ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
https://www.exploit-db.com/exploits/47705
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
https://www.exploit-db.com/exploits/47705
Exploit Database
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path.. local exploit for Windows platform
[webapps] Network Management Card 6.2.0 - Host Header Injection
Network Management Card 6.2.0 - Host Header Injection
https://www.exploit-db.com/exploits/47704
Network Management Card 6.2.0 - Host Header Injection
https://www.exploit-db.com/exploits/47704
Exploit Database
Network Management Card 6.2.0 - Host Header Injection
Network Management Card 6.2.0 - Host Header Injection.. webapps exploit for Hardware platform