[local] NETGATE Data Backup 3.0.620 - 'NGDatBckpSrv' Unquoted Service Path
NETGATE Data Backup 3.0.620 - 'NGDatBckpSrv' Unquoted Service Path
https://www.exploit-db.com/exploits/47746
  
  NETGATE Data Backup 3.0.620 - 'NGDatBckpSrv' Unquoted Service Path
https://www.exploit-db.com/exploits/47746
Exploit Database
  
  NETGATE Data Backup 3.0.620 - 'NGDatBckpSrv' Unquoted Service Path
  NETGATE Data Backup 3.0.620 - 'NGDatBckpSrv' Unquoted Service Path.. local exploit for Windows platform
  [local] Amiti Antivirus 25.0.640 - Unquoted Service Path
Amiti Antivirus 25.0.640 - Unquoted Service Path
https://www.exploit-db.com/exploits/47747
  
  Amiti Antivirus 25.0.640 - Unquoted Service Path
https://www.exploit-db.com/exploits/47747
Exploit Database
  
  Amiti Antivirus 25.0.640 - Unquoted Service Path
  Amiti Antivirus 25.0.640 - Unquoted Service Path.. local exploit for Windows platform
  [webapps] Broadcom CA Privilged Access Manager 2.8.2 - Remote Command Execution
Broadcom CA Privilged Access Manager 2.8.2 - Remote Command Execution
https://www.exploit-db.com/exploits/47748
  
  Broadcom CA Privilged Access Manager 2.8.2 - Remote Command Execution
https://www.exploit-db.com/exploits/47748
Exploit Database
  
  Broadcom CA Privilged Access Manager 2.8.2 - Remote Command Execution
  Broadcom CA Privilged Access Manager 2.8.2 - Remote Command Execution. CVE-2018-9022CVE-2018-9021 . webapps exploit for Windows platform
  [webapps] Verot 2.0.3 - Remote Code Execution
Verot 2.0.3 - Remote Code Execution
https://www.exploit-db.com/exploits/47749
  
  Verot 2.0.3 - Remote Code Execution
https://www.exploit-db.com/exploits/47749
Exploit Database
  
  Verot 2.0.3 - Remote Code Execution
  Verot 2.0.3 - Remote Code Execution. CVE-2019-19576 . webapps exploit for PHP platform
  [local] Trend Micro Deep Security Agent 11 - Arbitrary File Overwrite
Trend Micro Deep Security Agent 11 - Arbitrary File Overwrite
https://www.exploit-db.com/exploits/47751
  
  Trend Micro Deep Security Agent 11 - Arbitrary File Overwrite
https://www.exploit-db.com/exploits/47751
Exploit Database
  
  Trend Micro Deep Security Agent 11 - Arbitrary File Overwrite
  Trend Micro Deep Security Agent 11 - Arbitrary File Overwrite. CVE-2019-15627 . local exploit for Windows platform
  [remote] Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow
Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow
https://www.exploit-db.com/exploits/47750
  
  Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow
https://www.exploit-db.com/exploits/47750
Exploit Database
  
  Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow
  Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow. CVE-2019-16702 . remote exploit for Windows platform
  [local] Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
https://www.exploit-db.com/exploits/47752
  
  Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
https://www.exploit-db.com/exploits/47752
Exploit Database
  
  Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
  Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack. CVE-2019-9810CVE-2019-11708 . local exploit for Windows_x86-64 platform
  [local] Microsoft Windows - Multiple UAC Protection Bypasses
Microsoft Windows - Multiple UAC Protection Bypasses
https://www.exploit-db.com/exploits/47753
  
  Microsoft Windows - Multiple UAC Protection Bypasses
https://www.exploit-db.com/exploits/47753
Exploit Database
  
  Microsoft Windows - Multiple UAC Protection Bypasses
  Microsoft Windows - Multiple UAC Protection Bypasses.. local exploit for Windows platform
  [local] Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry)
Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry)
https://www.exploit-db.com/exploits/47754
  
  Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry)
https://www.exploit-db.com/exploits/47754
Exploit Database
  
  Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry)
  Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry).. local exploit for Windows platform
  [local] Microsoft Windows 10 - 'WSReset' UAC Protection Bypass (propsys.dll)
Microsoft Windows 10 - 'WSReset' UAC Protection Bypass (propsys.dll)
https://www.exploit-db.com/exploits/47755
  
  Microsoft Windows 10 - 'WSReset' UAC Protection Bypass (propsys.dll)
https://www.exploit-db.com/exploits/47755
Exploit Database
  
  Microsoft Windows 10 - 'WSReset' UAC Protection Bypass (propsys.dll)
  Microsoft Windows 10 - 'WSReset' UAC Protection Bypass (propsys.dll).. local exploit for Windows platform
  [webapps] PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentication Bypass
PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentication Bypass
https://www.exploit-db.com/exploits/47758
  
  PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentication Bypass
https://www.exploit-db.com/exploits/47758
Exploit Database
  
  PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentication Bypass
  PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentication Bypass.. webapps exploit for PHP platform
  [dos] Omron PLC 1.0.0 - Denial of Service (PoC)
Omron PLC 1.0.0 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47757
  
  Omron PLC 1.0.0 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47757
Exploit Database
  
  Omron PLC 1.0.0 - Denial of Service (PoC)
  Omron PLC 1.0.0 - Denial of Service (PoC).. dos exploit for Hardware platform
  [webapps] Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting
Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47756
  
  Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47756
Exploit Database
  
  Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting
  Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting.. webapps exploit for PHP platform
  [local] SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH)
SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47759
  
  SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47759
Exploit Database
  
  SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH)
  SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH).. local exploit for Windows platform
  [webapps] Alcatel-Lucent Omnivista 8770 - Remote Code Execution
Alcatel-Lucent Omnivista 8770 - Remote Code Execution
https://www.exploit-db.com/exploits/47761
  
  Alcatel-Lucent Omnivista 8770 - Remote Code Execution
https://www.exploit-db.com/exploits/47761
Exploit Database
  
  Alcatel-Lucent Omnivista 8770 - Remote Code Execution
  Alcatel-Lucent Omnivista 8770 - Remote Code Execution.. webapps exploit for PHP platform
  [webapps] Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution
Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/47760
  
  Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/47760
Exploit Database
  
  Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution
  Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution.. webapps exploit for Hardware platform
  [webapps] Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47762
  
  Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47762
Exploit Database
  
  Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
  Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting.. webapps exploit for Java platform
  [local] Inim Electronics Smartliving SmartLAN 6.x - Hard-coded Credentials
Inim Electronics Smartliving SmartLAN 6.x - Hard-coded Credentials
https://www.exploit-db.com/exploits/47763
  
  Inim Electronics Smartliving SmartLAN 6.x - Hard-coded Credentials
https://www.exploit-db.com/exploits/47763
Exploit Database
  
  Inim Electronics Smartliving SmartLAN 6.x - Hard-coded Credentials
  Inim Electronics Smartliving SmartLAN 6.x - Hard-coded Credentials.. local exploit for Hardware platform
  [webapps] Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution
Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution
https://www.exploit-db.com/exploits/47765
  
  Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution
https://www.exploit-db.com/exploits/47765
Exploit Database
  
  Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution
  Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution.. webapps exploit for Hardware platform
  [webapps] Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery
Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery
https://www.exploit-db.com/exploits/47764
  
  Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery
https://www.exploit-db.com/exploits/47764
Exploit Database
  
  Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery
  Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery.. webapps exploit for Hardware platform
  