[webapps] Xerte 3.10.3 - Directory Traversal (Authenticated)
Xerte 3.10.3 - Directory Traversal (Authenticated)
https://www.exploit-db.com/exploits/50794
Xerte 3.10.3 - Directory Traversal (Authenticated)
https://www.exploit-db.com/exploits/50794
Exploit Database
Xerte 3.10.3 - Directory Traversal (Authenticated)
Xerte 3.10.3 - Directory Traversal (Authenticated). CVE-2021-44665 . webapps exploit for PHP platform
[webapps] Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)
Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50799
Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50799
Exploit Database
Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)
Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE). CVE-2022-22947 . webapps exploit for Java platform
[local] Foxit PDF Reader 11.0 - Unquoted Service Path
Foxit PDF Reader 11.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50807
Foxit PDF Reader 11.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50807
Exploit Database
Foxit PDF Reader 11.0 - Unquoted Service Path
Foxit PDF Reader 11.0 - Unquoted Service Path.. local exploit for Windows platform
[local] Malwarebytes 4.5 - Unquoted Service Path
Malwarebytes 4.5 - Unquoted Service Path
https://www.exploit-db.com/exploits/50806
Malwarebytes 4.5 - Unquoted Service Path
https://www.exploit-db.com/exploits/50806
Exploit Database
Malwarebytes 4.5 - Unquoted Service Path
Malwarebytes 4.5 - Unquoted Service Path.. local exploit for Windows platform
[local] Cloudflare WARP 1.4 - Unquoted Service Path
Cloudflare WARP 1.4 - Unquoted Service Path
https://www.exploit-db.com/exploits/50805
Cloudflare WARP 1.4 - Unquoted Service Path
https://www.exploit-db.com/exploits/50805
Exploit Database
Cloudflare WARP 1.4 - Unquoted Service Path
Cloudflare WARP 1.4 - Unquoted Service Path.. local exploit for Windows platform
[local] Private Internet Access 3.3 - 'pia-service' Unquoted Service Path
Private Internet Access 3.3 - 'pia-service' Unquoted Service Path
https://www.exploit-db.com/exploits/50804
Private Internet Access 3.3 - 'pia-service' Unquoted Service Path
https://www.exploit-db.com/exploits/50804
Exploit Database
Private Internet Access 3.3 - 'pia-service' Unquoted Service Path
Private Internet Access 3.3 - 'pia-service' Unquoted Service Path.. local exploit for Windows platform
[webapps] Hasura GraphQL 2.2.0 - Information Disclosure
Hasura GraphQL 2.2.0 - Information Disclosure
https://www.exploit-db.com/exploits/50803
Hasura GraphQL 2.2.0 - Information Disclosure
https://www.exploit-db.com/exploits/50803
Exploit Database
Hasura GraphQL 2.2.0 - Information Disclosure
Hasura GraphQL 2.2.0 - Information Disclosure.. webapps exploit for Multiple platform
[webapps] Attendance and Payroll System v1.0 - SQLi Authentication Bypass
Attendance and Payroll System v1.0 - SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50802
Attendance and Payroll System v1.0 - SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50802
Exploit Database
Attendance and Payroll System v1.0 - SQLi Authentication Bypass
Attendance and Payroll System v1.0 - SQLi Authentication Bypass.. webapps exploit for PHP platform
[webapps] Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50801
Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50801
Exploit Database
Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
Attendance and Payroll System v1.0 - Remote Code Execution (RCE).. webapps exploit for PHP platform
[webapps] part-db 0.5.11 - Remote Code Execution (RCE)
part-db 0.5.11 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50800
part-db 0.5.11 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50800
Exploit Database
part-db 0.5.11 - Remote Code Execution (RCE)
part-db 0.5.11 - Remote Code Execution (RCE). CVE-2022-0848 . webapps exploit for PHP platform
[local] Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
https://www.exploit-db.com/exploits/50808
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
https://www.exploit-db.com/exploits/50808
Exploit Database
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe). CVE-2022-0847 . local exploit for Linux platform
[local] Audio Conversion Wizard v2.01 - Buffer Overflow
Audio Conversion Wizard v2.01 - Buffer Overflow
https://www.exploit-db.com/exploits/50811
Audio Conversion Wizard v2.01 - Buffer Overflow
https://www.exploit-db.com/exploits/50811
Exploit Database
Audio Conversion Wizard v2.01 - Buffer Overflow
Audio Conversion Wizard v2.01 - Buffer Overflow.. local exploit for Windows platform
[local] Cobian Backup 0.9 - Unquoted Service Path
Cobian Backup 0.9 - Unquoted Service Path
https://www.exploit-db.com/exploits/50810
Cobian Backup 0.9 - Unquoted Service Path
https://www.exploit-db.com/exploits/50810
Exploit Database
Cobian Backup 0.9 - Unquoted Service Path
Cobian Backup 0.9 - Unquoted Service Path.. local exploit for Windows platform
[webapps] Webmin 1.984 - Remote Code Execution (Authenticated)
Webmin 1.984 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50809
Webmin 1.984 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50809
Exploit Database
Webmin 1.984 - Remote Code Execution (Authenticated)
Webmin 1.984 - Remote Code Execution (Authenticated). CVE-2022-0824 . webapps exploit for Linux platform
[local] Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
https://www.exploit-db.com/exploits/50813
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
https://www.exploit-db.com/exploits/50813
Exploit Database
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path.. local exploit for Windows platform
[local] Printix Client 1.3.1106.0 - Privilege Escalation
Printix Client 1.3.1106.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50812
Printix Client 1.3.1106.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50812
Exploit Database
Printix Client 1.3.1106.0 - Privilege Escalation
Printix Client 1.3.1106.0 - Privilege Escalation. CVE-2022-25090 . local exploit for Windows platform
[local] McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
https://www.exploit-db.com/exploits/50814
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
https://www.exploit-db.com/exploits/50814
Exploit Database
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege.. local exploit for Windows platform
[remote] Siemens S7-1200 - Unauthenticated Start/Stop Command
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Exploit-Db
OffSec’s Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
[local] Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Exploit Database
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path.. local exploit for Windows platform
[local] WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
Exploit Database
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path.. local exploit for Windows platform