[local] Cobian Backup 0.9 - Unquoted Service Path
Cobian Backup 0.9 - Unquoted Service Path
https://www.exploit-db.com/exploits/50810
Cobian Backup 0.9 - Unquoted Service Path
https://www.exploit-db.com/exploits/50810
Exploit Database
Cobian Backup 0.9 - Unquoted Service Path
Cobian Backup 0.9 - Unquoted Service Path.. local exploit for Windows platform
[webapps] Webmin 1.984 - Remote Code Execution (Authenticated)
Webmin 1.984 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50809
Webmin 1.984 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50809
Exploit Database
Webmin 1.984 - Remote Code Execution (Authenticated)
Webmin 1.984 - Remote Code Execution (Authenticated). CVE-2022-0824 . webapps exploit for Linux platform
[local] Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
https://www.exploit-db.com/exploits/50813
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
https://www.exploit-db.com/exploits/50813
Exploit Database
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path.. local exploit for Windows platform
[local] Printix Client 1.3.1106.0 - Privilege Escalation
Printix Client 1.3.1106.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50812
Printix Client 1.3.1106.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50812
Exploit Database
Printix Client 1.3.1106.0 - Privilege Escalation
Printix Client 1.3.1106.0 - Privilege Escalation. CVE-2022-25090 . local exploit for Windows platform
[local] McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
https://www.exploit-db.com/exploits/50814
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
https://www.exploit-db.com/exploits/50814
Exploit Database
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege.. local exploit for Windows platform
[remote] Siemens S7-1200 - Unauthenticated Start/Stop Command
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Exploit-Db
OffSec’s Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
[local] Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Exploit Database
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path.. local exploit for Windows platform
[local] WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
Exploit Database
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path.. local exploit for Windows platform
[local] Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
https://www.exploit-db.com/exploits/50817
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
https://www.exploit-db.com/exploits/50817
Exploit Database
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path.. local exploit for Windows platform
[webapps] Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Exploit Database
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[local] BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
Exploit Database
BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path.. local exploit for Windows platform
[remote] Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Exploit Database
Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection.. remote exploit for Multiple platform
[remote] Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Exploit Database
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated). CVE-2020-17456 . remote exploit for Hardware platform
[local] VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
Exploit Database
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Exploit Database
Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi.. webapps exploit for Multiple platform
[webapps] Moodle 3.11.5 - SQLi (Authenticated)
Moodle 3.11.5 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50825
Moodle 3.11.5 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50825
Exploit Database
Moodle 3.11.5 - SQLi (Authenticated)
Moodle 3.11.5 - SQLi (Authenticated).. webapps exploit for PHP platform
[webapps] Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50828
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50828
Exploit Database
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
Tiny File Manager 2.4.6 - Remote Code Execution (RCE). CVE-2021-45010CVE-2021-40964 . webapps exploit for PHP platform
[remote] Hikvision IP Camera - Backdoor
Hikvision IP Camera - Backdoor
https://www.exploit-db.com/exploits/50827
Hikvision IP Camera - Backdoor
https://www.exploit-db.com/exploits/50827
[webapps] Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50826
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50826
Exploit Database
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated). CVE-2022-26965 . webapps exploit for PHP platform
[remote] Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50829
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50829
Exploit Database
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Apache APISIX 2.12.1 - Remote Code Execution (RCE). CVE-2022-24112 . remote exploit for Multiple platform