[remote] Siemens S7-1200 - Unauthenticated Start/Stop Command
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Exploit-Db
OffSec’s Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
[local] Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Exploit Database
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path.. local exploit for Windows platform
[local] WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
Exploit Database
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path.. local exploit for Windows platform
[local] Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
https://www.exploit-db.com/exploits/50817
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
https://www.exploit-db.com/exploits/50817
Exploit Database
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path.. local exploit for Windows platform
[webapps] Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Exploit Database
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[local] BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
Exploit Database
BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path.. local exploit for Windows platform
[remote] Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Exploit Database
Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection.. remote exploit for Multiple platform
[remote] Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Exploit Database
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated). CVE-2020-17456 . remote exploit for Hardware platform
[local] VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
Exploit Database
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Exploit Database
Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi.. webapps exploit for Multiple platform
[webapps] Moodle 3.11.5 - SQLi (Authenticated)
Moodle 3.11.5 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50825
Moodle 3.11.5 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50825
Exploit Database
Moodle 3.11.5 - SQLi (Authenticated)
Moodle 3.11.5 - SQLi (Authenticated).. webapps exploit for PHP platform
[webapps] Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50828
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50828
Exploit Database
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
Tiny File Manager 2.4.6 - Remote Code Execution (RCE). CVE-2021-45010CVE-2021-40964 . webapps exploit for PHP platform
[remote] Hikvision IP Camera - Backdoor
Hikvision IP Camera - Backdoor
https://www.exploit-db.com/exploits/50827
Hikvision IP Camera - Backdoor
https://www.exploit-db.com/exploits/50827
[webapps] Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50826
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50826
Exploit Database
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated). CVE-2022-26965 . webapps exploit for PHP platform
[remote] Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50829
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50829
Exploit Database
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Apache APISIX 2.12.1 - Remote Code Execution (RCE). CVE-2022-24112 . remote exploit for Multiple platform
[webapps] Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
https://www.exploit-db.com/exploits/50830
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
https://www.exploit-db.com/exploits/50830
Exploit Database
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated).. webapps exploit for PHP platform
[webapps] ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
https://www.exploit-db.com/exploits/50831
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
https://www.exploit-db.com/exploits/50831
Exploit Database
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover.. webapps exploit for PHP platform
[remote] Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50833
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50833
Exploit Database
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE). CVE-2021-44529 . remote exploit for Multiple platform
[remote] iRZ Mobile Router - CSRF to RCE
iRZ Mobile Router - CSRF to RCE
https://www.exploit-db.com/exploits/50832
iRZ Mobile Router - CSRF to RCE
https://www.exploit-db.com/exploits/50832
Exploit Database
iRZ Mobile Router - CSRF to RCE
iRZ Mobile Router - CSRF to RCE. CVE-2022-27226 . remote exploit for Hardware platform
[remote] ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
https://www.exploit-db.com/exploits/50836
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
https://www.exploit-db.com/exploits/50836
Exploit Database
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure.. remote exploit for Hardware platform