[local] Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation
https://www.exploit-db.com/exploits/46158
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation
https://www.exploit-db.com/exploits/46158
Exploit Database
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation. CVE-2019-0573 . local exploit for Windows platform
[local] Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation
https://www.exploit-db.com/exploits/46157
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation
https://www.exploit-db.com/exploits/46157
Exploit Database
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation
Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation. CVE-2019-0572 . local exploit for Windows platform
[local] Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation
Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation
https://www.exploit-db.com/exploits/46156
Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation
https://www.exploit-db.com/exploits/46156
Exploit Database
Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation
Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation. CVE-2019-0543 . local exploit for Windows platform
[local] Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation
Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation
https://www.exploit-db.com/exploits/46155
Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation
https://www.exploit-db.com/exploits/46155
Exploit Database
Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation
Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation. CVE-2018-5410 . local exploit for Windows platform
[dos] 1Password < 7.0 - Denial of Service
1Password < 7.0 - Denial of Service
https://www.exploit-db.com/exploits/46165
1Password < 7.0 - Denial of Service
https://www.exploit-db.com/exploits/46165
Exploit Database
1Password < 7.0 - Denial of Service
1Password < 7.0 - Denial of Service. CVE-2018-13042 . dos exploit for Android platform
[shellcode] Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
https://www.exploit-db.com/exploits/46166
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
https://www.exploit-db.com/exploits/46166
Exploit Database
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes).. shellcode exploit for Linux_x86 platform
[webapps] ownDMS 4.7 - SQL Injection
ownDMS 4.7 - SQL Injection
https://www.exploit-db.com/exploits/46168
ownDMS 4.7 - SQL Injection
https://www.exploit-db.com/exploits/46168
Exploit Database
ownDMS 4.7 - SQL Injection
ownDMS 4.7 - SQL Injection.. webapps exploit for PHP platform
[local] Microsoft Windows VCF - Remote Code Execution
Microsoft Windows VCF - Remote Code Execution
https://www.exploit-db.com/exploits/46167
Microsoft Windows VCF - Remote Code Execution
https://www.exploit-db.com/exploits/46167
Exploit Database
Microsoft Windows VCF - Remote Code Execution
Microsoft Windows VCF - Remote Code Execution.. local exploit for Windows platform
[papers] Windows Debugging 101
Windows Debugging 101
https://www.exploit-db.com/docs/portuguese/46169-windows-debugging-101.pdf
Windows Debugging 101
https://www.exploit-db.com/docs/portuguese/46169-windows-debugging-101.pdf
[dos] Spotify 1.0.96.181 - 'Proxy configuration' Denial of Service (PoC)
Spotify 1.0.96.181 - 'Proxy configuration' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46170
Spotify 1.0.96.181 - 'Proxy configuration' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46170
Exploit Database
Spotify 1.0.96.181 - 'Proxy configuration' Denial of Service (PoC)
Spotify 1.0.96.181 - 'Proxy configuration' Denial of Service (PoC).. dos exploit for Windows platform
[webapps] doorGets CMS 7.0 - Arbitrary File Download
doorGets CMS 7.0 - Arbitrary File Download
https://www.exploit-db.com/exploits/46173
doorGets CMS 7.0 - Arbitrary File Download
https://www.exploit-db.com/exploits/46173
Exploit Database
doorGets CMS 7.0 - Arbitrary File Download
doorGets CMS 7.0 - Arbitrary File Download.. webapps exploit for PHP platform
[webapps] Roxy Fileman 1.4.5 - Arbitrary File Download
Roxy Fileman 1.4.5 - Arbitrary File Download
https://www.exploit-db.com/exploits/46172
Roxy Fileman 1.4.5 - Arbitrary File Download
https://www.exploit-db.com/exploits/46172
Exploit Database
Roxy Fileman 1.4.5 - Arbitrary File Download
Roxy Fileman 1.4.5 - Arbitrary File Download.. webapps exploit for PHP platform
[webapps] FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure
FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure
https://www.exploit-db.com/exploits/46171
FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure
https://www.exploit-db.com/exploits/46171
Exploit Database
Fortinet FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure
Fortinet FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure. CVE-2018-13374 . webapps exploit for Hardware platform
[webapps] ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution
ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution
https://www.exploit-db.com/exploits/46174
ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution
https://www.exploit-db.com/exploits/46174
Exploit Database
ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution
ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution. CVE-2018-5782 . webapps exploit for PHP platform
[dos] NTPsec 1.1.2 - 'config' Authenticated Out-of-Bounds Write Denial of Service (PoC)
NTPsec 1.1.2 - 'config' Authenticated Out-of-Bounds Write Denial of Service (PoC)
https://www.exploit-db.com/exploits/46178
NTPsec 1.1.2 - 'config' Authenticated Out-of-Bounds Write Denial of Service (PoC)
https://www.exploit-db.com/exploits/46178
Exploit Database
NTPsec 1.1.2 - 'config' Authenticated Out-of-Bounds Write Denial of Service (PoC)
NTPsec 1.1.2 - 'config' Authenticated Out-of-Bounds Write Denial of Service (PoC). CVE-2019-6442 . dos exploit for Linux platform
[dos] NTPsec 1.1.2 - 'ntp_control' Authenticated NULL Pointer Dereference (PoC)
NTPsec 1.1.2 - 'ntp_control' Authenticated NULL Pointer Dereference (PoC)
https://www.exploit-db.com/exploits/46177
NTPsec 1.1.2 - 'ntp_control' Authenticated NULL Pointer Dereference (PoC)
https://www.exploit-db.com/exploits/46177
Exploit Database
NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC). CVE-2019-6445 . dos exploit for Linux platform
[dos] NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46176
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46176
Exploit Database
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC). CVE-2019-6444 . dos exploit for Linux platform
[dos] NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46175
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
https://www.exploit-db.com/exploits/46175
Exploit Database
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC). CVE-2019-6443 . dos exploit for Linux platform
[webapps] Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
https://www.exploit-db.com/exploits/46180
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
https://www.exploit-db.com/exploits/46180
Exploit Database
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset. CVE-2019-6441 . webapps exploit for Hardware platform
[webapps] GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
https://www.exploit-db.com/exploits/46179
GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
https://www.exploit-db.com/exploits/46179
Exploit Database
GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal
GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal. CVE-2019-6275CVE-2019-6274CVE-2019-6273CVE-2019-6272 . webapps exploit for Hardware platform