[webapps] Jobgator - 'experience' SQL Injection
Jobgator - 'experience' SQL Injection
https://www.exploit-db.com/exploits/46663
Jobgator - 'experience' SQL Injection
https://www.exploit-db.com/exploits/46663
Exploit Database
Jobgator - 'experience' SQL Injection
Jobgator - 'experience' SQL Injection.. webapps exploit for PHP platform
[local] Microsoft Windows - AppX Deployment Service Privilege Escalation
Microsoft Windows - AppX Deployment Service Privilege Escalation
https://www.exploit-db.com/exploits/46683
Microsoft Windows - AppX Deployment Service Privilege Escalation
https://www.exploit-db.com/exploits/46683
Exploit Database
Microsoft Windows - AppX Deployment Service Privilege Escalation
Microsoft Windows - AppX Deployment Service Privilege Escalation. CVE-2019-0841 . local exploit for Windows platform
[remote] Apache Axis 1.4 - Remote Code Execution
Apache Axis 1.4 - Remote Code Execution
https://www.exploit-db.com/exploits/46682
Apache Axis 1.4 - Remote Code Execution
https://www.exploit-db.com/exploits/46682
Exploit Database
Apache Axis 1.4 - Remote Code Execution
Apache Axis 1.4 - Remote Code Execution. CVE-2019-0227 . remote exploit for Multiple platform
[webapps] Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection
Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection
https://www.exploit-db.com/exploits/46681
Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection
https://www.exploit-db.com/exploits/46681
Exploit Database
Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection
Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection.. webapps exploit for PHP platform
[shellcode] Linux/x64 - XANAX Decoder Shellcode (127 bytes)
Linux/x64 - XANAX Decoder Shellcode (127 bytes)
https://www.exploit-db.com/exploits/46680
Linux/x64 - XANAX Decoder Shellcode (127 bytes)
https://www.exploit-db.com/exploits/46680
Exploit Database
Linux/x64 - XANAX Decoder Shellcode (127 bytes)
Linux/x64 - XANAX Decoder Shellcode (127 bytes).. shellcode exploit for Generator platform
[shellcode] Linux/x64 - XANAX Encoder Shellcode (127 bytes)
Linux/x64 - XANAX Encoder Shellcode (127 bytes)
https://www.exploit-db.com/exploits/46679
Linux/x64 - XANAX Encoder Shellcode (127 bytes)
https://www.exploit-db.com/exploits/46679
Exploit Database
Linux/x64 - XANAX Encoder Shellcode (127 bytes)
Linux/x64 - XANAX Encoder Shellcode (127 bytes).. shellcode exploit for Generator platform
[remote] TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
https://www.exploit-db.com/exploits/46678
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
https://www.exploit-db.com/exploits/46678
Exploit Database
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow
TP-LINK TL-WR940N / TL-WR941ND - Buffer Overflow. CVE-2019-6989 . remote exploit for Hardware platform
[webapps] D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
https://www.exploit-db.com/exploits/46687
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
https://www.exploit-db.com/exploits/46687
Exploit Database
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting
D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting. CVE-2019-11017 . webapps exploit for Hardware platform
[local] FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
https://www.exploit-db.com/exploits/46686
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
https://www.exploit-db.com/exploits/46686
Exploit Database
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer.. local exploit for Windows platform
[local] FTPShell Server 6.83 - 'Account name to ban' Local Buffer
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
https://www.exploit-db.com/exploits/46685
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
https://www.exploit-db.com/exploits/46685
Exploit Database
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
FTPShell Server 6.83 - 'Account name to ban' Local Buffer.. local exploit for Windows platform
[webapps] Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/46684
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/46684
Exploit Database
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform
[webapps] ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46691
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46691
Exploit Database
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit). CVE-2019-11446 . webapps exploit for PHP platform
[local] Microsoft Internet Explorer 11 - XML External Entity Injection
Microsoft Internet Explorer 11 - XML External Entity Injection
https://www.exploit-db.com/exploits/46690
Microsoft Internet Explorer 11 - XML External Entity Injection
https://www.exploit-db.com/exploits/46690
Exploit Database
Microsoft Internet Explorer 11 - XML External Entity Injection
Microsoft Internet Explorer 11 - XML External Entity Injection.. local exploit for Windows platform
[shellcode] Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
https://www.exploit-db.com/exploits/46689
Linux/x86 - Add User to Passwd File Shellcode (149 bytes)
https://www.exploit-db.com/exploits/46689
Exploit Database
Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes)
Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes).. shellcode exploit for Linux_x86 platform
[local] CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
https://www.exploit-db.com/exploits/46688
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
https://www.exploit-db.com/exploits/46688
Exploit Database
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass
CyberArk EPM 10.2.1.603 - Security Restrictions Bypass. CVE-2018-14894 . local exploit for Windows platform
[remote] Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
https://www.exploit-db.com/exploits/46693
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
https://www.exploit-db.com/exploits/46693
Exploit Database
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). CVE-2019-9670CVE-2019-9621 . remote exploit for Linux platform
[local] Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46692
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46692
Exploit Database
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit).. local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/46718
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
https://www.exploit-db.com/exploits/46718
Exploit Database
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation. CVE-2019-0836 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
https://www.exploit-db.com/exploits/46717
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
https://www.exploit-db.com/exploits/46717
Exploit Database
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation. CVE-2019-0805 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
https://www.exploit-db.com/exploits/46716
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
https://www.exploit-db.com/exploits/46716
Exploit Database
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass. CVE-2019-0732 . local exploit for Windows platform