[local] JumpStart 0.6.0.0 - 'jswpbapi' Unquoted Service Path
JumpStart 0.6.0.0 - 'jswpbapi' Unquoted Service Path
https://www.exploit-db.com/exploits/47549
JumpStart 0.6.0.0 - 'jswpbapi' Unquoted Service Path
https://www.exploit-db.com/exploits/47549
Exploit Database
JumpStart 0.6.0.0 - 'jswpbapi' Unquoted Service Path
JumpStart 0.6.0.0 - 'jswpbapi' Unquoted Service Path.. local exploit for Windows platform
[webapps] waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'description' Cross-Site Scripting
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'description' Cross-Site Scripting
https://www.exploit-db.com/exploits/47548
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'description' Cross-Site Scripting
https://www.exploit-db.com/exploits/47548
Exploit Database
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'description' Cross-Site Scripting
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'description' Cross-Site Scripting.. webapps exploit for PHP platform
[webapps] Part-DB 0.4 - Authentication Bypass
Part-DB 0.4 - Authentication Bypass
https://www.exploit-db.com/exploits/47547
Part-DB 0.4 - Authentication Bypass
https://www.exploit-db.com/exploits/47547
Exploit Database
Part-DB 0.4 - Authentication Bypass
Part-DB 0.4 - Authentication Bypass.. webapps exploit for PHP platform
[webapps] waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'start' SQL Injection
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'start' SQL Injection
https://www.exploit-db.com/exploits/47546
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'start' SQL Injection
https://www.exploit-db.com/exploits/47546
Exploit Database
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'start' SQL Injection
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 - 'start' SQL Injection.. webapps exploit for PHP platform
[webapps] Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery
Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47545
Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47545
Exploit Database
Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery
Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery.. webapps exploit for Hardware platform
[webapps] PHP-FPM + Nginx - Remote Code Execution
PHP-FPM + Nginx - Remote Code Execution
https://www.exploit-db.com/exploits/47553
PHP-FPM + Nginx - Remote Code Execution
https://www.exploit-db.com/exploits/47553
[local] WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Buffer OverFlow (SEH)
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Buffer OverFlow (SEH)
https://www.exploit-db.com/exploits/47568
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Buffer OverFlow (SEH)
https://www.exploit-db.com/exploits/47568
Exploit Database
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Buffer OverFlow (SEH)
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Buffer OverFlow (SEH).. local exploit for Windows platform
[webapps] Wordpress Plugin Google Review Slider 6.1 - 'tid' SQL Injection
Wordpress Plugin Google Review Slider 6.1 - 'tid' SQL Injection
https://www.exploit-db.com/exploits/47567
Wordpress Plugin Google Review Slider 6.1 - 'tid' SQL Injection
https://www.exploit-db.com/exploits/47567
Exploit Database
WordPress Plugin Google Review Slider 6.1 - 'tid' SQL Injection
WordPress Plugin Google Review Slider 6.1 - 'tid' SQL Injection.. webapps exploit for PHP platform
[remote] MikroTik RouterOS 6.45.6 - DNS Cache Poisoning
MikroTik RouterOS 6.45.6 - DNS Cache Poisoning
https://www.exploit-db.com/exploits/47566
MikroTik RouterOS 6.45.6 - DNS Cache Poisoning
https://www.exploit-db.com/exploits/47566
Exploit Database
MikroTik RouterOS 6.45.6 - DNS Cache Poisoning
MikroTik RouterOS 6.45.6 - DNS Cache Poisoning. CVE-2019-3978 . remote exploit for Hardware platform
[dos] JavaScriptCore - GetterSetter Type Confusion During DFG Compilation
JavaScriptCore - GetterSetter Type Confusion During DFG Compilation
https://www.exploit-db.com/exploits/47565
JavaScriptCore - GetterSetter Type Confusion During DFG Compilation
https://www.exploit-db.com/exploits/47565
Exploit Database
JavaScriptCore - GetterSetter Type Confusion During DFG Compilation
JavaScriptCore - GetterSetter Type Confusion During DFG Compilation. CVE-2019-8765 . dos exploit for Multiple platform
[dos] WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of Service
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of Service
https://www.exploit-db.com/exploits/47563
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of Service
https://www.exploit-db.com/exploits/47563
Exploit Database
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of Service
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of Service.. dos exploit for Windows platform
[webapps] iSeeQ Hybrid DVR WH-H4 2.0.0.P - (get_jpeg) Stream Disclosure
iSeeQ Hybrid DVR WH-H4 2.0.0.P - (get_jpeg) Stream Disclosure
https://www.exploit-db.com/exploits/47562
iSeeQ Hybrid DVR WH-H4 2.0.0.P - (get_jpeg) Stream Disclosure
https://www.exploit-db.com/exploits/47562
Exploit Database
iSeeQ Hybrid DVR WH-H4 2.0.0.P - (get_jpeg) Stream Disclosure
iSeeQ Hybrid DVR WH-H4 2.0.0.P - (get_jpeg) Stream Disclosure.. webapps exploit for Hardware platform
[webapps] Citrix StoreFront Server 7.15 - XML External Entity Injection
Citrix StoreFront Server 7.15 - XML External Entity Injection
https://www.exploit-db.com/exploits/47561
Citrix StoreFront Server 7.15 - XML External Entity Injection
https://www.exploit-db.com/exploits/47561
Exploit Database
Citrix StoreFront Server 7.15 - XML External Entity Injection
Citrix StoreFront Server 7.15 - XML External Entity Injection.. webapps exploit for XML platform
[webapps] Ajenti 2.1.31 - Remote Code Exection (Metasploit)
Ajenti 2.1.31 - Remote Code Exection (Metasploit)
https://www.exploit-db.com/exploits/47560
Ajenti 2.1.31 - Remote Code Exection (Metasploit)
https://www.exploit-db.com/exploits/47560
Exploit Database
Ajenti 2.1.31 - Remote Code Exection (Metasploit)
Ajenti 2.1.31 - Remote Code Exection (Metasploit).. webapps exploit for JSON platform
[remote] Microsoft Windows Server 2012 - 'Group Policy' Security Feature Bypass
Microsoft Windows Server 2012 - 'Group Policy' Security Feature Bypass
https://www.exploit-db.com/exploits/47559
Microsoft Windows Server 2012 - 'Group Policy' Security Feature Bypass
https://www.exploit-db.com/exploits/47559
Exploit Database
Microsoft Windows Server 2012 - 'Group Policy' Security Feature Bypass (MS15-014)
Microsoft Windows Server 2012 - 'Group Policy' Security Feature Bypass (MS15-014). CVE-2015-0009 . remote exploit for Windows platform
[remote] Microsoft Windows Server 2012 - 'Group Policy' Remote Code Execution
Microsoft Windows Server 2012 - 'Group Policy' Remote Code Execution
https://www.exploit-db.com/exploits/47558
Microsoft Windows Server 2012 - 'Group Policy' Remote Code Execution
https://www.exploit-db.com/exploits/47558
Exploit Database
Microsoft Windows Server 2012 - 'Group Policy' Remote Code Execution (MS15-011)
Microsoft Windows Server 2012 - 'Group Policy' Remote Code Execution (MS15-011). CVE-2015-0008 . remote exploit for Windows platform
[webapps] Wordpress 5.2.4 - Cross-Origin Resource Sharing
Wordpress 5.2.4 - Cross-Origin Resource Sharing
https://www.exploit-db.com/exploits/47557
Wordpress 5.2.4 - Cross-Origin Resource Sharing
https://www.exploit-db.com/exploits/47557
Exploit Database
WordPress Core 5.2.4 - Cross-Origin Resource Sharing
WordPress Core 5.2.4 - Cross-Origin Resource Sharing.. webapps exploit for PHP platform
[local] Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
https://www.exploit-db.com/exploits/47556
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
https://www.exploit-db.com/exploits/47556
Exploit Database
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path.. local exploit for Windows platform
[webapps] rConfig 3.9.2 - Remote Code Execution
rConfig 3.9.2 - Remote Code Execution
https://www.exploit-db.com/exploits/47555
rConfig 3.9.2 - Remote Code Execution
https://www.exploit-db.com/exploits/47555
Exploit Database
rConfig 3.9.2 - Remote Code Execution
rConfig 3.9.2 - Remote Code Execution. CVE-2019-16662 . webapps exploit for PHP platform
[remote] Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
https://www.exploit-db.com/exploits/47554
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
https://www.exploit-db.com/exploits/47554
Exploit Database
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow.. remote exploit for Windows platform