[local] Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
https://www.exploit-db.com/exploits/47556
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
https://www.exploit-db.com/exploits/47556
Exploit Database
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path
Intelligent Security System SecurOS Enterprise 10.2 - 'SecurosCtrlService' Unquoted Service Path.. local exploit for Windows platform
[webapps] rConfig 3.9.2 - Remote Code Execution
rConfig 3.9.2 - Remote Code Execution
https://www.exploit-db.com/exploits/47555
rConfig 3.9.2 - Remote Code Execution
https://www.exploit-db.com/exploits/47555
Exploit Database
rConfig 3.9.2 - Remote Code Execution
rConfig 3.9.2 - Remote Code Execution. CVE-2019-16662 . webapps exploit for PHP platform
[remote] Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
https://www.exploit-db.com/exploits/47554
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
https://www.exploit-db.com/exploits/47554
Exploit Database
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow.. remote exploit for Windows platform
[remote] Nostromo - Directory Traversal Remote Command Execution (Metasploit)
Nostromo - Directory Traversal Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47573
Nostromo - Directory Traversal Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47573
Exploit Database
Nostromo - Directory Traversal Remote Command Execution (Metasploit)
Nostromo - Directory Traversal Remote Command Execution (Metasploit). CVE-2019-16278 . remote exploit for Multiple platform
[webapps] Apache Solr 8.2.0 - Remote Code Execution
Apache Solr 8.2.0 - Remote Code Execution
https://www.exploit-db.com/exploits/47572
Apache Solr 8.2.0 - Remote Code Execution
https://www.exploit-db.com/exploits/47572
Exploit Database
Apache Solr 8.2.0 - Remote Code Execution
Apache Solr 8.2.0 - Remote Code Execution. CVE-2019-17558 . webapps exploit for Java platform
[webapps] ownCloud 10.3.0 stable - Cross-Site Request Forgery
ownCloud 10.3.0 stable - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47571
ownCloud 10.3.0 stable - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47571
Exploit Database
ownCloud 10.3.0 stable - Cross-Site Request Forgery
ownCloud 10.3.0 stable - Cross-Site Request Forgery.. webapps exploit for Linux platform
[local] OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47570
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47570
Exploit Database
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path.. local exploit for Windows platform
[webapps] TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47569
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47569
Exploit Database
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection.. webapps exploit for PHP platform
[dos] Apple macOS 10.15.1 - Denial of Service (PoC)
Apple macOS 10.15.1 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47578
Apple macOS 10.15.1 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47578
Exploit Database
Apple macOS 10.15.1 - Denial of Service (PoC)
Apple macOS 10.15.1 - Denial of Service (PoC).. dos exploit for macOS platform
[local] Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Exploit Database
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path.. local exploit for Windows platform
[remote] Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Exploit Database
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow.. remote exploit for Windows platform
[local] OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
Exploit Database
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path.. local exploit for Windows platform
[local] Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Exploit Database
Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH).. local exploit for Windows platform
[local] Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Exploit Database
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Exploit Database
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure.. webapps exploit for Hardware platform
[webapps] Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Exploit Database
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass.. webapps exploit for Hardware platform
[local] QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
Exploit Database
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path.. local exploit for Windows platform
[local] Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Exploit Database
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path.. local exploit for Windows platform
[dos] macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
Exploit Database
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common().. dos exploit for macOS platform
[dos] WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
Exploit Database
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive.. dos exploit for Multiple platform