[webapps] Apache Solr 8.2.0 - Remote Code Execution
Apache Solr 8.2.0 - Remote Code Execution
https://www.exploit-db.com/exploits/47572
Apache Solr 8.2.0 - Remote Code Execution
https://www.exploit-db.com/exploits/47572
Exploit Database
Apache Solr 8.2.0 - Remote Code Execution
Apache Solr 8.2.0 - Remote Code Execution. CVE-2019-17558 . webapps exploit for Java platform
[webapps] ownCloud 10.3.0 stable - Cross-Site Request Forgery
ownCloud 10.3.0 stable - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47571
ownCloud 10.3.0 stable - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47571
Exploit Database
ownCloud 10.3.0 stable - Cross-Site Request Forgery
ownCloud 10.3.0 stable - Cross-Site Request Forgery.. webapps exploit for Linux platform
[local] OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47570
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47570
Exploit Database
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path
OpenVPN Private Tunnel 2.8.4 - 'ovpnagent' Unquoted Service Path.. local exploit for Windows platform
[webapps] TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47569
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
https://www.exploit-db.com/exploits/47569
Exploit Database
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection
TheJshen contentManagementSystem 1.04 - 'id' SQL Injection.. webapps exploit for PHP platform
[dos] Apple macOS 10.15.1 - Denial of Service (PoC)
Apple macOS 10.15.1 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47578
Apple macOS 10.15.1 - Denial of Service (PoC)
https://www.exploit-db.com/exploits/47578
Exploit Database
Apple macOS 10.15.1 - Denial of Service (PoC)
Apple macOS 10.15.1 - Denial of Service (PoC).. dos exploit for macOS platform
[local] Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
https://www.exploit-db.com/exploits/47577
Exploit Database
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path
Launch Manager 6.1.7600.16385 - 'DsiWMIService' Unquoted Service Path.. local exploit for Windows platform
[remote] Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
https://www.exploit-db.com/exploits/47576
Exploit Database
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow.. remote exploit for Windows platform
[local] OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
OpenVPN Connect 3.0.0.272 - 'ovpnagent' Unquoted Service Path
https://www.exploit-db.com/exploits/47575
Exploit Database
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path.. local exploit for Windows platform
[local] Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Aida64 6.10.5200 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/47574
Exploit Database
Aida64 6.10.5200 - Buffer Overflow (SEH)
Aida64 6.10.5200 - Buffer Overflow (SEH).. local exploit for Windows platform
[local] Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
https://www.exploit-db.com/exploits/47597
Exploit Database
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path
Adaware Web Companion version 4.8.2078.3950 - 'WCAssistantService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
https://www.exploit-db.com/exploits/47596
Exploit Database
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure
Smartwares HOME easy 1.0.9 - Database Backup Information Disclosure.. webapps exploit for Hardware platform
[webapps] Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
https://www.exploit-db.com/exploits/47595
Exploit Database
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass.. webapps exploit for Hardware platform
[local] QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
https://www.exploit-db.com/exploits/47594
Exploit Database
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path.. local exploit for Windows platform
[local] Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
https://www.exploit-db.com/exploits/47593
Exploit Database
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path
Wacom WTabletService 6.6.7-3 - 'WTabletServicePro' Unquoted Service Path.. local exploit for Windows platform
[dos] macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
https://www.exploit-db.com/exploits/47592
Exploit Database
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common().. dos exploit for macOS platform
[dos] WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
https://www.exploit-db.com/exploits/47591
Exploit Database
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive.. dos exploit for Multiple platform
[dos] JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
https://www.exploit-db.com/exploits/47590
Exploit Database
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects. CVE-2019-8820 . dos exploit for Multiple platform
[webapps] SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
https://www.exploit-db.com/exploits/47589
Exploit Database
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection.. webapps exploit for ASPX platform
[webapps] html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
html5_snmp 1.11 - 'Router_ID' SQL Injection
https://www.exploit-db.com/exploits/47588
Exploit Database
html5_snmp 1.11 - 'Router_ID' SQL Injection
html5_snmp 1.11 - 'Router_ID' SQL Injection.. webapps exploit for PHP platform
[webapps] html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47587
Exploit Database
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting.. webapps exploit for PHP platform