[remote] Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
https://www.exploit-db.com/exploits/47686
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
https://www.exploit-db.com/exploits/47686
Exploit Database
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution
Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution. CVE-2019-1821 . remote exploit for Linux platform
[local] DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
https://www.exploit-db.com/exploits/47685
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
https://www.exploit-db.com/exploits/47685
Exploit Database
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'
DOUBLEPULSAR (x64) - Hooking 'srv!SrvTransactionNotImplemented' in 'srv!SrvTransaction2DispatchTable'.. local exploit for Windows_x86-64 platform
[local] Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
https://www.exploit-db.com/exploits/47684
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
https://www.exploit-db.com/exploits/47684
Exploit Database
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation. CVE-2019-1405CVE-2019-1322 . local exploit for Windows platform
[remote] Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
https://www.exploit-db.com/exploits/47683
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
https://www.exploit-db.com/exploits/47683
Exploit Database
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free
Microsoft Windows 7 (x86) - 'BlueKeep' Remote Desktop Protocol (RDP) Remote Windows Kernel Use After Free. CVE-2019-0708 . remote exploit for Windows_x86 platform
[local] macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
https://www.exploit-db.com/exploits/47708
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
https://www.exploit-db.com/exploits/47708
Exploit Database
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache.. local exploit for macOS platform
[dos] Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
https://www.exploit-db.com/exploits/47707
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
https://www.exploit-db.com/exploits/47707
Exploit Database
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback. CVE-2019-1429 . dos exploit for Windows platform
[local] LiteManager 4.5.0 - Insecure File Permissions
LiteManager 4.5.0 - Insecure File Permissions
https://www.exploit-db.com/exploits/47706
LiteManager 4.5.0 - Insecure File Permissions
https://www.exploit-db.com/exploits/47706
Exploit Database
LiteManager 4.5.0 - Insecure File Permissions
LiteManager 4.5.0 - Insecure File Permissions.. local exploit for Windows platform
[local] ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
https://www.exploit-db.com/exploits/47705
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
https://www.exploit-db.com/exploits/47705
Exploit Database
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path.. local exploit for Windows platform
[webapps] Network Management Card 6.2.0 - Host Header Injection
Network Management Card 6.2.0 - Host Header Injection
https://www.exploit-db.com/exploits/47704
Network Management Card 6.2.0 - Host Header Injection
https://www.exploit-db.com/exploits/47704
Exploit Database
Network Management Card 6.2.0 - Host Header Injection
Network Management Card 6.2.0 - Host Header Injection.. webapps exploit for Hardware platform
[local] GNU Mailutils 3.7 - Privilege Escalation
GNU Mailutils 3.7 - Privilege Escalation
https://www.exploit-db.com/exploits/47703
GNU Mailutils 3.7 - Privilege Escalation
https://www.exploit-db.com/exploits/47703
Exploit Database
GNU Mailutils 3.7 - Privilege Escalation
GNU Mailutils 3.7 - Privilege Escalation. CVE-2019-18862 . local exploit for Linux platform
[webapps] TestLink 1.9.19 - Persistent Cross-Site Scripting
TestLink 1.9.19 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47702
TestLink 1.9.19 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47702
Exploit Database
TestLink 1.9.19 - Persistent Cross-Site Scripting
TestLink 1.9.19 - Persistent Cross-Site Scripting.. webapps exploit for Hardware platform
[local] Xorg X11 Server - Local Privilege Escalation (Metasploit)
Xorg X11 Server - Local Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/47701
Xorg X11 Server - Local Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/47701
Exploit Database
Xorg X11 Server - Local Privilege Escalation (Metasploit)
Xorg X11 Server - Local Privilege Escalation (Metasploit). CVE-2018-14665 . local exploit for Unix platform
[remote] Pulse Secure VPN - Arbitrary Command Execution (Metasploit)
Pulse Secure VPN - Arbitrary Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47700
Pulse Secure VPN - Arbitrary Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47700
Exploit Database
Pulse Secure VPN - Arbitrary Command Execution (Metasploit)
Pulse Secure VPN - Arbitrary Command Execution (Metasploit). CVE-2019-11539 . remote exploit for Multiple platform
[remote] Bludit - Directory Traversal Image File Upload (Metasploit)
Bludit - Directory Traversal Image File Upload (Metasploit)
https://www.exploit-db.com/exploits/47699
Bludit - Directory Traversal Image File Upload (Metasploit)
https://www.exploit-db.com/exploits/47699
[remote] FreeSWITCH - Event Socket Command Execution (Metasploit)
FreeSWITCH - Event Socket Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47698
FreeSWITCH - Event Socket Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47698
Exploit Database
FreeSWITCH - Event Socket Command Execution (Metasploit)
FreeSWITCH - Event Socket Command Execution (Metasploit).. remote exploit for Multiple platform
[remote] FusionPBX - Operator Panel exec.php Command Execution (Metasploit)
FusionPBX - Operator Panel exec.php Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47697
FusionPBX - Operator Panel exec.php Command Execution (Metasploit)
https://www.exploit-db.com/exploits/47697
Exploit Database
FusionPBX - Operator Panel exec.php Command Execution (Metasploit)
FusionPBX - Operator Panel exec.php Command Execution (Metasploit). CVE-2019-11409 . remote exploit for Multiple platform
[local] Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)
Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)
https://www.exploit-db.com/exploits/47696
Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)
https://www.exploit-db.com/exploits/47696
Exploit Database
Microsoft Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)
Microsoft Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit).. local exploit for Windows platform
[local] Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit)
Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit)
https://www.exploit-db.com/exploits/47695
Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit)
https://www.exploit-db.com/exploits/47695
Exploit Database
Microsoft Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit)
Microsoft Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit).. local exploit for Windows platform
[dos] iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd
iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd
https://www.exploit-db.com/exploits/47694
iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd
https://www.exploit-db.com/exploits/47694
Exploit Database
iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd
iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd.. dos exploit for iOS platform
[dos] Ubuntu 19.10 - Refcount Underflow and Type Confusion in shiftfs
Ubuntu 19.10 - Refcount Underflow and Type Confusion in shiftfs
https://www.exploit-db.com/exploits/47693
Ubuntu 19.10 - Refcount Underflow and Type Confusion in shiftfs
https://www.exploit-db.com/exploits/47693
Exploit Database
Ubuntu 19.10 - Refcount Underflow and Type Confusion in shiftfs
Ubuntu 19.10 - Refcount Underflow and Type Confusion in shiftfs. CVE-2019-15793CVE-2019-15792CVE-2019-15791 . dos exploit for Linux platform