[local] Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH)
Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/48148
Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/48148
Exploit Database
Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH)
Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH).. local exploit for Windows platform
[webapps] Joplin Desktop 1.0.184 - Cross-Site Scripting
Joplin Desktop 1.0.184 - Cross-Site Scripting
https://www.exploit-db.com/exploits/48147
Joplin Desktop 1.0.184 - Cross-Site Scripting
https://www.exploit-db.com/exploits/48147
Exploit Database
Joplin Desktop 1.0.184 - Cross-Site Scripting
Joplin Desktop 1.0.184 - Cross-Site Scripting. CVE-2020-9038 . webapps exploit for Multiple platform
[local] Wing FTP Server 6.2.3 - Privilege Escalation
Wing FTP Server 6.2.3 - Privilege Escalation
https://www.exploit-db.com/exploits/48160
Wing FTP Server 6.2.3 - Privilege Escalation
https://www.exploit-db.com/exploits/48160
Exploit Database
Wing FTP Server 6.2.3 - Privilege Escalation
Wing FTP Server 6.2.3 - Privilege Escalation.. local exploit for Windows platform
[webapps] Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48159
Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48159
Exploit Database
Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit).. webapps exploit for PHP platform
[webapps] Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)
Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)
https://www.exploit-db.com/exploits/48158
Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)
https://www.exploit-db.com/exploits/48158
Exploit Database
Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)
Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload). CVE-2019-19142 . webapps exploit for Hardware platform
[remote] CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow
CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow
https://www.exploit-db.com/exploits/48156
CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow
https://www.exploit-db.com/exploits/48156
Exploit Database
CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow
CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow. CVE-2020-8012 . remote exploit for Windows platform
[webapps] TP LINK TL-WR849N - Remote Code Execution
TP LINK TL-WR849N - Remote Code Execution
https://www.exploit-db.com/exploits/48155
TP LINK TL-WR849N - Remote Code Execution
https://www.exploit-db.com/exploits/48155
Exploit Database
TP LINK TL-WR849N - Remote Code Execution
TP LINK TL-WR849N - Remote Code Execution. CVE-2020-9374 . webapps exploit for Hardware platform
[webapps] Wing FTP Server 6.2.5 - Privilege Escalation
Wing FTP Server 6.2.5 - Privilege Escalation
https://www.exploit-db.com/exploits/48154
Wing FTP Server 6.2.5 - Privilege Escalation
https://www.exploit-db.com/exploits/48154
Exploit Database
Wing FTP Server 6.2.5 - Privilege Escalation
Wing FTP Server 6.2.5 - Privilege Escalation.. webapps exploit for Multiple platform
[remote] Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/48153
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/48153
Exploit Database
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution. CVE-2020-0688 . remote exploit for Windows platform
[webapps] TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
https://www.exploit-db.com/exploits/48152
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
https://www.exploit-db.com/exploits/48152
Exploit Database
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware). CVE-2019-19143 . webapps exploit for Hardware platform
[webapps] Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
https://www.exploit-db.com/exploits/48151
Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
https://www.exploit-db.com/exploits/48151
Exploit Database
WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User). CVE-2020-8615 . webapps exploit for PHP platform
[webapps] RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48161
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48161
Exploit Database
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
[webapps] Alfresco 5.2.4 - Persistent Cross-Site Scripting
Alfresco 5.2.4 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48162
Alfresco 5.2.4 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48162
Exploit Database
Alfresco 5.2.4 - Persistent Cross-Site Scripting
Alfresco 5.2.4 - Persistent Cross-Site Scripting. CVE-2020-8778CVE-2020-8777CVE-2020-8776 . webapps exploit for PHP platform
[webapps] RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
Exploit Database
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
[webapps] GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
Exploit Database
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection.. webapps exploit for PHP platform
[webapps] UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
Exploit Database
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read.. webapps exploit for PHP platform
[remote] EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
Exploit Database
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit). CVE-2020-8657CVE-2020-8656CVE-2020-8655CVE-2020-8654 . remote exploit for Multiple platform
[remote] Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exploit Database
Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit). CVE-2020-0688 . remote exploit for Windows platform
[remote] netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
Exploit Database
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution.. remote exploit for Linux platform
[local] SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
Exploit Database
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path.. local exploit for Windows platform