[webapps] Wing FTP Server 6.2.5 - Privilege Escalation
Wing FTP Server 6.2.5 - Privilege Escalation
https://www.exploit-db.com/exploits/48154
Wing FTP Server 6.2.5 - Privilege Escalation
https://www.exploit-db.com/exploits/48154
Exploit Database
Wing FTP Server 6.2.5 - Privilege Escalation
Wing FTP Server 6.2.5 - Privilege Escalation.. webapps exploit for Multiple platform
[remote] Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/48153
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/48153
Exploit Database
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution
Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution. CVE-2020-0688 . remote exploit for Windows platform
[webapps] TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
https://www.exploit-db.com/exploits/48152
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
https://www.exploit-db.com/exploits/48152
Exploit Database
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)
TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware). CVE-2019-19143 . webapps exploit for Hardware platform
[webapps] Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
https://www.exploit-db.com/exploits/48151
Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
https://www.exploit-db.com/exploits/48151
Exploit Database
WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)
WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User). CVE-2020-8615 . webapps exploit for PHP platform
[webapps] RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48161
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48161
Exploit Database
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
[webapps] Alfresco 5.2.4 - Persistent Cross-Site Scripting
Alfresco 5.2.4 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48162
Alfresco 5.2.4 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48162
Exploit Database
Alfresco 5.2.4 - Persistent Cross-Site Scripting
Alfresco 5.2.4 - Persistent Cross-Site Scripting. CVE-2020-8778CVE-2020-8777CVE-2020-8776 . webapps exploit for PHP platform
[webapps] RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
Exploit Database
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
[webapps] GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
Exploit Database
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection.. webapps exploit for PHP platform
[webapps] UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
Exploit Database
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read.. webapps exploit for PHP platform
[remote] EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
Exploit Database
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit). CVE-2020-8657CVE-2020-8656CVE-2020-8655CVE-2020-8654 . remote exploit for Multiple platform
[remote] Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exploit Database
Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit). CVE-2020-0688 . remote exploit for Windows platform
[remote] netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
Exploit Database
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution.. remote exploit for Linux platform
[local] SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
Exploit Database
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path.. local exploit for Windows platform
[local] Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
https://www.exploit-db.com/exploits/48171
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
https://www.exploit-db.com/exploits/48171
Exploit Database
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path.. local exploit for Windows platform
[local] Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
https://www.exploit-db.com/exploits/48174
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
https://www.exploit-db.com/exploits/48174
Exploit Database
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path.. local exploit for Windows platform
[local] ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
https://www.exploit-db.com/exploits/48173
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
https://www.exploit-db.com/exploits/48173
Exploit Database
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path.. local exploit for Windows platform
[webapps] ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/48176
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/48176
Exploit Database
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution.. webapps exploit for Multiple platform
[webapps] 60CycleCMS - 'news.php' SQL Injection
60CycleCMS - 'news.php' SQL Injection
https://www.exploit-db.com/exploits/48177
60CycleCMS - 'news.php' SQL Injection
https://www.exploit-db.com/exploits/48177
Exploit Database
60CycleCMS - 'news.php' SQL Injection
60CycleCMS - 'news.php' SQL Injection.. webapps exploit for PHP platform
[webapps] Sentrifugo HRMS 3.2 - 'id' SQL Injection
Sentrifugo HRMS 3.2 - 'id' SQL Injection
https://www.exploit-db.com/exploits/48179
Sentrifugo HRMS 3.2 - 'id' SQL Injection
https://www.exploit-db.com/exploits/48179
Exploit Database
Sentrifugo HRMS 3.2 - 'id' SQL Injection
Sentrifugo HRMS 3.2 - 'id' SQL Injection.. webapps exploit for PHP platform
[local] Microsoft Windows - 'WizardOpium' Local Privilege Escalation
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
https://www.exploit-db.com/exploits/48180
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
https://www.exploit-db.com/exploits/48180
Exploit Database
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
Microsoft Windows - 'WizardOpium' Local Privilege Escalation. CVE-2019-1458 . local exploit for Windows platform