[webapps] RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
https://www.exploit-db.com/exploits/48164
Exploit Database
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection.. webapps exploit for Hardware platform
[webapps] GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
https://www.exploit-db.com/exploits/48163
Exploit Database
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection
GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection.. webapps exploit for PHP platform
[webapps] UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48166
Exploit Database
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read.. webapps exploit for PHP platform
[remote] EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
https://www.exploit-db.com/exploits/48169
Exploit Database
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)
EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit). CVE-2020-8657CVE-2020-8656CVE-2020-8655CVE-2020-8654 . remote exploit for Multiple platform
[remote] Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exchange Control Panel - Viewstate Deserialization (Metasploit)
https://www.exploit-db.com/exploits/48168
Exploit Database
Exchange Control Panel - Viewstate Deserialization (Metasploit)
Exchange Control Panel - Viewstate Deserialization (Metasploit). CVE-2020-0688 . remote exploit for Windows platform
[remote] netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
https://www.exploit-db.com/exploits/48170
Exploit Database
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution
netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution.. remote exploit for Linux platform
[local] SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48172
Exploit Database
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path
SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path.. local exploit for Windows platform
[local] Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
https://www.exploit-db.com/exploits/48171
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
https://www.exploit-db.com/exploits/48171
Exploit Database
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path
Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path.. local exploit for Windows platform
[local] Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
https://www.exploit-db.com/exploits/48174
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
https://www.exploit-db.com/exploits/48174
Exploit Database
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path
Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path.. local exploit for Windows platform
[local] ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
https://www.exploit-db.com/exploits/48173
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
https://www.exploit-db.com/exploits/48173
Exploit Database
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path
ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path.. local exploit for Windows platform
[webapps] ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/48176
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/48176
Exploit Database
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution.. webapps exploit for Multiple platform
[webapps] 60CycleCMS - 'news.php' SQL Injection
60CycleCMS - 'news.php' SQL Injection
https://www.exploit-db.com/exploits/48177
60CycleCMS - 'news.php' SQL Injection
https://www.exploit-db.com/exploits/48177
Exploit Database
60CycleCMS - 'news.php' SQL Injection
60CycleCMS - 'news.php' SQL Injection.. webapps exploit for PHP platform
[webapps] Sentrifugo HRMS 3.2 - 'id' SQL Injection
Sentrifugo HRMS 3.2 - 'id' SQL Injection
https://www.exploit-db.com/exploits/48179
Sentrifugo HRMS 3.2 - 'id' SQL Injection
https://www.exploit-db.com/exploits/48179
Exploit Database
Sentrifugo HRMS 3.2 - 'id' SQL Injection
Sentrifugo HRMS 3.2 - 'id' SQL Injection.. webapps exploit for PHP platform
[local] Microsoft Windows - 'WizardOpium' Local Privilege Escalation
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
https://www.exploit-db.com/exploits/48180
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
https://www.exploit-db.com/exploits/48180
Exploit Database
Microsoft Windows - 'WizardOpium' Local Privilege Escalation
Microsoft Windows - 'WizardOpium' Local Privilege Escalation. CVE-2019-1458 . local exploit for Windows platform
[remote] PHP-FPM - Underflow Remote Code Execution (Metasploit)
PHP-FPM - Underflow Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48182
PHP-FPM - Underflow Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48182
Exploit Database
PHP-FPM - Underflow Remote Code Execution (Metasploit)
PHP-FPM - Underflow Remote Code Execution (Metasploit). CVE-2019-11043 . remote exploit for PHP platform
[remote] Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit)
Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit)
https://www.exploit-db.com/exploits/48181
Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit)
https://www.exploit-db.com/exploits/48181
Exploit Database
Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit)
Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit). CVE-2015-1830 . remote exploit for Windows platform
[remote] Google Chrome 80 - JSCreate Side-effect Type Confusion (Metasploit)
Google Chrome 80 - JSCreate Side-effect Type Confusion (Metasploit)
https://www.exploit-db.com/exploits/48186
Google Chrome 80 - JSCreate Side-effect Type Confusion (Metasploit)
https://www.exploit-db.com/exploits/48186
[local] OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)
OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48185
OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48185
Exploit Database
OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)
OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit). CVE-2020-8794 . local exploit for Linux platform
[remote] Google Chrome 67, 68 and 69 - Object.create Type Confusion (Metasploit)
Google Chrome 67, 68 and 69 - Object.create Type Confusion (Metasploit)
https://www.exploit-db.com/exploits/48184
Google Chrome 67, 68 and 69 - Object.create Type Confusion (Metasploit)
https://www.exploit-db.com/exploits/48184
Exploit Database
Google Chrome 67, 68 and 69 - Object.create Type Confusion (Metasploit)
Google Chrome 67, 68 and 69 - Object.create Type Confusion (Metasploit). CVE-2018-17463 . remote exploit for Multiple platform
[remote] Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)
Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)
https://www.exploit-db.com/exploits/48183
Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)
https://www.exploit-db.com/exploits/48183
Exploit Database
Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)
Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit). CVE-2019-5825 . remote exploit for Multiple platform