[remote] Apache Solr - Remote Code Execution via Velocity Template (Metasploit)
Apache Solr - Remote Code Execution via Velocity Template (Metasploit)
https://www.exploit-db.com/exploits/48338
Apache Solr - Remote Code Execution via Velocity Template (Metasploit)
https://www.exploit-db.com/exploits/48338
Exploit Database
Apache Solr - Remote Code Execution via Velocity Template (Metasploit)
Apache Solr - Remote Code Execution via Velocity Template (Metasploit). CVE-2019-17558 . remote exploit for Multiple platform
[local] VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)
VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48337
VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48337
Exploit Database
VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)
VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit). CVE-2020-3950 . local exploit for macOS platform
[remote] DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit)
DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48336
DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48336
Exploit Database
DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit)
DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit). CVE-2018-18326CVE-2018-18325CVE-2018-15812CVE-2018-15811CVE-2017-9822 . remote exploit for Windows platform
[remote] PlaySMS - index.php Unauthenticated Template Injection Code Execution (Metasploit)
PlaySMS - index.php Unauthenticated Template Injection Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48335
PlaySMS - index.php Unauthenticated Template Injection Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48335
Exploit Database
PlaySMS - index.php Unauthenticated Template Injection Code Execution (Metasploit)
PlaySMS - index.php Unauthenticated Template Injection Code Execution (Metasploit). CVE-2020-8644 . remote exploit for PHP platform
[remote] Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48334
Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/48334
Exploit Database
Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit).. remote exploit for Linux platform
[remote] ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
https://www.exploit-db.com/exploits/48333
ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
https://www.exploit-db.com/exploits/48333
Exploit Database
ThinkPHP - Multiple PHP Injection RCEs (Metasploit)
ThinkPHP - Multiple PHP Injection RCEs (Metasploit). CVE-2019-9082CVE-2018-20062 . remote exploit for Linux platform
[local] Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48397
Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48397
Exploit Database
Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC).. local exploit for Windows platform
[local] Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
https://www.exploit-db.com/exploits/48396
Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
https://www.exploit-db.com/exploits/48396
Exploit Database
Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path.. local exploit for Windows platform
[webapps] Easy Transfer 1.7 for iOS - Directory Traversal
Easy Transfer 1.7 for iOS - Directory Traversal
https://www.exploit-db.com/exploits/48395
Easy Transfer 1.7 for iOS - Directory Traversal
https://www.exploit-db.com/exploits/48395
Exploit Database
Easy Transfer 1.7 for iOS - Directory Traversal
Easy Transfer 1.7 for iOS - Directory Traversal.. webapps exploit for iOS platform
[webapps] School ERP Pro 1.0 - Arbitrary File Read
School ERP Pro 1.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48394
School ERP Pro 1.0 - Arbitrary File Read
https://www.exploit-db.com/exploits/48394
Exploit Database
School ERP Pro 1.0 - Arbitrary File Read
School ERP Pro 1.0 - Arbitrary File Read.. webapps exploit for PHP platform
[webapps] Open-AudIT Professional 3.3.1 - Remote Code Execution
Open-AudIT Professional 3.3.1 - Remote Code Execution
https://www.exploit-db.com/exploits/48393
Open-AudIT Professional 3.3.1 - Remote Code Execution
https://www.exploit-db.com/exploits/48393
Exploit Database
Open-AudIT Professional 3.3.1 - Remote Code Execution
Open-AudIT Professional 3.3.1 - Remote Code Execution.. webapps exploit for PHP platform
[webapps] School ERP Pro 1.0 - Remote Code Execution
School ERP Pro 1.0 - Remote Code Execution
https://www.exploit-db.com/exploits/48392
School ERP Pro 1.0 - Remote Code Execution
https://www.exploit-db.com/exploits/48392
Exploit Database
School ERP Pro 1.0 - Remote Code Execution
School ERP Pro 1.0 - Remote Code Execution.. webapps exploit for PHP platform
[local] NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path
NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path
https://www.exploit-db.com/exploits/48391
NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path
https://www.exploit-db.com/exploits/48391
Exploit Database
NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path
NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path.. local exploit for Windows platform
[webapps] School ERP Pro 1.0 - 'es_messagesid' SQL Injection
School ERP Pro 1.0 - 'es_messagesid' SQL Injection
https://www.exploit-db.com/exploits/48390
School ERP Pro 1.0 - 'es_messagesid' SQL Injection
https://www.exploit-db.com/exploits/48390
Exploit Database
School ERP Pro 1.0 - 'es_messagesid' SQL Injection
School ERP Pro 1.0 - 'es_messagesid' SQL Injection.. webapps exploit for PHP platform
[remote] CloudMe 1.11.2 - Buffer Overflow (PoC)
CloudMe 1.11.2 - Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48389
CloudMe 1.11.2 - Buffer Overflow (PoC)
https://www.exploit-db.com/exploits/48389
[local] Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48388
Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/48388
Exploit Database
Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)
Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit). CVE-2019-15752 . local exploit for Windows platform
[local] Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/48387
Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
https://www.exploit-db.com/exploits/48387
Exploit Database
Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution. CVE-2020-12242 . local exploit for macOS platform
[webapps] Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
https://www.exploit-db.com/exploits/48386
Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
https://www.exploit-db.com/exploits/48386
Exploit Database
Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin).. webapps exploit for PHP platform
[webapps] Online Course Registration 2.0 - Authentication Bypass
Online Course Registration 2.0 - Authentication Bypass
https://www.exploit-db.com/exploits/48385
Online Course Registration 2.0 - Authentication Bypass
https://www.exploit-db.com/exploits/48385
Exploit Database
Online Course Registration 2.0 - Authentication Bypass
Online Course Registration 2.0 - Authentication Bypass.. webapps exploit for PHP platform
[webapps] Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
https://www.exploit-db.com/exploits/48384
Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
https://www.exploit-db.com/exploits/48384
Exploit Database
Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak.. webapps exploit for Hardware platform