[local] Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path
Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path
https://www.exploit-db.com/exploits/48790
Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path
https://www.exploit-db.com/exploits/48790
Exploit Database
Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path
Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path.. local exploit for Windows platform
[webapps] Cabot 0.11.12 - Persistent Cross-Site Scripting
Cabot 0.11.12 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48791
Cabot 0.11.12 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48791
Exploit Database
Cabot 0.11.12 - Persistent Cross-Site Scripting
Cabot 0.11.12 - Persistent Cross-Site Scripting.. webapps exploit for Multiple platform
[webapps] ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated)
ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/48793
ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/48793
Exploit Database
ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated)
ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated). CVE-2020-14008 . webapps exploit for Java platform
[webapps] grocy 2.7.1 - Persistent Cross-Site Scripting
grocy 2.7.1 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48792
grocy 2.7.1 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48792
Exploit Database
grocy 2.7.1 - Persistent Cross-Site Scripting
grocy 2.7.1 - Persistent Cross-Site Scripting.. webapps exploit for PHP platform
[local] ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path
ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48794
ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path
https://www.exploit-db.com/exploits/48794
Exploit Database
ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path
ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path.. local exploit for Windows platform
[local] Input Director 1.4.3 - 'Input Director' Unquoted Service Path
Input Director 1.4.3 - 'Input Director' Unquoted Service Path
https://www.exploit-db.com/exploits/48795
Input Director 1.4.3 - 'Input Director' Unquoted Service Path
https://www.exploit-db.com/exploits/48795
Exploit Database
Input Director 1.4.3 - 'Input Director' Unquoted Service Path
Input Director 1.4.3 - 'Input Director' Unquoted Service Path.. local exploit for Windows platform
[webapps] Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)
Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)
https://www.exploit-db.com/exploits/48798
Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)
https://www.exploit-db.com/exploits/48798
Exploit Database
Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)
Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password).. webapps exploit for Java platform
[webapps] Tailor Management System - 'id' SQL Injection
Tailor Management System - 'id' SQL Injection
https://www.exploit-db.com/exploits/48797
Tailor Management System - 'id' SQL Injection
https://www.exploit-db.com/exploits/48797
Exploit Database
Tailor Management System - 'id' SQL Injection
Tailor Management System - 'id' SQL Injection.. webapps exploit for PHP platform
[local] Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)
Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/48796
Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/48796
Exploit Database
Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)
Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH).. local exploit for Windows platform
[webapps] Tiandy IPC and NVR 9.12.7 - Credential Disclosure
Tiandy IPC and NVR 9.12.7 - Credential Disclosure
https://www.exploit-db.com/exploits/48799
Tiandy IPC and NVR 9.12.7 - Credential Disclosure
https://www.exploit-db.com/exploits/48799
Exploit Database
Tiandy IPC and NVR 9.12.7 - Credential Disclosure
Tiandy IPC and NVR 9.12.7 - Credential Disclosure.. webapps exploit for Hardware platform
[webapps] ZTE Router F602W - Captcha Bypass
ZTE Router F602W - Captcha Bypass
https://www.exploit-db.com/exploits/48801
ZTE Router F602W - Captcha Bypass
https://www.exploit-db.com/exploits/48801
Exploit Database
ZTE Router F602W - Captcha Bypass
ZTE Router F602W - Captcha Bypass. CVE-2020-6862 . webapps exploit for Hardware platform
[webapps] CuteNews 2.1.2 - Remote Code Execution
CuteNews 2.1.2 - Remote Code Execution
https://www.exploit-db.com/exploits/48800
CuteNews 2.1.2 - Remote Code Execution
https://www.exploit-db.com/exploits/48800
Exploit Database
CuteNews 2.1.2 - Remote Code Execution
CuteNews 2.1.2 - Remote Code Execution. CVE-2019-11447 . webapps exploit for PHP platform
[webapps] Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)
Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/48805
Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/48805
Exploit Database
Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)
Tea LaTex 1.0 - Remote Code Execution (Unauthenticated).. webapps exploit for Multiple platform
[webapps] VTENEXT 19 CE - Remote Code Execution
VTENEXT 19 CE - Remote Code Execution
https://www.exploit-db.com/exploits/48804
VTENEXT 19 CE - Remote Code Execution
https://www.exploit-db.com/exploits/48804
Exploit Database
VTENEXT 19 CE - Remote Code Execution
VTENEXT 19 CE - Remote Code Execution.. webapps exploit for Multiple platform
[local] Gnome Fonts Viewer 3.34.0 - Heap Corruption
Gnome Fonts Viewer 3.34.0 - Heap Corruption
https://www.exploit-db.com/exploits/48803
Gnome Fonts Viewer 3.34.0 - Heap Corruption
https://www.exploit-db.com/exploits/48803
Exploit Database
Gnome Fonts Viewer 3.34.0 - Heap Corruption
Gnome Fonts Viewer 3.34.0 - Heap Corruption.. local exploit for Linux platform
[local] Internet Explorer 11 - Use-After-Free
Internet Explorer 11 - Use-After-Free
https://www.exploit-db.com/exploits/48806
Internet Explorer 11 - Use-After-Free
https://www.exploit-db.com/exploits/48806
Exploit Database
Internet Explorer 11 - Use-After-Free
Internet Explorer 11 - Use-After-Free. CVE-2020-0674 . local exploit for Windows platform
[webapps] RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting
RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48807
RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/48807
Exploit Database
RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting
RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting.. webapps exploit for Hardware platform
[local] Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path
Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path
https://www.exploit-db.com/exploits/48810
Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path
https://www.exploit-db.com/exploits/48810
Exploit Database
Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path
Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path.. local exploit for Windows platform
[webapps] RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)
RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)
https://www.exploit-db.com/exploits/48809
RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)
https://www.exploit-db.com/exploits/48809
Exploit Database
RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)
RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot). CVE-2020-13259 . webapps exploit for Hardware platform
[local] Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path
Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path
https://www.exploit-db.com/exploits/48808
Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path
https://www.exploit-db.com/exploits/48808
Exploit Database
Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path
Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path.. local exploit for Windows platform