[remote] Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root
Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root
https://www.exploit-db.com/exploits/48954
Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root
https://www.exploit-db.com/exploits/48954
Exploit Database
Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root
Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root.. remote exploit for Hardware platform
October 27, 2020
[local] TDM Digital Signage PC Player 4.1 - Insecure File Permissions
TDM Digital Signage PC Player 4.1 - Insecure File Permissions
https://www.exploit-db.com/exploits/48953
TDM Digital Signage PC Player 4.1 - Insecure File Permissions
https://www.exploit-db.com/exploits/48953
Exploit Database
TDM Digital Signage PC Player 4.1 - Insecure File Permissions
TDM Digital Signage PC Player 4.1 - Insecure File Permissions.. local exploit for Windows platform
October 27, 2020
[webapps] Client Management System 1.0 - 'searchdata' SQL injection
Client Management System 1.0 - 'searchdata' SQL injection
https://www.exploit-db.com/exploits/48956
Client Management System 1.0 - 'searchdata' SQL injection
https://www.exploit-db.com/exploits/48956
Exploit Database
Client Management System 1.0 - 'searchdata' SQL injection
Client Management System 1.0 - 'searchdata' SQL injection.. webapps exploit for PHP platform
October 27, 2020
[webapps] Sentrifugo 3.2 - File Upload Restriction Bypass (Authenticated)
Sentrifugo 3.2 - File Upload Restriction Bypass (Authenticated)
https://www.exploit-db.com/exploits/48955
Sentrifugo 3.2 - File Upload Restriction Bypass (Authenticated)
https://www.exploit-db.com/exploits/48955
Exploit Database
Sentrifugo 3.2 - File Upload Restriction Bypass (Authenticated)
Sentrifugo 3.2 - File Upload Restriction Bypass (Authenticated). CVE-2019-15813 . webapps exploit for PHP platform
October 27, 2020
[webapps] Sphider Search Engine 1.3.6 - 'word_upper_bound' RCE (Authenticated)
Sphider Search Engine 1.3.6 - 'word_upper_bound' RCE (Authenticated)
https://www.exploit-db.com/exploits/48957
Sphider Search Engine 1.3.6 - 'word_upper_bound' RCE (Authenticated)
https://www.exploit-db.com/exploits/48957
Exploit Database
Sphider Search Engine 1.3.6 - 'word_upper_bound' RCE (Authenticated)
Sphider Search Engine 1.3.6 - 'word_upper_bound' RCE (Authenticated).. webapps exploit for PHP platform
October 27, 2020
[remote] GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
https://www.exploit-db.com/exploits/48958
GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
https://www.exploit-db.com/exploits/48958
Exploit Database
GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse.. remote exploit for Hardware platform
October 27, 2020
[webapps] CSE Bookstore 1.0 - Authentication Bypass
CSE Bookstore 1.0 - Authentication Bypass
https://www.exploit-db.com/exploits/48960
CSE Bookstore 1.0 - Authentication Bypass
https://www.exploit-db.com/exploits/48960
Exploit Database
CSE Bookstore 1.0 - Authentication Bypass
CSE Bookstore 1.0 - Authentication Bypass.. webapps exploit for PHP platform
October 28, 2020
[webapps] Nagios XI 5.7.3 - 'mibs.php' Remote Command Injection (Authenticated)
Nagios XI 5.7.3 - 'mibs.php' Remote Command Injection (Authenticated)
https://www.exploit-db.com/exploits/48959
Nagios XI 5.7.3 - 'mibs.php' Remote Command Injection (Authenticated)
https://www.exploit-db.com/exploits/48959
Exploit Database
Nagios XI 5.7.3 - 'mibs.php' Remote Command Injection (Authenticated)
Nagios XI 5.7.3 - 'mibs.php' Remote Command Injection (Authenticated). CVE-2020-5791 . webapps exploit for PHP platform
October 28, 2020
[local] Blueman < 2.1.4 - Local Privilege Escalation
Blueman < 2.1.4 - Local Privilege Escalation
https://www.exploit-db.com/exploits/48963
Blueman < 2.1.4 - Local Privilege Escalation
https://www.exploit-db.com/exploits/48963
Exploit Database
Blueman < 2.1.4 - Local Privilege Escalation
Blueman < 2.1.4 - Local Privilege Escalation. CVE-2020-15238 . local exploit for Linux platform
October 28, 2020
[local] aptdaemon < 1.1.1 - File Existence Disclosure
aptdaemon < 1.1.1 - File Existence Disclosure
https://www.exploit-db.com/exploits/48962
aptdaemon < 1.1.1 - File Existence Disclosure
https://www.exploit-db.com/exploits/48962
Exploit Database
aptdaemon < 1.1.1 - File Existence Disclosure
aptdaemon < 1.1.1 - File Existence Disclosure.. local exploit for Linux platform
October 28, 2020
[local] PackageKit < 1.1.13 - File Existence Disclosure
PackageKit < 1.1.13 - File Existence Disclosure
https://www.exploit-db.com/exploits/48961
PackageKit < 1.1.13 - File Existence Disclosure
https://www.exploit-db.com/exploits/48961
Exploit Database
PackageKit < 1.1.13 - File Existence Disclosure
PackageKit < 1.1.13 - File Existence Disclosure.. local exploit for Linux platform
October 28, 2020
[webapps] Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion
https://www.exploit-db.com/exploits/48964
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion
https://www.exploit-db.com/exploits/48964
Exploit Database
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local…
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion. CVE-2020-14864 . webapps exploit for Linux platform
October 28, 2020
[local] Prey 1.9.6 - "CronService" Unquoted Service Path
Prey 1.9.6 - "CronService" Unquoted Service Path
https://www.exploit-db.com/exploits/48967
Prey 1.9.6 - "CronService" Unquoted Service Path
https://www.exploit-db.com/exploits/48967
Exploit Database
Prey 1.9.6 - "CronService" Unquoted Service Path
Prey 1.9.6 - "CronService" Unquoted Service Path.. local exploit for Windows platform
October 28, 2020
[local] Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48966
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48966
Exploit Database
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path.. local exploit for Windows platform
October 28, 2020
[local] Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48965
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48965
Exploit Database
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path.. local exploit for Windows platform
October 28, 2020
[local] IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48968
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48968
Exploit Database
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path.. local exploit for Windows platform
October 28, 2020
[webapps] WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
https://www.exploit-db.com/exploits/48971
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
https://www.exploit-db.com/exploits/48971
Exploit Database
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request.. webapps exploit for Java platform
October 29, 2020
[webapps] Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/48970
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/48970
Exploit Database
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS).. webapps exploit for CGI platform
October 29, 2020
[webapps] Online Examination System 1.0 - 'name' Stored Cross Site Scripting
Online Examination System 1.0 - 'name' Stored Cross Site Scripting
https://www.exploit-db.com/exploits/48969
Online Examination System 1.0 - 'name' Stored Cross Site Scripting
https://www.exploit-db.com/exploits/48969
Exploit Database
Online Examination System 1.0 - 'name' Stored Cross Site Scripting
Online Examination System 1.0 - 'name' Stored Cross Site Scripting.. webapps exploit for PHP platform
October 29, 2020
[webapps] Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
https://www.exploit-db.com/exploits/48972
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
https://www.exploit-db.com/exploits/48972
Exploit Database
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot.. webapps exploit for Hardware platform
October 29, 2020