[local] Wondershare UBackit 2.0.5 - 'wsbackup' Unquoted Service Path
Wondershare UBackit 2.0.5 - 'wsbackup' Unquoted Service Path
https://www.exploit-db.com/exploits/50758
Wondershare UBackit 2.0.5 - 'wsbackup' Unquoted Service Path
https://www.exploit-db.com/exploits/50758
Exploit Database
Wondershare UBackit 2.0.5 - 'wsbackup' Unquoted Service Path
Wondershare UBackit 2.0.5 - 'wsbackup' Unquoted Service Path.. local exploit for Windows platform
[local] Wondershare FamiSafe 1.0 - 'FSService' Unquoted Service Path
Wondershare FamiSafe 1.0 - 'FSService' Unquoted Service Path
https://www.exploit-db.com/exploits/50757
Wondershare FamiSafe 1.0 - 'FSService' Unquoted Service Path
https://www.exploit-db.com/exploits/50757
Exploit Database
Wondershare FamiSafe 1.0 - 'FSService' Unquoted Service Path
Wondershare FamiSafe 1.0 - 'FSService' Unquoted Service Path.. local exploit for Windows platform
[local] Wondershare MobileTrans 3.5.9 - 'ElevationService' Unquoted Service Path
Wondershare MobileTrans 3.5.9 - 'ElevationService' Unquoted Service Path
https://www.exploit-db.com/exploits/50756
Wondershare MobileTrans 3.5.9 - 'ElevationService' Unquoted Service Path
https://www.exploit-db.com/exploits/50756
Exploit Database
Wondershare MobileTrans 3.5.9 - 'ElevationService' Unquoted Service Path
Wondershare MobileTrans 3.5.9 - 'ElevationService' Unquoted Service Path.. local exploit for Windows platform
[local] Wondershare Dr.Fone 11.4.9 - 'DFWSIDService' Unquoted Service Path
Wondershare Dr.Fone 11.4.9 - 'DFWSIDService' Unquoted Service Path
https://www.exploit-db.com/exploits/50755
Wondershare Dr.Fone 11.4.9 - 'DFWSIDService' Unquoted Service Path
https://www.exploit-db.com/exploits/50755
Exploit Database
Wondershare Dr.Fone 11.4.9 - 'DFWSIDService' Unquoted Service Path
Wondershare Dr.Fone 11.4.9 - 'DFWSIDService' Unquoted Service Path.. local exploit for Windows platform
[local] Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path
Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path
https://www.exploit-db.com/exploits/50762
Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path
https://www.exploit-db.com/exploits/50762
Exploit Database
Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path
Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path.. local exploit for Windows platform
[local] Connectify Hotspot 2018 'ConnectifyService' - Unquoted Service Path
Connectify Hotspot 2018 'ConnectifyService' - Unquoted Service Path
https://www.exploit-db.com/exploits/50764
Connectify Hotspot 2018 'ConnectifyService' - Unquoted Service Path
https://www.exploit-db.com/exploits/50764
Exploit Database
Connectify Hotspot 2018 'ConnectifyService' - Unquoted Service Path
Connectify Hotspot 2018 'ConnectifyService' - Unquoted Service Path.. local exploit for Windows platform
[local] File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path
File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path
https://www.exploit-db.com/exploits/50763
File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path
https://www.exploit-db.com/exploits/50763
Exploit Database
File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path
File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Cab Management System 1.0 - 'id' SQLi (Authenticated)
Cab Management System 1.0 - 'id' SQLi (Authenticated)
https://www.exploit-db.com/exploits/50767
Cab Management System 1.0 - 'id' SQLi (Authenticated)
https://www.exploit-db.com/exploits/50767
Exploit Database
Cab Management System 1.0 - 'id' SQLi (Authenticated)
Cab Management System 1.0 - 'id' SQLi (Authenticated).. webapps exploit for PHP platform
[webapps] WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
https://www.exploit-db.com/exploits/50766
WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
https://www.exploit-db.com/exploits/50766
Exploit Database
WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated). CVE-2021-24762 . webapps exploit for PHP platform
[local] HMA VPN 5.3 - Unquoted Service Path
HMA VPN 5.3 - Unquoted Service Path
https://www.exploit-db.com/exploits/50765
HMA VPN 5.3 - Unquoted Service Path
https://www.exploit-db.com/exploits/50765
Exploit Database
HMA VPN 5.3 - Unquoted Service Path
HMA VPN 5.3 - Unquoted Service Path.. local exploit for Windows platform
[webapps] Thinfinity VirtualUI 2.5.26.2 - Information Disclosure
Thinfinity VirtualUI 2.5.26.2 - Information Disclosure
https://www.exploit-db.com/exploits/50771
Thinfinity VirtualUI 2.5.26.2 - Information Disclosure
https://www.exploit-db.com/exploits/50771
Exploit Database
Thinfinity VirtualUI 2.5.26.2 - Information Disclosure
Thinfinity VirtualUI 2.5.26.2 - Information Disclosure. CVE-2021-46354 . webapps exploit for Multiple platform
[webapps] Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection
Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection
https://www.exploit-db.com/exploits/50770
Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection
https://www.exploit-db.com/exploits/50770
Exploit Database
Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection
Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection. CVE-2021-45092 . webapps exploit for Multiple platform
[webapps] Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated)
Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50769
Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50769
Exploit Database
Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated)
Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[webapps] Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)
Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50768
Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50768
Exploit Database
Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)
Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated). CVE-2022-0557 . webapps exploit for PHP platform
[webapps] Dbltek GoIP - Local File Inclusion
Dbltek GoIP - Local File Inclusion
https://www.exploit-db.com/exploits/50775
Dbltek GoIP - Local File Inclusion
https://www.exploit-db.com/exploits/50775
Exploit Database
Dbltek GoIP - Local File Inclusion
Dbltek GoIP - Local File Inclusion.. webapps exploit for Hardware platform
[webapps] FileCloud 21.2 - Cross-Site Request Forgery (CSRF)
FileCloud 21.2 - Cross-Site Request Forgery (CSRF)
https://www.exploit-db.com/exploits/50774
FileCloud 21.2 - Cross-Site Request Forgery (CSRF)
https://www.exploit-db.com/exploits/50774
Exploit Database
FileCloud 21.2 - Cross-Site Request Forgery (CSRF)
FileCloud 21.2 - Cross-Site Request Forgery (CSRF). CVE-2022-25241 . webapps exploit for PHP platform
[local] Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation
Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation
https://www.exploit-db.com/exploits/50773
Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation
https://www.exploit-db.com/exploits/50773
Exploit Database
Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation
Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation.. local exploit for Hardware platform
[webapps] WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)
WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50772
WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50772
Exploit Database
WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)
WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated). CVE-2021-25076 . webapps exploit for PHP platform
[local] Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path
Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50776
Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50776
Exploit Database
Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path
Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path.. local exploit for Windows platform
[remote] Adobe Flash Player - Integer Overflow
Adobe Flash Player - Integer Overflow
https://www.exploit-db.com/exploits/50777
Adobe Flash Player - Integer Overflow
https://www.exploit-db.com/exploits/50777