[webapps] Attendance and Payroll System v1.0 - SQLi Authentication Bypass
Attendance and Payroll System v1.0 - SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50802
Attendance and Payroll System v1.0 - SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50802
Exploit Database
Attendance and Payroll System v1.0 - SQLi Authentication Bypass
Attendance and Payroll System v1.0 - SQLi Authentication Bypass.. webapps exploit for PHP platform
[webapps] Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50801
Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50801
Exploit Database
Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
Attendance and Payroll System v1.0 - Remote Code Execution (RCE).. webapps exploit for PHP platform
[webapps] part-db 0.5.11 - Remote Code Execution (RCE)
part-db 0.5.11 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50800
part-db 0.5.11 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50800
Exploit Database
part-db 0.5.11 - Remote Code Execution (RCE)
part-db 0.5.11 - Remote Code Execution (RCE). CVE-2022-0848 . webapps exploit for PHP platform
[local] Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
https://www.exploit-db.com/exploits/50808
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
https://www.exploit-db.com/exploits/50808
Exploit Database
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe). CVE-2022-0847 . local exploit for Linux platform
[local] Audio Conversion Wizard v2.01 - Buffer Overflow
Audio Conversion Wizard v2.01 - Buffer Overflow
https://www.exploit-db.com/exploits/50811
Audio Conversion Wizard v2.01 - Buffer Overflow
https://www.exploit-db.com/exploits/50811
Exploit Database
Audio Conversion Wizard v2.01 - Buffer Overflow
Audio Conversion Wizard v2.01 - Buffer Overflow.. local exploit for Windows platform
[local] Cobian Backup 0.9 - Unquoted Service Path
Cobian Backup 0.9 - Unquoted Service Path
https://www.exploit-db.com/exploits/50810
Cobian Backup 0.9 - Unquoted Service Path
https://www.exploit-db.com/exploits/50810
Exploit Database
Cobian Backup 0.9 - Unquoted Service Path
Cobian Backup 0.9 - Unquoted Service Path.. local exploit for Windows platform
[webapps] Webmin 1.984 - Remote Code Execution (Authenticated)
Webmin 1.984 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50809
Webmin 1.984 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50809
Exploit Database
Webmin 1.984 - Remote Code Execution (Authenticated)
Webmin 1.984 - Remote Code Execution (Authenticated). CVE-2022-0824 . webapps exploit for Linux platform
[local] Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
https://www.exploit-db.com/exploits/50813
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
https://www.exploit-db.com/exploits/50813
Exploit Database
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path
Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path.. local exploit for Windows platform
[local] Printix Client 1.3.1106.0 - Privilege Escalation
Printix Client 1.3.1106.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50812
Printix Client 1.3.1106.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50812
Exploit Database
Printix Client 1.3.1106.0 - Privilege Escalation
Printix Client 1.3.1106.0 - Privilege Escalation. CVE-2022-25090 . local exploit for Windows platform
[local] McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
https://www.exploit-db.com/exploits/50814
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
https://www.exploit-db.com/exploits/50814
Exploit Database
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege
McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege.. local exploit for Windows platform
[remote] Siemens S7-1200 - Unauthenticated Start/Stop Command
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Siemens S7-1200 - Unauthenticated Start/Stop Command
https://www.exploit-db.com/exploits/50820
Exploit-Db
OffSec’s Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
[local] Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
https://www.exploit-db.com/exploits/50819
Exploit Database
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path
Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path.. local exploit for Windows platform
[local] WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
https://www.exploit-db.com/exploits/50818
Exploit Database
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path
WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path.. local exploit for Windows platform
[local] Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
https://www.exploit-db.com/exploits/50817
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
https://www.exploit-db.com/exploits/50817
Exploit Database
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path
Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path.. local exploit for Windows platform
[webapps] Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Exploit Database
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[local] BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
Exploit Database
BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path.. local exploit for Windows platform
[remote] Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Exploit Database
Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection.. remote exploit for Multiple platform
[remote] Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Exploit Database
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated). CVE-2020-17456 . remote exploit for Hardware platform
[local] VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
Exploit Database
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Exploit Database
Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi.. webapps exploit for Multiple platform