[webapps] Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50816
Exploit Database
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)
Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[local] BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
BattlEye 0.9 - 'BEService' Unquoted Service Path
https://www.exploit-db.com/exploits/50815
Exploit Database
BattlEye 0.9 - 'BEService' Unquoted Service Path
BattlEye 0.9 - 'BEService' Unquoted Service Path.. local exploit for Windows platform
[remote] Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Tdarr 2.00.15 - Command Injection
https://www.exploit-db.com/exploits/50822
Exploit Database
Tdarr 2.00.15 - Command Injection
Tdarr 2.00.15 - Command Injection.. remote exploit for Multiple platform
[remote] Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
https://www.exploit-db.com/exploits/50821
Exploit Database
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)
Seowon SLR-120 Router - Remote Code Execution (Unauthenticated). CVE-2020-17456 . remote exploit for Hardware platform
[local] VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
https://www.exploit-db.com/exploits/50824
Exploit Database
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path
VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path.. local exploit for Windows platform
[webapps] Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Baixar GLPI Project 9.4.6 - SQLi
https://www.exploit-db.com/exploits/50823
Exploit Database
Baixar GLPI Project 9.4.6 - SQLi
Baixar GLPI Project 9.4.6 - SQLi.. webapps exploit for Multiple platform
[webapps] Moodle 3.11.5 - SQLi (Authenticated)
Moodle 3.11.5 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50825
Moodle 3.11.5 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50825
Exploit Database
Moodle 3.11.5 - SQLi (Authenticated)
Moodle 3.11.5 - SQLi (Authenticated).. webapps exploit for PHP platform
[webapps] Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50828
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50828
Exploit Database
Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
Tiny File Manager 2.4.6 - Remote Code Execution (RCE). CVE-2021-45010CVE-2021-40964 . webapps exploit for PHP platform
[remote] Hikvision IP Camera - Backdoor
Hikvision IP Camera - Backdoor
https://www.exploit-db.com/exploits/50827
Hikvision IP Camera - Backdoor
https://www.exploit-db.com/exploits/50827
[webapps] Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50826
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50826
Exploit Database
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)
Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated). CVE-2022-26965 . webapps exploit for PHP platform
[remote] Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50829
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50829
Exploit Database
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Apache APISIX 2.12.1 - Remote Code Execution (RCE). CVE-2022-24112 . remote exploit for Multiple platform
[webapps] Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
https://www.exploit-db.com/exploits/50830
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
https://www.exploit-db.com/exploits/50830
Exploit Database
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)
Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated).. webapps exploit for PHP platform
[webapps] ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
https://www.exploit-db.com/exploits/50831
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
https://www.exploit-db.com/exploits/50831
[remote] Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50833
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50833
Exploit Database
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE). CVE-2021-44529 . remote exploit for Multiple platform
[remote] iRZ Mobile Router - CSRF to RCE
iRZ Mobile Router - CSRF to RCE
https://www.exploit-db.com/exploits/50832
iRZ Mobile Router - CSRF to RCE
https://www.exploit-db.com/exploits/50832
Exploit Database
iRZ Mobile Router - CSRF to RCE
iRZ Mobile Router - CSRF to RCE. CVE-2022-27226 . remote exploit for Hardware platform
[remote] ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
https://www.exploit-db.com/exploits/50836
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
https://www.exploit-db.com/exploits/50836
Exploit Database
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure
ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure.. remote exploit for Hardware platform
[remote] ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)
ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50835
ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50835
Exploit Database
ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)
ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS).. remote exploit for Hardware platform
[local] Sysax FTP Automation 6.9.0 - Privilege Escalation
Sysax FTP Automation 6.9.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50834
Sysax FTP Automation 6.9.0 - Privilege Escalation
https://www.exploit-db.com/exploits/50834
Exploit Database
Sysax FTP Automation 6.9.0 - Privilege Escalation
Sysax FTP Automation 6.9.0 - Privilege Escalation.. local exploit for Windows platform
[local] ProtonVPN 1.26.0 - Unquoted Service Path
ProtonVPN 1.26.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50837
ProtonVPN 1.26.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50837
Exploit Database
ProtonVPN 1.26.0 - Unquoted Service Path
ProtonVPN 1.26.0 - Unquoted Service Path.. local exploit for Windows platform
[webapps] WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated
WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated
https://www.exploit-db.com/exploits/50838
WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated
https://www.exploit-db.com/exploits/50838
Exploit Database
WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated
WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated.. webapps exploit for PHP platform