Microsoft Windows Local Spooler Bypass
Authored by James Forshaw, Google Security Research
Microsoft Windows suffers from a local spooler bypass vulnerability.
advisories | CVE-2020-1337, CVE-2020-17001
Change Mirror Download
Windows: Local Spooler CVE-2020-1337 BypassOne way of exploiting this on...
ShoreTel Conferencing 19.46.1802.0 Cross Site Scripting
Authored by Joe Helle
ShoreTel Conferencing version 19.46.1802.0 suffers from a cross site scripting vulnerability.
advisories | CVE-2020-28351
Change Mirror Download
# Exploit Title: ShoreTel Conferencing 19.46.1802.0 - Reflected Cross-Site Scripting# Date: 11/8/2020#...
Anuko Time Tracker 1.19.23.5325 CSV Injection
Authored by Mufaddal Masalawala
Anuko Time Tracker version 1.19.23.5325 suffers from a CSV formula injection vulnerability.
advisories | CVE-2020-15255
Change Mirror Download
# Exploit Title: Anuko Time Tracker 1.19.23.5325 - CSV/Formula Injection# Date:...
WordPress File Manager 6.8 Remote Code Execution
Authored by Imran E. Dawoodjee, Alex Souza | Site metasploit.com
The WordPress File Manager (wp-file-manager) plugin versions 6.0 through 6.8 allows remote attackers to upload and execute arbitrary PHP code...
Deep Instinct Windows Agent 1.2.24.0 Unquoted Service Path
Authored by Paulina Giron
Deep Instinct Windows Agent version 1.2.24.0 suffers from an unquoted service path vulnerability.
Change Mirror Download
# Exploit Title: Deep Instinct Windows Agent 1.2.24.0 - 'DeepNetworkService' Unquoted Service...
Privacy Drive 3.17.0 Unquoted Service Path
Authored by Mohammed Alshehri
Privacy Drive version 3.17.0 suffers from an unquoted service path vulnerability.
Change Mirror Download
# Exploit Title: Privacy Drive v3.17.0 - 'pdsvc.exe' Unquoted Service Path# Date: 2020-8-20# Exploit...
Joplin 1.2.6 Cross Site Scripting
Authored by Philip Holbrook
Joplin version 1.2.6 suffers from a cross site scripting vulnerability.
Change Mirror Download
# Exploit Title: Joplin 1.2.6 - 'link' Cross Site Scripting# Date: 2020-09-21# Exploit Author: Philip...
Chrome V8 Turbofan Type Confusion
Authored by saelo, Google Security Research
Turbofan fails to deoptimize code after map deprecation, leading to a type confusion vulnerability.
advisories | CVE-2020-16009
Change Mirror Download
V8: Turbofan fails to deoptimize code after...
Chrome ConvertToJavaBitmap Heap Buffer Overflow
Authored by Google Security Research, Glazvunov
Chrome on Android suffers from a ConvertToJavaBitmap heap buffer overflow vulnerability.
advisories | CVE-2020-16011
Car Rental Management System 1.0 Shell Upload / SQL Injection
Authored by Fortunato Lodari
Car Rental Management System version 1.0 remote SQL injection and shell upload exploit.
Change Mirror Download
# Exploit Title: Car Rental Management System 1.0 - SQL injection +...