February 27th, 2021 📆 | 7439 Views ⚑
Path Traversal on Yeastar TG400 GSM Gateway - 91.3.0.3This is a Proof of Concept for CVE-2021-27328Exampleto get firmware decrypting passwordhttp://192.168.43.246/cgi/WebCGI?1404=../../../../../../../../../../bin/firmware_detectto
February 25th, 2021 📆 | 6875 Views ⚑
# Exploit Title: LogonExpert 8.1 – ‘LogonExpertSvc’ Unquoted Service Path# Discovery by: Victor Mondragón# Discovery Date: 23-02-2021# Vendor Homepage: https://www.softros.com/#
February 25th, 2021 📆 | 2765 Views ⚑
# Exploit Title: Softros LAN Messenger 9.6.4 – ‘SoftrosSpellChecker’ Unquoted Service Path# Discovery by: Victor Mondragón# Discovery Date: 23-02-2021# Vendor
February 24th, 2021 📆 | 4655 Views ⚑
# Exploit Title: Softros LAN Messenger 9.6.4 - 'SoftrosSpellChecker' Unquoted Service Path # Discovery by: Victor Mondragón # Discovery Date:
February 24th, 2021 📆 | 7288 Views ⚑
# Exploit Title: LogonExpert 8.1 - 'LogonExpertSvc' Unquoted Service Path # Discovery by: Victor Mondragón # Discovery Date: 23-02-2021 #
February 13th, 2021 📆 | 3174 Views ⚑
# Exploit Title: PDFCOMPLETE Corporate Edition 4.1.45 – ‘pdfcDispatcher’ Unquoted Service Path# Discovery by: Ismael Nava# Discovery Date: 02-11-2020# Vendor
February 12th, 2021 📆 | 1583 Views ⚑
Title: Path traversal Product: SolarWinds Serv-U FTP Server Vendor Homepage: https://www.solarwinds.com/ Vulnerable Version: 15.2.1 and lower Fixed Version: 15.2.2 CVE
February 12th, 2021 📆 | 2681 Views ⚑
# Exploit Title: PDFCOMPLETE Corporate Edition 4.1.45 - 'pdfcDispatcher' Unquoted Service Path # Discovery by: Ismael Nava # Discovery Date:
February 12th, 2021 📆 | 4023 Views ⚑
# Exploit Title: Huawei "MBAMainService" Unquoted Service Path# Date: 2020-12-14# Exploit Author: Andrea Bocchetti# Vendor Homepage:https://consumer.huawei.com/en/support/laptops/matebook-d/# Software Link: https://consumer.huawei.com/en/support/laptops/matebook-d/# Category:Local#
February 11th, 2021 📆 | 5538 Views ⚑
# Exploit Title: AMD Fuel Service - 'Fuel.service' Unquote Service Path # Discovery by: Hector Gerbacio # Discovery Date: 2021-02-05
February 10th, 2021 📆 | 2446 Views ⚑
# Exploit Title: AnyTXT Searcher 1.2.394 - 'ATService' Unquoted Service Path # Date: 2020-12-11 # Exploit Author: Mohammed Alshehri #
February 10th, 2021 📆 | 3301 Views ⚑
# Exploit Title: Epson USB Display 1.6.0.0 – ‘EMP_UDSA’ Unquote Service Path# Discovery by: Hector Gerbacio# Discovery Date: 2021-02-05# Vendor
February 10th, 2021 📆 | 6056 Views ⚑
AnyTXT Searcher 1.2.394 Unquoted Service Path Posted Feb 9, 2021 Authored by Mohammed Alshehri AnyTXT Searcher version 1.2.394 suffers from
February 9th, 2021 📆 | 2047 Views ⚑
# Exploit Title: Millewin – Local Privilege Escalation# Date: 2021-02-07# Author: Andrea Intilangelo# Vendor Homepage: https://www.millewin.it# Software Homepage: https://www.millewin.it/index.php/prodotti/millewin #
February 1st, 2021 📆 | 8467 Views ⚑
Pierre Delcher, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT) on the issues in battling cybercrime and
January 30th, 2021 📆 | 4538 Views ⚑
# Exploit Title: Home Assistant Community Store (HACS) 1.10.0 - Path Traversal to Account Takeover # Date: 2021-01-28 # Exploit
January 30th, 2021 📆 | 4683 Views ⚑
# Exploit Title: Home Assistant Community Store (HACS) 1.10.0 – Path Traversal to Account Takeover# Date: 2021-01-28# Exploit Author: Lyghtnox#
January 10th, 2021 📆 | 2537 Views ⚑
*] *]# Exploit Title: Responsive FileManager 9.13.4 - 'path' Path Traversal # Date: 12/12/2018 (PoC) # Date: 04/01/2020 (Auto Exploit)
January 10th, 2021 📆 | 5850 Views ⚑
# Exploit Title: Intel(R) Matrix Storage Event Monitor x86 8.0.0.1039 - 'IAANTMON' Unquoted Service Path # Date: 2021-01-04 # Exploit
January 6th, 2021 📆 | 3753 Views ⚑
# Exploit Title: Intel(R) Matrix Storage Event Monitor x86 8.0.0.1039 – ‘IAANTMON’ Unquoted Service Path# Date: 2021-01-04# Exploit Author: Geovanni
Comments