Privacy Drive v3.17.0 (CVE-2020-27505)
- https://www.exploit-db.com/exploits/49023
- https://exchange.xforce.ibmcloud.com/vulnerabilities/191387
Veyon 4.4.2 (CVE-2020-15261)
Program Access Controller v1.2.0.0 (CVE-2020-27504)
- https://www.exploit-db.com/exploits/48966
- https://exchange.xforce.ibmcloud.com/vulnerabilities/190825
IP Watcher v3.0.0.30 (CVE-2020-27503)
- https://www.exploit-db.com/exploits/48968
- https://exchange.xforce.ibmcloud.com/vulnerabilities/190824
Traccar 4.12 (CVE-2021-21292)
Ext2Fsd v0.68 (CVE-2021-43463)
- https://www.exploit-db.com/exploits/49706
- https://exchange.xforce.ibmcloud.com/vulnerabilities/198746
Vembu BDR 4.2.0.1 U1 (CVE-2021-43458)
- https://www.exploit-db.com/exploits/49641
- https://exchange.xforce.ibmcloud.com/vulnerabilities/198151
FreeLAN 2.2 (CVE-2021-43455)
- https://www.exploit-db.com/exploits/49630
- https://exchange.xforce.ibmcloud.com/vulnerabilities/197919
bVPN 2.5.1 (CVE-2021-43457)
- https://www.exploit-db.com/exploits/49632
- https://exchange.xforce.ibmcloud.com/vulnerabilities/197938
Rumble Mail Server 0.51.3135 (CVE-2021-43456)
- https://www.exploit-db.com/exploits/49203
- https://exchange.xforce.ibmcloud.com/vulnerabilities/192729
System Explorer 7.0.0 (CVE-2021-43460)
- https://www.exploit-db.com/exploits/49248
- https://exchange.xforce.ibmcloud.com/vulnerabilities/193324
AnyTXT Searcher 1.2.394 (CVE-2021-43454)
- https://www.exploit-db.com/exploits/49549
- https://exchange.xforce.ibmcloud.com/vulnerabilities/196532
Sandboxie Plus v0.7.2
- https://www.exploit-db.com/exploits/49631
- https://exchange.xforce.ibmcloud.com/vulnerabilities/197937
VFS for Git 1.0.21014.1
- https://www.exploit-db.com/exploits/49661
- https://exchange.xforce.ibmcloud.com/vulnerabilities/198405
WinAVR Version 20100110
- https://www.exploit-db.com/exploits/49379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/194280
DiskBoss v11.7.28