[webapps] WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS)
WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50256
WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50256
Exploit Database
WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS)
WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] OpenSIS 8.0 'modname' - Directory/Path Traversal
OpenSIS 8.0 'modname' - Directory/Path Traversal
https://www.exploit-db.com/exploits/50259
OpenSIS 8.0 'modname' - Directory/Path Traversal
https://www.exploit-db.com/exploits/50259
Exploit Database
OpenSIS 8.0 'modname' - Directory Traversal
OpenSIS 8.0 'modname' - Directory Traversal. CVE-2021-40651 . webapps exploit for PHP platform
[local] Remote Mouse 4.002 - Unquoted Service Path
Remote Mouse 4.002 - Unquoted Service Path
https://www.exploit-db.com/exploits/50258
Remote Mouse 4.002 - Unquoted Service Path
https://www.exploit-db.com/exploits/50258
Exploit Database
Remote Mouse 4.002 - Unquoted Service Path
Remote Mouse 4.002 - Unquoted Service Path.. local exploit for Windows platform
[webapps] Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)
Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)
https://www.exploit-db.com/exploits/50263
Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)
https://www.exploit-db.com/exploits/50263
Exploit Database
Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)
Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR).. webapps exploit for PHP platform
[webapps] FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated)
FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50262
FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50262
Exploit Database
FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated)
FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated). CVE-2021-39608 . webapps exploit for PHP platform
[local] Argus Surveillance DVR 4.0 - Unquoted Service Path
Argus Surveillance DVR 4.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50261
Argus Surveillance DVR 4.0 - Unquoted Service Path
https://www.exploit-db.com/exploits/50261
Exploit Database
Argus Surveillance DVR 4.0 - Unquoted Service Path
Argus Surveillance DVR 4.0 - Unquoted Service Path.. local exploit for Windows platform
[webapps] OpenEMR 6.0.0 - 'noteid' Insecure Direct Object Reference (IDOR)
OpenEMR 6.0.0 - 'noteid' Insecure Direct Object Reference (IDOR)
https://www.exploit-db.com/exploits/50260
OpenEMR 6.0.0 - 'noteid' Insecure Direct Object Reference (IDOR)
https://www.exploit-db.com/exploits/50260
Exploit Database
OpenEMR 6.0.0 - 'noteid' Insecure Direct Object Reference (IDOR)
OpenEMR 6.0.0 - 'noteid' Insecure Direct Object Reference (IDOR). CVE-2021-40352 . webapps exploit for PHP platform
[dos] SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service
SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service
https://www.exploit-db.com/exploits/50266
SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service
https://www.exploit-db.com/exploits/50266
Exploit Database
SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service
SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service.. dos exploit for Windows platform
[webapps] Patient Appointment Scheduler System 1.0 - Persistent/Stored XSS
Patient Appointment Scheduler System 1.0 - Persistent/Stored XSS
https://www.exploit-db.com/exploits/50265
Patient Appointment Scheduler System 1.0 - Persistent/Stored XSS
https://www.exploit-db.com/exploits/50265
Exploit Database
Patient Appointment Scheduler System 1.0 - Persistent/Stored XSS
Patient Appointment Scheduler System 1.0 - Persistent/Stored XSS.. webapps exploit for PHP platform
[webapps] Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50264
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50264
Exploit Database
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE).. webapps exploit for PHP platform
[webapps] Antminer Monitor 0.5.0 - Authentication Bypass
Antminer Monitor 0.5.0 - Authentication Bypass
https://www.exploit-db.com/exploits/50267
Antminer Monitor 0.5.0 - Authentication Bypass
https://www.exploit-db.com/exploits/50267
Exploit Database
Antminer Monitor 0.5.0 - Authentication Bypass
Antminer Monitor 0.5.0 - Authentication Bypass.. webapps exploit for Multiple platform
[webapps] WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
Exploit Database
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)
https://www.exploit-db.com/exploits/50269
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)
https://www.exploit-db.com/exploits/50269
Exploit Database
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2).. webapps exploit for PHP platform
[webapps] WordPress Plugin TablePress 1.14 - CSV Injection
WordPress Plugin TablePress 1.14 - CSV Injection
https://www.exploit-db.com/exploits/50270
WordPress Plugin TablePress 1.14 - CSV Injection
https://www.exploit-db.com/exploits/50270
Exploit Database
WordPress Plugin TablePress 1.14 - CSV Injection
WordPress Plugin TablePress 1.14 - CSV Injection.. webapps exploit for PHP platform
[webapps] Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS)
Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50272
Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50272
Exploit Database
Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS)
Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] ECOA Building Automation System - Weak Default Credentials
ECOA Building Automation System - Weak Default Credentials
https://www.exploit-db.com/exploits/50275
ECOA Building Automation System - Weak Default Credentials
https://www.exploit-db.com/exploits/50275
Exploit Database
ECOA Building Automation System - Weak Default Credentials
ECOA Building Automation System - Weak Default Credentials.. webapps exploit for Hardware platform
[webapps] Men Salon Management System 1.0 - Multiple Vulnerabilities
Men Salon Management System 1.0 - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/50274
Men Salon Management System 1.0 - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/50274
Exploit Database
Men Salon Management System 1.0 - Multiple Vulnerabilities
Men Salon Management System 1.0 - Multiple Vulnerabilities.. webapps exploit for PHP platform
[local] Active WebCam 11.5 - Unquoted Service Path
Active WebCam 11.5 - Unquoted Service Path
https://www.exploit-db.com/exploits/50273
Active WebCam 11.5 - Unquoted Service Path
https://www.exploit-db.com/exploits/50273
Exploit Database
Active WebCam 11.5 - Unquoted Service Path
Active WebCam 11.5 - Unquoted Service Path.. local exploit for Windows platform
[local] ECOA Building Automation System - Missing Encryption Of Sensitive Information
ECOA Building Automation System - Missing Encryption Of Sensitive Information
https://www.exploit-db.com/exploits/50283
ECOA Building Automation System - Missing Encryption Of Sensitive Information
https://www.exploit-db.com/exploits/50283
Exploit Database
ECOA Building Automation System - Missing Encryption Of Sensitive Information
ECOA Building Automation System - Missing Encryption Of Sensitive Information.. local exploit for Hardware platform
[remote] ECOA Building Automation System - Hard-coded Credentials SSH Access
ECOA Building Automation System - Hard-coded Credentials SSH Access
https://www.exploit-db.com/exploits/50282
ECOA Building Automation System - Hard-coded Credentials SSH Access
https://www.exploit-db.com/exploits/50282
Exploit Database
ECOA Building Automation System - Hard-coded Credentials SSH Access
ECOA Building Automation System - Hard-coded Credentials SSH Access.. remote exploit for Hardware platform