[webapps] Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion
https://www.exploit-db.com/exploits/48964
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion
https://www.exploit-db.com/exploits/48964
Exploit Database
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local…
Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion. CVE-2020-14864 . webapps exploit for Linux platform
[local] Prey 1.9.6 - "CronService" Unquoted Service Path
Prey 1.9.6 - "CronService" Unquoted Service Path
https://www.exploit-db.com/exploits/48967
Prey 1.9.6 - "CronService" Unquoted Service Path
https://www.exploit-db.com/exploits/48967
Exploit Database
Prey 1.9.6 - "CronService" Unquoted Service Path
Prey 1.9.6 - "CronService" Unquoted Service Path.. local exploit for Windows platform
[local] Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48966
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48966
Exploit Database
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path.. local exploit for Windows platform
[local] Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48965
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48965
Exploit Database
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path
Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path.. local exploit for Windows platform
[local] IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48968
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
https://www.exploit-db.com/exploits/48968
Exploit Database
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path.. local exploit for Windows platform
[webapps] WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
https://www.exploit-db.com/exploits/48971
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
https://www.exploit-db.com/exploits/48971
Exploit Database
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request.. webapps exploit for Java platform
[webapps] Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/48970
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/48970
Exploit Database
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)
Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS).. webapps exploit for CGI platform
[webapps] Online Examination System 1.0 - 'name' Stored Cross Site Scripting
Online Examination System 1.0 - 'name' Stored Cross Site Scripting
https://www.exploit-db.com/exploits/48969
Online Examination System 1.0 - 'name' Stored Cross Site Scripting
https://www.exploit-db.com/exploits/48969
Exploit Database
Online Examination System 1.0 - 'name' Stored Cross Site Scripting
Online Examination System 1.0 - 'name' Stored Cross Site Scripting.. webapps exploit for PHP platform
[webapps] Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
https://www.exploit-db.com/exploits/48972
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
https://www.exploit-db.com/exploits/48972
Exploit Database
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot.. webapps exploit for Hardware platform
[webapps] Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)
Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)
https://www.exploit-db.com/exploits/50096
Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)
https://www.exploit-db.com/exploits/50096
Exploit Database
Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)
Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE).. webapps exploit for Hardware platform
[webapps] TextPattern CMS 4.9.0-dev - Remote Command Execution (RCE) (Authenticated)
TextPattern CMS 4.9.0-dev - Remote Command Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50095
TextPattern CMS 4.9.0-dev - Remote Command Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50095
Exploit Database
TextPattern CMS 4.9.0-dev - Remote Command Execution (RCE) (Authenticated)
TextPattern CMS 4.9.0-dev - Remote Command Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[webapps] Simple Client Management System 1.0 - Remote Code Execution (RCE)
Simple Client Management System 1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50094
Simple Client Management System 1.0 - Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50094
Exploit Database
Simple Client Management System 1.0 - Remote Code Execution (RCE)
Simple Client Management System 1.0 - Remote Code Execution (RCE).. webapps exploit for PHP platform
[webapps] Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated)
Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50093
Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50093
Exploit Database
Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated)
Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated). CVE-2021-24155 . webapps exploit for PHP platform
[webapps] Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)
Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)
https://www.exploit-db.com/exploits/50092
Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)
https://www.exploit-db.com/exploits/50092
Exploit Database
Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)
Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass).. webapps exploit for PHP platform
[webapps] Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50091
Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50091
Exploit Database
Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated)
Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50090
Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50090
Exploit Database
Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated)
Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated).. webapps exploit for PHP platform
[webapps] Online Birth Certificate System 1.1 - 'Multiple' Stored Cross-Site Scripting (XSS)
Online Birth Certificate System 1.1 - 'Multiple' Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50089
Online Birth Certificate System 1.1 - 'Multiple' Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50089
Exploit Database
Online Birth Certificate System 1.1 - 'Multiple' Stored Cross-Site Scripting (XSS)
Online Birth Certificate System 1.1 - 'Multiple' Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] Online Voting System 1.0 - SQLi (Authentication Bypass) + Remote Code Execution (RCE)
Online Voting System 1.0 - SQLi (Authentication Bypass) + Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50088
Online Voting System 1.0 - SQLi (Authentication Bypass) + Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50088
Exploit Database
Online Voting System 1.0 - SQLi (Authentication Bypass) + Remote Code Execution (RCE)
Online Voting System 1.0 - SQLi (Authentication Bypass) + Remote Code Execution (RCE).. webapps exploit for PHP platform
[webapps] OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2)
OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2)
https://www.exploit-db.com/exploits/50087
OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2)
https://www.exploit-db.com/exploits/50087
Exploit Database
OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2)
OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2).. webapps exploit for PHP platform
[webapps] WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50086
WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50086
Exploit Database
WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform