[webapps] WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated)
WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated)
https://www.exploit-db.com/exploits/50564
WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated)
https://www.exploit-db.com/exploits/50564
Exploit Database
WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated)
WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated). CVE-2021-39316 . webapps exploit for PHP platform
[webapps] WordPress Plugin Slider by Soliloquy 2.6.2 - 'title' Stored Cross Site Scripting (XSS) (Authenticated)
WordPress Plugin Slider by Soliloquy 2.6.2 - 'title' Stored Cross Site Scripting (XSS) (Authenticated)
https://www.exploit-db.com/exploits/50563
WordPress Plugin Slider by Soliloquy 2.6.2 - 'title' Stored Cross Site Scripting (XSS) (Authenticated)
https://www.exploit-db.com/exploits/50563
Exploit Database
WordPress Plugin Slider by Soliloquy 2.6.2 - 'title' Stored Cross Site Scripting (XSS) (Authenticated)
WordPress Plugin Slider by Soliloquy 2.6.2 - 'title' Stored Cross Site Scripting (XSS) (Authenticated).. webapps exploit for PHP platform
[webapps] WordPress Plugin All-in-One Video Gallery plugin 2.4.9 - Local File Inclusion (LFI)
WordPress Plugin All-in-One Video Gallery plugin 2.4.9 - Local File Inclusion (LFI)
https://www.exploit-db.com/exploits/50562
WordPress Plugin All-in-One Video Gallery plugin 2.4.9 - Local File Inclusion (LFI)
https://www.exploit-db.com/exploits/50562
Exploit Database
WordPress Plugin All-in-One Video Gallery plugin 2.4.9 - Local File Inclusion (LFI)
WordPress Plugin All-in-One Video Gallery plugin 2.4.9 - Local File Inclusion (LFI).. webapps exploit for PHP platform
[local] HCL Lotus Notes V12 - Unquoted Service Path
HCL Lotus Notes V12 - Unquoted Service Path
https://www.exploit-db.com/exploits/50566
HCL Lotus Notes V12 - Unquoted Service Path
https://www.exploit-db.com/exploits/50566
Exploit Database
HCL Lotus Notes V12 - Unquoted Service Path
HCL Lotus Notes V12 - Unquoted Service Path.. local exploit for Windows platform
[remote] Auerswald COMfortel 3600 - Authentication Bypass
Auerswald COMfortel 3600 - Authentication Bypass
https://www.exploit-db.com/exploits/50565
Auerswald COMfortel 3600 - Authentication Bypass
https://www.exploit-db.com/exploits/50565
Exploit Database
Auerswald COMfortel 2.8F - Authentication Bypass
Auerswald COMfortel 2.8F - Authentication Bypass.. remote exploit for Hardware platform
[webapps] Croogo 3.0.2 - Remote Code Execution (Authenticated)
Croogo 3.0.2 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50570
Croogo 3.0.2 - Remote Code Execution (Authenticated)
https://www.exploit-db.com/exploits/50570
Exploit Database
Croogo 3.0.2 - Remote Code Execution (Authenticated)
Croogo 3.0.2 - Remote Code Execution (Authenticated).. webapps exploit for PHP platform
[remote] Auerswald COMpact 8.0B - Multiple Backdoors
Auerswald COMpact 8.0B - Multiple Backdoors
https://www.exploit-db.com/exploits/50569
Auerswald COMpact 8.0B - Multiple Backdoors
https://www.exploit-db.com/exploits/50569
Exploit Database
Auerswald COMpact 8.0B - Multiple Backdoors
Auerswald COMpact 8.0B - Multiple Backdoors.. remote exploit for Hardware platform
[remote] Auerswald COMpact 8.0B - Arbitrary File Disclosure
Auerswald COMpact 8.0B - Arbitrary File Disclosure
https://www.exploit-db.com/exploits/50568
Auerswald COMpact 8.0B - Arbitrary File Disclosure
https://www.exploit-db.com/exploits/50568
Exploit Database
Auerswald COMpact 8.0B - Arbitrary File Disclosure
Auerswald COMpact 8.0B - Arbitrary File Disclosure.. remote exploit for Hardware platform
[remote] Auerswald COMpact 8.0B - Privilege Escalation
Auerswald COMpact 8.0B - Privilege Escalation
https://www.exploit-db.com/exploits/50567
Auerswald COMpact 8.0B - Privilege Escalation
https://www.exploit-db.com/exploits/50567
Exploit Database
Auerswald COMpact 8.0B - Privilege Escalation
Auerswald COMpact 8.0B - Privilege Escalation.. remote exploit for Hardware platform
[webapps] Chikitsa Patient Management System 2.0.2 - Remote Code Execution (RCE) (Authenticated)
Chikitsa Patient Management System 2.0.2 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50571
Chikitsa Patient Management System 2.0.2 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50571
Exploit Database
Chikitsa Patient Management System 2.0.2 - 'plugin' Remote Code Execution (RCE) (Authenticated)
Chikitsa Patient Management System 2.0.2 - 'plugin' Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[webapps] LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated)
LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50573
LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50573
Exploit Database
LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated)
LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[webapps] Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated)
Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50572
Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50572
Exploit Database
Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated)
Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[remote] Raspberry Pi 5.10 - Default Credentials
Raspberry Pi 5.10 - Default Credentials
https://www.exploit-db.com/exploits/50576
Raspberry Pi 5.10 - Default Credentials
https://www.exploit-db.com/exploits/50576
Exploit Database
Raspberry Pi 5.10 - Default Credentials
Raspberry Pi 5.10 - Default Credentials. CVE-2021-38759 . remote exploit for Linux platform
[local] MTPutty 1.0.1.21 - SSH Password Disclosure
MTPutty 1.0.1.21 - SSH Password Disclosure
https://www.exploit-db.com/exploits/50574
MTPutty 1.0.1.21 - SSH Password Disclosure
https://www.exploit-db.com/exploits/50574
Exploit Database
MTPutty 1.0.1.21 - SSH Password Disclosure
MTPutty 1.0.1.21 - SSH Password Disclosure.. local exploit for Windows platform
[webapps] Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated)
Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50580
Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50580
Exploit Database
Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated)
Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for PHP platform
[webapps] Student Management System 1.0 - SQLi Authentication Bypass
Student Management System 1.0 - SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50579
Student Management System 1.0 - SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50579
Exploit Database
Student Management System 1.0 - SQLi Authentication Bypass
Student Management System 1.0 - SQLi Authentication Bypass. CVE-2020-23935 . webapps exploit for PHP platform
[webapps] TestLink 1.19 - Arbitrary File Download (Unauthenticated)
TestLink 1.19 - Arbitrary File Download (Unauthenticated)
https://www.exploit-db.com/exploits/50578
TestLink 1.19 - Arbitrary File Download (Unauthenticated)
https://www.exploit-db.com/exploits/50578
Exploit Database
TestLink 1.19 - Arbitrary File Download (Unauthenticated)
TestLink 1.19 - Arbitrary File Download (Unauthenticated).. webapps exploit for PHP platform
[webapps] Grafana 8.3.0 - Directory Traversal and Arbitrary File Read
Grafana 8.3.0 - Directory Traversal and Arbitrary File Read
https://www.exploit-db.com/exploits/50581
Grafana 8.3.0 - Directory Traversal and Arbitrary File Read
https://www.exploit-db.com/exploits/50581
Exploit Database
Grafana 8.3.0 - Directory Traversal and Arbitrary File Read
Grafana 8.3.0 - Directory Traversal and Arbitrary File Read. CVE-2021-43798 . webapps exploit for Multiple platform
[webapps] Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50583
Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50583
Exploit Database
Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass
Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50582
Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass
https://www.exploit-db.com/exploits/50582
Exploit Database
Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass
Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass.. webapps exploit for PHP platform