[webapps] Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated)
Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated)
https://www.exploit-db.com/exploits/50647
Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated)
https://www.exploit-db.com/exploits/50647
Exploit Database
Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated)
Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated).. webapps exploit for PHP platform
[webapps] Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated)
Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated)
https://www.exploit-db.com/exploits/50646
Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated)
https://www.exploit-db.com/exploits/50646
Exploit Database
Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated)
Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated).. webapps exploit for PHP platform
[webapps] HTTP Commander 3.1.9 - Stored Cross Site Scripting (XSS)
HTTP Commander 3.1.9 - Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50645
HTTP Commander 3.1.9 - Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50645
Exploit Database
HTTP Commander 3.1.9 - Stored Cross Site Scripting (XSS)
HTTP Commander 3.1.9 - Stored Cross Site Scripting (XSS).. webapps exploit for Windows platform
[local] VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass)
VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass)
https://www.exploit-db.com/exploits/50650
VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass)
https://www.exploit-db.com/exploits/50650
Exploit Database
VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass)
VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass). CVE-2009-0182 . local exploit for Windows platform
[webapps] Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)
Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)
https://www.exploit-db.com/exploits/50649
Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)
https://www.exploit-db.com/exploits/50649
Exploit Database
Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)
Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated).. webapps exploit for PHP platform
[webapps] Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated)
Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated)
https://www.exploit-db.com/exploits/50648
Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated)
https://www.exploit-db.com/exploits/50648
Exploit Database
Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated)
Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated).. webapps exploit for PHP platform
[webapps] Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)
Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)
https://www.exploit-db.com/exploits/50651
Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)
https://www.exploit-db.com/exploits/50651
Exploit Database
Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)
Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated). CVE-2021-44916 . webapps exploit for PHP platform
[remote] CoreFTP Server build 725 - Directory Traversal (Authenticated)
CoreFTP Server build 725 - Directory Traversal (Authenticated)
https://www.exploit-db.com/exploits/50652
CoreFTP Server build 725 - Directory Traversal (Authenticated)
https://www.exploit-db.com/exploits/50652
Exploit Database
CoreFTP Server build 725 - Directory Traversal (Authenticated)
CoreFTP Server build 725 - Directory Traversal (Authenticated). CVE-2022-22836 . remote exploit for Windows platform
[webapps] WordPress Plugin Frontend Uploader 1.3.2 - Stored Cross Site Scripting (XSS) (Unauthenticated)
WordPress Plugin Frontend Uploader 1.3.2 - Stored Cross Site Scripting (XSS) (Unauthenticated)
https://www.exploit-db.com/exploits/50655
WordPress Plugin Frontend Uploader 1.3.2 - Stored Cross Site Scripting (XSS) (Unauthenticated)
https://www.exploit-db.com/exploits/50655
Exploit Database
WordPress Plugin Frontend Uploader 1.3.2 - Stored Cross Site Scripting (XSS) (Unauthenticated)
WordPress Plugin Frontend Uploader 1.3.2 - Stored Cross Site Scripting (XSS) (Unauthenticated). CVE-2021-24563 . webapps exploit for PHP platform
[local] Microsoft Windows Defender - Detections Bypass
Microsoft Windows Defender - Detections Bypass
https://www.exploit-db.com/exploits/50654
Microsoft Windows Defender - Detections Bypass
https://www.exploit-db.com/exploits/50654
Exploit Database
Microsoft Windows Defender - Detections Bypass
Microsoft Windows Defender - Detections Bypass.. local exploit for Windows platform
[local] Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
https://www.exploit-db.com/exploits/50653
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
https://www.exploit-db.com/exploits/50653
Exploit Database
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass.. local exploit for Windows platform
[webapps] SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated)
SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated)
https://www.exploit-db.com/exploits/50659
SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated)
https://www.exploit-db.com/exploits/50659
Exploit Database
SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated)
SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated).. webapps exploit for PHP platform
[webapps] Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS)
Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50658
Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50658
Exploit Database
Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS)
Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)
Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50657
Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50657
Exploit Database
Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)
Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50656
Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50656
Exploit Database
Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] WordPress Core 5.8.2 - 'WP_Query' SQL Injection
WordPress Core 5.8.2 - 'WP_Query' SQL Injection
https://www.exploit-db.com/exploits/50663
WordPress Core 5.8.2 - 'WP_Query' SQL Injection
https://www.exploit-db.com/exploits/50663
Exploit Database
WordPress Core 5.8.2 - 'WP_Query' SQL Injection
WordPress Core 5.8.2 - 'WP_Query' SQL Injection. CVE-2022-21661 . webapps exploit for PHP platform
[webapps] Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated)
Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated)
https://www.exploit-db.com/exploits/50662
Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated)
https://www.exploit-db.com/exploits/50662
Exploit Database
Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated)
Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated).. webapps exploit for PHP platform
[webapps] Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS)
Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50661
Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50661
Exploit Database
Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS)
Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS).. webapps exploit for PHP platform
[webapps] Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated)
Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated)
https://www.exploit-db.com/exploits/50660
Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated)
https://www.exploit-db.com/exploits/50660
Exploit Database
Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated)
Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated).. webapps exploit for PHP platform
[local] WorkTime 10.20 Build 4967 - Unquoted Service Path
WorkTime 10.20 Build 4967 - Unquoted Service Path
https://www.exploit-db.com/exploits/50664
WorkTime 10.20 Build 4967 - Unquoted Service Path
https://www.exploit-db.com/exploits/50664
Exploit Database
WorkTime 10.20 Build 4967 - Unquoted Service Path
WorkTime 10.20 Build 4967 - Unquoted Service Path.. local exploit for Windows platform