{"text": "Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN", "spans": {"SYSTEM: Android": [[0, 7]], "VULNERABILITY: ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN": [[10, 74]]}, "info": {"source": "exploitdb", "exploit_id": "47921"}} {"text": "FLEX 1080 < 1085 Web 1.6.0 - Denial of Service", "spans": {"SYSTEM: FLEX 1080 < 1085 Web 1.6.0": [[0, 26]], "VULNERABILITY: Denial of Service": [[29, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51438"}} {"text": "WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM", "spans": {"SYSTEM: WeChat": [[0, 6]], "VULNERABILITY: Memory Corruption": [[9, 26]]}, "info": {"source": "exploitdb", "exploit_id": "47920"}} {"text": "Android Binder - Use-After-Free (Metasploit)", "spans": {"SYSTEM: Android Binder": [[0, 14]], "VULNERABILITY: Use-After-Free": [[17, 31]], "TOOL: Metasploit": [[33, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48129"}} {"text": "Tasks 9.7.3 - Insecure Permissions", "spans": {"SYSTEM: Tasks 9.7.3": [[0, 11]], "VULNERABILITY: Insecure Permissions": [[14, 34]]}, "info": {"source": "exploitdb", "exploit_id": "49563"}} {"text": "Xiaomi browser 10.2.4.g - Browser Search History Disclosure", "spans": {"SYSTEM: Xiaomi browser 10.2.4.g": [[0, 23]], "VULNERABILITY: Browser Search History Disclosure": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50188"}} {"text": "AWebServer GhostBuilding 18 - Denial of Service (DoS)", "spans": {"SYSTEM: AWebServer GhostBuilding 18": [[0, 27]], "VULNERABILITY: Denial of Service (DoS)": [[30, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50629"}} {"text": "Bookeen Notea - Directory Traversal", "spans": {"SYSTEM: Bookeen Notea": [[0, 13]], "VULNERABILITY: Directory Traversal": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50897"}} {"text": "ES File Explorer 4.1.9.7.4 - Arbitrary File Read", "spans": {"SYSTEM: ES File Explorer 4.1.9.7.4": [[0, 26]], "VULNERABILITY: Arbitrary File Read": [[29, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50070"}} {"text": "Magic Home Pro 1.5.1 - Authentication Bypass", "spans": {"SYSTEM: Magic Home Pro 1.5.1": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49266"}} {"text": "Roxy Fileman 1.4.5 - Arbitrary File Upload", "spans": {"SYSTEM: Roxy Fileman 1.4.5": [[0, 18]], "VULNERABILITY: Arbitrary File Upload": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51355"}} {"text": "Build Smart ERP 21.0817 - 'eidValue' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Build Smart ERP 21.0817": [[0, 23]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50445"}} {"text": "Enhanced Multimedia Router 3.0.4.27 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Enhanced Multimedia Router 3.0.4.27": [[0, 35]], "VULNERABILITY: Cross-Site Request Forgery": [[38, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48217"}} {"text": "ENTAB ERP 1.0 - Username PII leak", "spans": {"SYSTEM: ENTAB ERP 1.0": [[0, 13]], "VULNERABILITY: Username PII leak": [[16, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51335"}} {"text": "EQ Enterprise management system v2.2.0 - SQL Injection", "spans": {"SYSTEM: EQ Enterprise management system v2.2.0": [[0, 38]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51154"}} {"text": "HelloWeb 2.0 - Arbitrary File Download", "spans": {"SYSTEM: HelloWeb 2.0": [[0, 12]], "VULNERABILITY: Arbitrary File Download": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48659"}} {"text": "InnovaStudio WYSIWYG Editor 5.4 - Unrestricted File Upload / Directory Traversal", "spans": {"SYSTEM: InnovaStudio WYSIWYG Editor 5.4": [[0, 31]], "VULNERABILITY: Directory Traversal": [[61, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51362"}} {"text": "OLK Web Store 2020 - Cross-Site Request Forgery", "spans": {"SYSTEM: OLK Web Store 2020": [[0, 18]], "VULNERABILITY: Cross-Site Request Forgery": [[21, 47]]}, "info": {"source": "exploitdb", "exploit_id": "47960"}} {"text": "Password Manager for IIS v2.0 - XSS", "spans": {"SYSTEM: Password Manager for IIS v2.0": [[0, 29]], "VULNERABILITY: XSS": [[32, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51055"}} {"text": "Snitz Forum v1.0 - Blind SQL Injection", "spans": {"SYSTEM: Snitz Forum v1.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51323"}} {"text": "wkhtmltopdf 0.12.6 - Server Side Request Forgery", "spans": {"SYSTEM: wkhtmltopdf 0.12.6": [[0, 18]], "VULNERABILITY: Server Side Request Forgery": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51039"}} {"text": "BlogEngine 3.3.8 - 'Content' Stored XSS", "spans": {"SYSTEM: BlogEngine 3.3.8": [[0, 16]], "VULNERABILITY: XSS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48999"}} {"text": "DotNetNuke 9.5 - File Upload Restrictions Bypass", "spans": {"SYSTEM: DotNetNuke 9.5": [[0, 14]], "VULNERABILITY: File Upload": [[17, 28]]}, "info": {"source": "exploitdb", "exploit_id": "48125"}} {"text": "DotNetNuke 9.5 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: DotNetNuke 9.5": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48124"}} {"text": "ELSI Smart Floor V3.3.3 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ELSI Smart Floor V3.3.3": [[0, 23]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51200"}} {"text": "H8 SSRMS - 'id' IDOR", "spans": {"SYSTEM: H8 SSRMS": [[0, 8]], "VULNERABILITY: IDOR": [[16, 20]]}, "info": {"source": "exploitdb", "exploit_id": "49508"}} {"text": "IntelliChoice eFORCE Software Suite 2.5.9 - Username Enumeration", "spans": {"SYSTEM: IntelliChoice eFORCE Software Suite 2.5.9": [[0, 41]], "VULNERABILITY: Username Enumeration": [[44, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50164"}} {"text": "Kartris 1.6 - Arbitrary File Upload", "spans": {"SYSTEM: Kartris 1.6": [[0, 11]], "VULNERABILITY: Arbitrary File Upload": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48445"}} {"text": "Microsoft SharePoint Server 2019 - Remote Code Execution", "spans": {"SYSTEM: Microsoft SharePoint Server 2019": [[0, 32]], "VULNERABILITY: Remote Code Execution": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48747"}} {"text": "Microsoft SharePoint Server 2019 - Remote Code Execution (2)", "spans": {"SYSTEM: Microsoft SharePoint Server 2019": [[0, 32]], "VULNERABILITY: Remote Code Execution": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50151"}} {"text": "Nyron 1.0 - SQLi (Unauthenticated)", "spans": {"SYSTEM: Nyron 1.0": [[0, 9]], "VULNERABILITY: SQLi": [[12, 16]]}, "info": {"source": "exploitdb", "exploit_id": "50674"}} {"text": "Orchard Core RC1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Orchard Core RC1": [[0, 16]], "VULNERABILITY: Persistent Cross-Site Scripting": [[19, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48456"}} {"text": "ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ReQlogic v11.3": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[17, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51118"}} {"text": "Sitecore - Remote Code Execution v8.2", "spans": {"SYSTEM: Sitecore": [[0, 8]], "VULNERABILITY: Remote Code Execution": [[11, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51876"}} {"text": "Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)", "spans": {"SYSTEM: Smart Office Web 20.28": [[0, 22]], "VULNERABILITY: Information Disclosure": [[32, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51539"}} {"text": "SmarterTools SmarterTrack 7922 - 'Multiple' Information Disclosure", "spans": {"SYSTEM: SmarterTools SmarterTrack 7922": [[0, 30]], "VULNERABILITY: Information Disclosure": [[44, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50328"}} {"text": "Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Umbraco CMS 7.12.4": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49488"}} {"text": "Umbraco CMS 8.9.1 - Directory Traversal", "spans": {"SYSTEM: Umbraco CMS 8.9.1": [[0, 17]], "VULNERABILITY: Directory Traversal": [[20, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50241"}} {"text": "Umbraco v8.14.1 - 'baseUrl' SSRF", "spans": {"SYSTEM: Umbraco v8.14.1": [[0, 15]], "VULNERABILITY: SSRF": [[28, 32]]}, "info": {"source": "exploitdb", "exploit_id": "50462"}} {"text": "Adobe ColdFusion 8 - Remote Command Execution (RCE)", "spans": {"SYSTEM: Adobe ColdFusion 8": [[0, 18]], "VULNERABILITY: Remote Command Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50057"}} {"text": "Aruba Instant (IAP) - Remote Code Execution", "spans": {"SYSTEM: Aruba Instant (IAP)": [[0, 19]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50136"}} {"text": "CHIYU BF430 TCP IP Converter - Stored Cross-Site Scripting", "spans": {"SYSTEM: CHIYU BF430 TCP IP Converter": [[0, 28]], "VULNERABILITY: Stored Cross-Site Scripting": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48040"}} {"text": "CHIYU IoT devices - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: CHIYU IoT devices": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49922"}} {"text": "CHIYU TCP/IP Converter devices - CRLF injection", "spans": {"SYSTEM: CHIYU TCP/IP Converter devices": [[0, 30]], "VULNERABILITY: CRLF injection": [[33, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49923"}} {"text": "Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection", "spans": {"SYSTEM: Gemtek WVRTM-127ACN 01.01.02.141": [[0, 32]], "VULNERABILITY: Command Injection": [[59, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49079"}} {"text": "IPCop 2.1.9 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: IPCop 2.1.9": [[0, 11]], "VULNERABILITY: Remote Code Execution (RCE)": [[14, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50183"}} {"text": "IPFire 2.25 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: IPFire 2.25": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49869"}} {"text": "LISTSERV 17 - Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: LISTSERV 17": [[0, 11]], "VULNERABILITY: Insecure Direct Object Reference": [[14, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51149"}} {"text": "LISTSERV 17 - Reflected Cross Site Scripting (XSS)", "spans": {"SYSTEM: LISTSERV 17": [[0, 11]], "VULNERABILITY: Cross Site Scripting": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51148"}} {"text": "Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Mailman 1.x > 2.1.23": [[0, 20]], "VULNERABILITY: Cross Site Scripting": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48970"}} {"text": "Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal and LFI", "spans": {"SYSTEM: Mitel MiCollab AWV 8.1.2.4 and 9.1.3": [[0, 36]], "VULNERABILITY: Directory Traversal": [[39, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51308"}} {"text": "Movable Type 7 r.5002 - XMLRPC API OS Command Injection (Metasploit)", "spans": {"SYSTEM: Movable Type 7 r.5002": [[0, 21]], "VULNERABILITY: Command Injection": [[39, 56]], "TOOL: Metasploit": [[58, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50464"}} {"text": "ZCBS/ZBBS/ZPBS v4.14k - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ZCBS/ZBBS/ZPBS v4.14k": [[0, 21]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[24, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51347"}} {"text": "Zen Load Balancer 3.10.1 - 'index.cgi' Directory Traversal", "spans": {"SYSTEM: Zen Load Balancer 3.10.1": [[0, 24]], "VULNERABILITY: Directory Traversal": [[39, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48308"}} {"text": "Zen Load Balancer 3.10.1 - Directory Traversal (Metasploit)", "spans": {"SYSTEM: Zen Load Balancer 3.10.1": [[0, 24]], "VULNERABILITY: Directory Traversal": [[27, 46]], "TOOL: Metasploit": [[48, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48373"}} {"text": "Zen Load Balancer 3.10.1 - Remote Code Execution", "spans": {"SYSTEM: Zen Load Balancer 3.10.1": [[0, 24]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48266"}} {"text": "pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting", "spans": {"SYSTEM: pfSense 2.4.4-P3": [[0, 16]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48300"}} {"text": "MinIO < 2024-01-31T20-20-33Z - Privilege Escalation", "spans": {"SYSTEM: MinIO < 2024-01-31T20-20-33Z": [[0, 28]], "VULNERABILITY: Privilege Escalation": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51976"}} {"text": "Answerdev 1.0.3 - Account Takeover", "spans": {"SYSTEM: Answerdev 1.0.3": [[0, 15]], "VULNERABILITY: Account Takeover": [[18, 34]]}, "info": {"source": "exploitdb", "exploit_id": "51257"}} {"text": "Casdoor 1.901.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Casdoor 1.901.0": [[0, 15]], "VULNERABILITY: CSRF": [[46, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52281"}} {"text": "Casdoor < v1.331.0 - '/api/set-password' CSRF", "spans": {"SYSTEM: Casdoor < v1.331.0": [[0, 18]], "VULNERABILITY: CSRF": [[41, 45]], "FILEPATH: /api/set-password": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51961"}} {"text": "Ladder v0.0.21 - Server-side request forgery (SSRF)", "spans": {"SYSTEM: Ladder v0.0.21": [[0, 14]], "VULNERABILITY: SSRF": [[46, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51869"}} {"text": "Minio 2022-07-29T19-40-48Z - Path traversal", "spans": {"SYSTEM: Minio 2022-07-29T19-40-48Z": [[0, 26]], "VULNERABILITY: Path traversal": [[29, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51734"}} {"text": "Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download", "spans": {"SYSTEM: Pydio Cells 4.1.2": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51497"}} {"text": "Pydio Cells 4.1.2 - Server-Side Request Forgery", "spans": {"SYSTEM: Pydio Cells 4.1.2": [[0, 17]], "VULNERABILITY: Server-Side Request Forgery": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51498"}} {"text": "Pydio Cells 4.1.2 - Unauthorised Role Assignments", "spans": {"SYSTEM: Pydio Cells 4.1.2": [[0, 17]], "VULNERABILITY: Unauthorised Role Assignments": [[20, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51496"}} {"text": "Amcrest Dahua NVR Camera IP2M-841 - Denial of Service (PoC)", "spans": {"SYSTEM: Amcrest Dahua NVR Camera IP2M-841": [[0, 33]], "VULNERABILITY: Denial of Service (PoC)": [[36, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48304"}} {"text": "Cisco IP Phone 11.7 - Denial of service (PoC)", "spans": {"SYSTEM: Cisco IP Phone 11.7": [[0, 19]], "VULNERABILITY: Denial of service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48342"}} {"text": "DD-WRT 45723 - UPNP Buffer Overflow (PoC)", "spans": {"SYSTEM: DD-WRT 45723": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[20, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49730"}} {"text": "DLink DIR 819 A1 - Denial of Service", "spans": {"SYSTEM: DLink DIR 819 A1": [[0, 16]], "VULNERABILITY: Denial of Service": [[19, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51053"}} {"text": "Electrolink FM/DAB/TV Transmitter - Unauthenticated Remote DoS", "spans": {"SYSTEM: Electrolink FM/DAB/TV Transmitter": [[0, 33]], "VULNERABILITY: Unauthenticated Remote DoS": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51774"}} {"text": "Extreme Networks Aerohive HiveOS 11.0 - Remote Denial of Service (PoC)", "spans": {"SYSTEM: Extreme Networks Aerohive HiveOS 11.0": [[0, 37]], "VULNERABILITY: Denial of Service (PoC)": [[47, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48441"}} {"text": "FortiRecorder 6.4.3 - Denial of Service", "spans": {"SYSTEM: FortiRecorder 6.4.3": [[0, 19]], "VULNERABILITY: Denial of Service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51326"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated)", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Device Reboot": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49685"}} {"text": "Microtik SSH Daemon 6.44.3 - Denial of Service (PoC)", "spans": {"SYSTEM: Microtik SSH Daemon 6.44.3": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48228"}} {"text": "Paradox Security Systems IPR512 - Denial Of Service", "spans": {"SYSTEM: Paradox Security Systems IPR512": [[0, 31]], "VULNERABILITY: Denial Of Service": [[34, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51356"}} {"text": "qubes-mirage-firewall v0.8.3 - Denial Of Service (DoS)", "spans": {"SYSTEM: qubes-mirage-firewall v0.8.3": [[0, 29]], "VULNERABILITY: Denial Of Service": [[32, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51157"}} {"text": "Router ZTE-H108NS - Stack Buffer Overflow (DoS)", "spans": {"SYSTEM: Router ZTE-H108NS": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[26, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51137"}} {"text": "RouterOS 6.40.5 - 6.44 and 6.48.1 - 6.49.10 - Denial of Service", "spans": {"SYSTEM: RouterOS 6.40.5 - 6.44 and 6.48.1 - 6.49.10": [[0, 43]], "VULNERABILITY: Denial of Service": [[46, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51931"}} {"text": "Siemens S7 Layer 2 - Denial of Service (DoS)", "spans": {"SYSTEM: Siemens S7 Layer 2": [[0, 18]], "VULNERABILITY: Denial of Service (DoS)": [[21, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50613"}} {"text": "SoX 14.4.2 - Denial Of Service", "spans": {"SYSTEM: SoX 14.4.2": [[0, 10]], "VULNERABILITY: Denial Of Service": [[13, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51034"}} {"text": "Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Denial Of Service", "spans": {"SYSTEM: Tinycontrol LAN Controller v3 (LK3) 1.58a": [[0, 41]], "VULNERABILITY: Remote Denial Of Service": [[44, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51730"}} {"text": "TP-Link Archer C50 3 - Denial of Service (PoC)", "spans": {"SYSTEM: TP-Link Archer C50 3": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[23, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48255"}} {"text": "TP-Link TL-WR940N V4 - Buffer OverFlow", "spans": {"SYSTEM: TP-Link TL-WR940N V4": [[0, 20]], "VULNERABILITY: Buffer OverFlow": [[23, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51561"}} {"text": "VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service", "spans": {"SYSTEM: VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot)": [[0, 52]], "VULNERABILITY: Remote Denial Of Service": [[55, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51793"}} {"text": "ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE)", "spans": {"SYSTEM: ASUS ASMB8 iKVM 1.14.51": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52244"}} {"text": "Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation", "spans": {"SYSTEM: Cyclades Serial Console Server 3.3.0": [[0, 36]], "VULNERABILITY: Local Privilege Escalation": [[39, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50773"}} {"text": "DS Wireless Communication - Remote Code Execution", "spans": {"SYSTEM: DS Wireless Communication": [[0, 25]], "VULNERABILITY: Remote Code Execution": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51798"}} {"text": "ECOA Building Automation System - Missing Encryption Of Sensitive Information", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Missing Encryption Of Sensitive Information": [[34, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50283"}} {"text": "FS-S3900-24T4S - Privilege Escalation", "spans": {"SYSTEM: FS-S3900-24T4S": [[0, 14]], "VULNERABILITY: Privilege Escalation": [[17, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51414"}} {"text": "Ruckus IoT Controller 1.7.1.0 - Undocumented Backdoor Account", "spans": {"SYSTEM: Ruckus IoT Controller 1.7.1.0": [[0, 29]], "VULNERABILITY: Undocumented Backdoor Account": [[32, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52242"}} {"text": "Saflok - Key Derication Function Exploit", "spans": {"SYSTEM: Saflok": [[0, 6]], "VULNERABILITY: Key Derication Function Exploit": [[9, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51832"}} {"text": "Sony Playstation 4 (PS4) < 7.02 / FreeBSD 9 / FreeBSD 12 - 'ip6_setpktopt' Kernel Local Privilege Escalation (PoC)", "spans": {"SYSTEM: Sony Playstation 4 (PS4) < 7.02 / FreeBSD 9 / FreeBSD 12": [[0, 56]], "VULNERABILITY: Local Privilege Escalation": [[82, 108]]}, "info": {"source": "exploitdb", "exploit_id": "48644"}} {"text": "ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access", "spans": {"SYSTEM: ABUS Security Camera TVIP 20000-21150": [[0, 37]], "VULNERABILITY: RCE": [[45, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51294"}} {"text": "Accu-Time Systems MAXIMUS 1.0 - Telnet Remote Buffer Overflow (DoS)", "spans": {"SYSTEM: Accu-Time Systems MAXIMUS 1.0": [[0, 29]], "VULNERABILITY: Remote Buffer Overflow": [[39, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50620"}} {"text": "Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root", "spans": {"SYSTEM: Adtec Digital Multiple Products": [[0, 31]], "VULNERABILITY: Default Hardcoded Credentials Remote Root": [[34, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48954"}} {"text": "Algo 8028 Control Panel - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Algo 8028 Control Panel": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50960"}} {"text": "Anevia Flamingo XL 3.2.9 - Remote Root Jailbreak", "spans": {"SYSTEM: Anevia Flamingo XL 3.2.9": [[0, 24]], "VULNERABILITY: Remote Root Jailbreak": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51516"}} {"text": "Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution", "spans": {"SYSTEM: Anevia Flamingo XL 3.6.20": [[0, 25]], "VULNERABILITY: Remote Code Execution": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51515"}} {"text": "Anevia Flamingo XS 3.6.5 - Authenticated Root Remote Code Execution", "spans": {"SYSTEM: Anevia Flamingo XS 3.6.5": [[0, 24]], "VULNERABILITY: Remote Code Execution": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51514"}} {"text": "Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Arris Router Firmware 9.1.103": [[0, 29]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51269"}} {"text": "Aruba Instant 8.7.1.0 - Arbitrary File Modification", "spans": {"SYSTEM: Aruba Instant 8.7.1.0": [[0, 21]], "VULNERABILITY: Arbitrary File Modification": [[24, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50133"}} {"text": "ASKEY RTF3505VW-N1 - Privilege Escalation", "spans": {"SYSTEM: ASKEY RTF3505VW-N1": [[0, 18]], "VULNERABILITY: Privilege Escalation": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51155"}} {"text": "Atcom 2.7.x.x - Authenticated Command Injection", "spans": {"SYSTEM: Atcom 2.7.x.x": [[0, 13]], "VULNERABILITY: Command Injection": [[30, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51742"}} {"text": "Auerswald COMfortel 2.8F - Authentication Bypass", "spans": {"SYSTEM: Auerswald COMfortel 2.8F": [[0, 24]], "VULNERABILITY: Authentication Bypass": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50565"}} {"text": "Auerswald COMpact 8.0B - Arbitrary File Disclosure", "spans": {"SYSTEM: Auerswald COMpact 8.0B": [[0, 22]], "VULNERABILITY: Arbitrary File Disclosure": [[25, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50568"}} {"text": "Auerswald COMpact 8.0B - Multiple Backdoors", "spans": {"SYSTEM: Auerswald COMpact 8.0B": [[0, 22]], "VULNERABILITY: Multiple Backdoors": [[25, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50569"}} {"text": "Auerswald COMpact 8.0B - Privilege Escalation", "spans": {"SYSTEM: Auerswald COMpact 8.0B": [[0, 22]], "VULNERABILITY: Privilege Escalation": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50567"}} {"text": "AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal", "spans": {"SYSTEM: AVEVA InTouch Access Anywhere Secure Gateway 2020 R2": [[0, 52]], "VULNERABILITY: Path Traversal": [[55, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51028"}} {"text": "Aztech DSL5005EN Router - 'sysAccess.asp' Admin Password Change (Unauthenticated)", "spans": {"SYSTEM: Aztech DSL5005EN Router": [[0, 23]], "VULNERABILITY: Admin Password Change": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52093"}} {"text": "CHIYU IoT Devices - 'Telnet' Authentication Bypass", "spans": {"SYSTEM: CHIYU IoT Devices": [[0, 17]], "VULNERABILITY: Authentication Bypass": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49936"}} {"text": "Cisco 7937G - DoS/Privilege Escalation", "spans": {"SYSTEM: Cisco 7937G": [[0, 11]], "VULNERABILITY: Privilege Escalation": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49057"}} {"text": "Cisco small business RV130W 1.0.3.44 - Inject Counterfeit Routers", "spans": {"SYSTEM: Cisco small business RV130W 1.0.3.44": [[0, 36]], "VULNERABILITY: Inject Counterfeit Routers": [[39, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50335"}} {"text": "Cypress Solutions CTM-200 2.7.1 - Root Remote OS Command Injection", "spans": {"SYSTEM: Cypress Solutions CTM-200 2.7.1": [[0, 31]], "VULNERABILITY: Command Injection": [[49, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50408"}} {"text": "Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH)", "spans": {"SYSTEM: Cypress Solutions CTM-200/CTM-ONE": [[0, 33]], "VULNERABILITY: Hard-coded Credentials Remote Root": [[36, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50407"}} {"text": "D-Link DIR-846 - Remote Command Execution (RCE) vulnerability", "spans": {"SYSTEM: D-Link DIR-846": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51243"}} {"text": "D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution", "spans": {"SYSTEM: D-Link DNR-322L <=2.60B15": [[0, 25]], "VULNERABILITY: Authenticated Remote Code Execution": [[28, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51046"}} {"text": "Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Dell EMC iDRAC7/iDRAC8 2.52.52.52": [[0, 33]], "VULNERABILITY: Remote Code Execution (RCE)": [[37, 64]]}, "info": {"source": "exploitdb", "exploit_id": "52246"}} {"text": "Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure", "spans": {"SYSTEM: Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB": [[0, 73]], "VULNERABILITY: Information Disclosure": [[76, 98]]}, "info": {"source": "exploitdb", "exploit_id": "51248"}} {"text": "Delta Controls enteliTOUCH 3.40.3935 - Cookie User Password Disclosure", "spans": {"SYSTEM: Delta Controls enteliTOUCH 3.40.3935": [[0, 36]], "VULNERABILITY: Password Disclosure": [[51, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50880"}} {"text": "Delta Controls enteliTOUCH 3.40.3935 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Delta Controls enteliTOUCH 3.40.3935": [[0, 36]], "VULNERABILITY: CSRF": [[67, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50878"}} {"text": "Delta Controls enteliTOUCH 3.40.3935 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Delta Controls enteliTOUCH 3.40.3935": [[0, 36]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[39, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50879"}} {"text": "Denver Smart Wifi Camera SHC-150 - 'Telnet' Remote Code Execution (RCE)", "spans": {"SYSTEM: Denver Smart Wifi Camera SHC-150": [[0, 32]], "VULNERABILITY: Remote Code Execution (RCE)": [[44, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50160"}} {"text": "Dixell XWEB 500 - Arbitrary File Write", "spans": {"SYSTEM: Dixell XWEB 500": [[0, 15]], "VULNERABILITY: Arbitrary File Write": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50639"}} {"text": "DLINK DAP-1620 A1 v1.01 - Directory Traversal", "spans": {"SYSTEM: DLINK DAP-1620 A1 v1.01": [[0, 23]], "VULNERABILITY: Directory Traversal": [[26, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50919"}} {"text": "DLINK DIR850 - Insecure Access Control", "spans": {"SYSTEM: DLINK DIR850": [[0, 12]], "VULNERABILITY: Insecure Access Control": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50906"}} {"text": "DLINK DIR850 - Open Redirect", "spans": {"SYSTEM: DLINK DIR850": [[0, 12]], "VULNERABILITY: Open Redirect": [[15, 28]]}, "info": {"source": "exploitdb", "exploit_id": "50907"}} {"text": "Dlink DSL2750U - 'Reboot' Command Injection", "spans": {"SYSTEM: Dlink DSL2750U": [[0, 14]], "VULNERABILITY: Command Injection": [[26, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50034"}} {"text": "DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)", "spans": {"SYSTEM: DLINK DWL-2600": [[0, 14]], "VULNERABILITY: Command Injection": [[38, 55]], "TOOL: Metasploit": [[57, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48274"}} {"text": "Drobo 5N2 4.1.1 - Remote Command Injection", "spans": {"SYSTEM: Drobo 5N2 4.1.1": [[0, 15]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48214"}} {"text": "DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure", "spans": {"SYSTEM: DSL-124 Wireless N300 ADSL2+": [[0, 28]], "VULNERABILITY: Backup File Disclosure": [[31, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51129"}} {"text": "EasyNas 1.1.0 - OS Command Injection", "spans": {"SYSTEM: EasyNas 1.1.0": [[0, 13]], "VULNERABILITY: Command Injection": [[19, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51266"}} {"text": "EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow", "spans": {"SYSTEM: EBBISLAND EBBSHAVE 6100-09-04-1441": [[0, 34]], "VULNERABILITY: Remote Buffer Overflow": [[37, 59]]}, "info": {"source": "exploitdb", "exploit_id": "47888"}} {"text": "ECOA Building Automation System - Hard-coded Credentials SSH Access", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Hard-coded Credentials SSH Access": [[34, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50282"}} {"text": "Epson Stylus SX510W Printer Remote Power Off - Denial of Service", "spans": {"SYSTEM: Epson Stylus SX510W Printer Remote Power Off": [[0, 44]], "VULNERABILITY: Denial of Service": [[47, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51441"}} {"text": "EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR)", "spans": {"SYSTEM: EuroTel ETL3100": [[0, 15]], "VULNERABILITY: Authorization Bypass": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51685"}} {"text": "EuroTel ETL3100 - Transmitter Default Credentials", "spans": {"SYSTEM: EuroTel ETL3100": [[0, 15]], "VULNERABILITY: Transmitter Default Credentials": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51684"}} {"text": "EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download", "spans": {"SYSTEM: EuroTel ETL3100": [[0, 15]], "VULNERABILITY: Transmitter Unauthenticated Config/Log Download": [[18, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51686"}} {"text": "Franklin Fueling Systems TS-550 - Exploit and Default Password", "spans": {"SYSTEM: Franklin Fueling Systems TS-550": [[0, 32]], "VULNERABILITY: Exploit and Default Password": [[35, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51321"}} {"text": "Franklin Fueling Systems TS-550 - Default Password", "spans": {"SYSTEM: Franklin Fueling Systems TS-550": [[0, 31]], "VULNERABILITY: Default Password": [[34, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51382"}} {"text": "FRITZ!Box 7.20 - DNS Rebinding Protection Bypass", "spans": {"SYSTEM: FRITZ!Box 7.20": [[0, 14]], "VULNERABILITY: DNS Rebinding Protection Bypass": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49293"}} {"text": "Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure", "spans": {"SYSTEM: Genexis Platinum 4410 Router 2.1": [[0, 32]], "VULNERABILITY: UPnP Credential Exposure": [[35, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49075"}} {"text": "GL-iNet MT6000 4.5.5 - Arbitrary File Download", "spans": {"SYSTEM: GL-iNet MT6000 4.5.5": [[0, 20]], "VULNERABILITY: Arbitrary File Download": [[23, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51942"}} {"text": "GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit", "spans": {"SYSTEM: GL.iNet AR300M v3.216 Remote Code Execution": [[0, 43]], "VULNERABILITY: CVE-2023-46456 Exploit": [[46, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51854"}} {"text": "GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit", "spans": {"SYSTEM: GL.iNet AR300M v4.3.7 Arbitrary File Read": [[0, 41]], "VULNERABILITY: CVE-2023-46455 Exploit": [[44, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51851"}} {"text": "GL.iNet AR300M v4.3.7 Remote Code Execution - CVE-2023-46454 Exploit", "spans": {"SYSTEM: GL.iNet AR300M v4.3.7 Remote Code Execution": [[0, 43]], "VULNERABILITY: CVE-2023-46454 Exploit": [[46, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51852"}} {"text": "GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse", "spans": {"SYSTEM: GoAhead Web Server 5.1.1": [[0, 24]], "VULNERABILITY: Digest Authentication Capture Replay Nonce Reuse": [[27, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48958"}} {"text": "H3C SSL VPN - Username Enumeration", "spans": {"SYSTEM: H3C SSL VPN": [[0, 11]], "VULNERABILITY: Username Enumeration": [[14, 34]]}, "info": {"source": "exploitdb", "exploit_id": "50742"}} {"text": "Hikvision Hybrid SAN Ds-a71024 Firmware - Multiple Remote Code Execution", "spans": {"SYSTEM: Hikvision Hybrid SAN Ds-a71024 Firmware": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51607"}} {"text": "HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account", "spans": {"SYSTEM: HiSilicon DVR/NVR hi3520d firmware": [[0, 34]], "VULNERABILITY: Remote Backdoor Account": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48004"}} {"text": "HNAS SMU 14.8.7825 - Information Disclosure", "spans": {"SYSTEM: HNAS SMU 14.8.7825": [[0, 18]], "VULNERABILITY: Information Disclosure": [[21, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51915"}} {"text": "Honeywell PM43 < P10.19.050004 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Honeywell PM43 < P10.19.050004": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51885"}} {"text": "Hughes Satellite Router HX200 v8.3.1.14 - Remote File Inclusion", "spans": {"SYSTEM: Hughes Satellite Router HX200 v8.3.1.14": [[0, 39]], "VULNERABILITY: Remote File Inclusion": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51190"}} {"text": "ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD", "spans": {"SYSTEM: ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07": [[0, 52]], "VULNERABILITY: Remote File CRUD": [[55, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50783"}} {"text": "ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure", "spans": {"SYSTEM: ICT Protege GX/WX 2.08": [[0, 22]], "VULNERABILITY: Client-Side SHA1 Password Hash Disclosure": [[25, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50836"}} {"text": "ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ICT Protege GX/WX 2.08": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[25, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50835"}} {"text": "Ilevia EVE X1/X5 Server 4.7.18.0.eden - Reverse Rootshell", "spans": {"SYSTEM: Ilevia EVE X1/X5 Server 4.7.18.0.eden": [[0, 37]], "VULNERABILITY: Reverse Rootshell": [[40, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52437"}} {"text": "iRZ Mobile Router - CSRF to RCE", "spans": {"SYSTEM: iRZ Mobile Router": [[0, 17]], "VULNERABILITY: CSRF": [[20, 24]]}, "info": {"source": "exploitdb", "exploit_id": "50832"}} {"text": "KevinLAB BEMS 1.0 - Undocumented Backdoor Account", "spans": {"SYSTEM: KevinLAB BEMS 1.0": [[0, 17]], "VULNERABILITY: Undocumented Backdoor Account": [[20, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50145"}} {"text": "Kramer VIAware - Remote Code Execution (RCE) (Root)", "spans": {"SYSTEM: Kramer VIAware": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50856"}} {"text": "Kramer VIAware 2.5.0719.1034 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Kramer VIAware 2.5.0719.1034": [[0, 28]], "VULNERABILITY: Remote Code Execution (RCE)": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50848"}} {"text": "KZTech T3500V 4G LTE CPE 2.0.1 - Weak Default WiFi Password Algorithm", "spans": {"SYSTEM: KZTech T3500V 4G LTE CPE 2.0.1": [[0, 30]], "VULNERABILITY: Weak Default WiFi Password Algorithm": [[33, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49695"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Hard coded Credentials Shell Access": [[50, 85]]}, "info": {"source": "exploitdb", "exploit_id": "49682"}} {"text": "Maxima Max Pro Power - BLE Traffic Replay (Unauthenticated)", "spans": {"SYSTEM: Maxima Max Pro Power": [[0, 20]], "VULNERABILITY: BLE Traffic Replay": [[23, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51850"}} {"text": "Microchip TimeProvider 4100 (Configuration modules) 2.4.6 - OS Command Injection", "spans": {"SYSTEM: Microchip TimeProvider 4100 (Configuration modules) 2.4.6": [[0, 57]], "VULNERABILITY: Command Injection": [[63, 80]]}, "info": {"source": "exploitdb", "exploit_id": "52119"}} {"text": "Microchip TimeProvider 4100 Grandmaster (Banner Config Modules) 2.4.6 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Microchip TimeProvider 4100 Grandmaster (Banner Config Modules) 2.4.6": [[0, 69]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[72, 105]]}, "info": {"source": "exploitdb", "exploit_id": "52120"}} {"text": "Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection", "spans": {"SYSTEM: Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6": [[0, 65]], "VULNERABILITY: SQL Injection": [[68, 81]]}, "info": {"source": "exploitdb", "exploit_id": "52122"}} {"text": "Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption", "spans": {"SYSTEM: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41": [[0, 47]], "VULNERABILITY: Credential Leakage Through Unprotected System Logs and Weak Password Encryption": [[50, 129]]}, "info": {"source": "exploitdb", "exploit_id": "51784"}} {"text": "MiniDVBLinux 5.4 - Change Root Password", "spans": {"SYSTEM: MiniDVBLinux 5.4": [[0, 16]], "VULNERABILITY: Change Root Password": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51094"}} {"text": "MiniDVBLinux 5.4 - Remote Root Command Injection", "spans": {"SYSTEM: MiniDVBLinux 5.4": [[0, 16]], "VULNERABILITY: Command Injection": [[32, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51096"}} {"text": "MiniDVBLinux 5.4 - Arbitrary File Read", "spans": {"SYSTEM: MiniDVBLinux 5.4": [[0, 16]], "VULNERABILITY: Arbitrary File Read": [[19, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51097"}} {"text": "MiniDVBLinux 5.4 - Unauthenticated Stream Disclosure", "spans": {"SYSTEM: MiniDVBLinux 5.4": [[0, 16]], "VULNERABILITY: Unauthenticated Stream Disclosure": [[19, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51095"}} {"text": "MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP - Remote Code Execution (RCE)", "spans": {"SYSTEM: MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP": [[0, 56]], "VULNERABILITY: Remote Code Execution (RCE)": [[59, 86]]}, "info": {"source": "exploitdb", "exploit_id": "51093"}} {"text": "MiniDVBLinux <=5.4 - Config Download Exploit", "spans": {"SYSTEM: MiniDVBLinux <=5.4": [[0, 18]], "VULNERABILITY: Config Download Exploit": [[22, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51091"}} {"text": "Mitrastar GPT-2541GNAC-N1 - Privilege escalation", "spans": {"SYSTEM: Mitrastar GPT-2541GNAC-N1": [[0, 25]], "VULNERABILITY: Privilege escalation": [[28, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50351"}} {"text": "MSNSwitch Firmware MNT.2408 - Remote Code Execution", "spans": {"SYSTEM: MSNSwitch Firmware MNT.2408": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51027"}} {"text": "mySCADA myPRO 7 - Hardcoded Credentials", "spans": {"SYSTEM: mySCADA myPRO 7": [[0, 15]], "VULNERABILITY: Hardcoded Credentials": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48620"}} {"text": "Nexxt Router Firmware 42.103.1.5095 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Nexxt Router Firmware 42.103.1.5095": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51195"}} {"text": "Nokia ASIKA 7.13.52 - Hard-coded private key disclosure", "spans": {"SYSTEM: Nokia ASIKA 7.13.52": [[0, 19]], "VULNERABILITY: Hard-coded private key disclosure": [[22, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51535"}} {"text": "Omnia MPX 1.5.0+r1 - Path Traversal", "spans": {"SYSTEM: Omnia MPX 1.5.0+r1": [[0, 18]], "VULNERABILITY: Path Traversal": [[21, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50996"}} {"text": "Optoma 1080PSTX Firmware C02 - Authentication Bypass", "spans": {"SYSTEM: Optoma 1080PSTX Firmware C02": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51444"}} {"text": "Osprey Pump Controller 1.0.1 - (eventFileSelected) Command Injection", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Command Injection": [[51, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51306"}} {"text": "Osprey Pump Controller 1.0.1 - (pseudonym) Semi-blind Command Injection", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Command Injection": [[54, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51300"}} {"text": "Osprey Pump Controller 1.0.1 - (userName) Blind Command Injection", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Command Injection": [[48, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51301"}} {"text": "Osprey Pump Controller 1.0.1 - Administrator Backdoor Access", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Administrator Backdoor Access": [[31, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51299"}} {"text": "Osprey Pump Controller 1.0.1 - Authentication Bypass Credentials Modification", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51303"}} {"text": "Osprey Pump Controller 1.0.1 - Cross-Site Request Forgery", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Cross-Site Request Forgery": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51304"}} {"text": "Osprey Pump Controller 1.0.1 - Predictable Session Token / Session Hijack", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Predictable Session Token / Session Hijack": [[31, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51297"}} {"text": "Osprey Pump Controller 1.0.1 - Unauthenticated File Disclosure", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Unauthenticated File Disclosure": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51298"}} {"text": "Osprey Pump Controller 1.0.1 - Unauthenticated Remote Code Execution Exploit", "spans": {"SYSTEM: Osprey Pump Controller 1.0.1": [[0, 28]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[31, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51305"}} {"text": "Osprey Pump Controller v1.0.1 - Unauthenticated Reflected XSS", "spans": {"SYSTEM: Osprey Pump Controller v1.0.1": [[0, 29]], "VULNERABILITY: XSS": [[58, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51302"}} {"text": "pfsenseCE v2.6.0 - Anti-brute force protection bypass", "spans": {"SYSTEM: pfsenseCE v2.6.0": [[0, 16]], "VULNERABILITY: Anti-brute force protection bypass": [[19, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51352"}} {"text": "Positron Broadcast Signal Processor TRA7005 v1.20 - Authentication Bypass", "spans": {"SYSTEM: Positron Broadcast Signal Processor TRA7005 v1.20": [[0, 49]], "VULNERABILITY: Authentication Bypass": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51970"}} {"text": "ProLink PRS1841 PLDT Home fiber - Default Password", "spans": {"SYSTEM: ProLink PRS1841 PLDT Home fiber": [[0, 31]], "VULNERABILITY: Default Password": [[34, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51158"}} {"text": "R Radio Network FM Transmitter 1.07 system.cgi - Password Disclosure", "spans": {"SYSTEM: R Radio Network FM Transmitter 1.07 system.cgi": [[0, 46]], "VULNERABILITY: Password Disclosure": [[49, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51855"}} {"text": "ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE)", "spans": {"SYSTEM: ReyeeOS 1.204.1614": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51642"}} {"text": "Ricoh Printer - Directory and File Exposure", "spans": {"SYSTEM: Ricoh Printer": [[0, 13]], "VULNERABILITY: Directory and File Exposure": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51755"}} {"text": "Router ZTE-H108NS - Authentication Bypass", "spans": {"SYSTEM: Router ZTE-H108NS": [[0, 17]], "VULNERABILITY: Authentication Bypass": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51138"}} {"text": "Ruijie Reyee Mesh Router - MITM Remote Code Execution (RCE)", "spans": {"SYSTEM: Ruijie Reyee Mesh Router": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51727"}} {"text": "Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Ruijie Reyee Mesh Router": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[27, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50930"}} {"text": "Ruijie Switch PSG-5124 26293 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Ruijie Switch PSG-5124 26293": [[0, 28]], "VULNERABILITY: Remote Code Execution (RCE)": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51888"}} {"text": "Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution", "spans": {"SYSTEM: Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem": [[0, 44]], "VULNERABILITY: Remote Code Execution": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "47936"}} {"text": "Schneider Electric C-Bus Automation Controller (5500SHAC) 1.10 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Schneider Electric C-Bus Automation Controller (5500SHAC) 1.10": [[0, 62]], "VULNERABILITY: Remote Code Execution (RCE)": [[65, 92]]}, "info": {"source": "exploitdb", "exploit_id": "50949"}} {"text": "Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) - Remote Code Execution", "spans": {"SYSTEM: Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2)": [[0, 62]], "VULNERABILITY: Remote Code Execution": [[65, 86]]}, "info": {"source": "exploitdb", "exploit_id": "50987"}} {"text": "Schneider Electric v1.0 - Directory traversal & Broken Authentication", "spans": {"SYSTEM: Schneider Electric v1.0": [[0, 23]], "VULNERABILITY: Directory traversal & Broken Authentication": [[26, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51320"}} {"text": "Screen SFT DAB 600/C - Authentication Bypass Account Creation", "spans": {"SYSTEM: Screen SFT DAB 600/C": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51455"}} {"text": "Screen SFT DAB 600/C - Authentication Bypass Admin Password Change", "spans": {"SYSTEM: Screen SFT DAB 600/C": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51458"}} {"text": "Screen SFT DAB 600/C - Authentication Bypass Erase Account", "spans": {"SYSTEM: Screen SFT DAB 600/C": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51457"}} {"text": "Screen SFT DAB 600/C - Authentication Bypass Password Change", "spans": {"SYSTEM: Screen SFT DAB 600/C": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51456"}} {"text": "Screen SFT DAB 600/C - Authentication Bypass Reset Board Config", "spans": {"SYSTEM: Screen SFT DAB 600/C": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51459"}} {"text": "Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx)", "spans": {"SYSTEM: Screen SFT DAB 600/C": [[0, 20]], "VULNERABILITY: Information Disclosure": [[39, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51460"}} {"text": "SDT-CW3B1 1.1.0 - OS Command Injection", "spans": {"SYSTEM: SDT-CW3B1 1.1.0": [[0, 15]], "VULNERABILITY: Command Injection": [[21, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50936"}} {"text": "Seagate Central Storage 2015.0916 - Unauthenticated Remote Command Execution (Metasploit)", "spans": {"SYSTEM: Seagate Central Storage 2015.0916": [[0, 33]], "VULNERABILITY: Remote Command Execution": [[52, 76]], "TOOL: Metasploit": [[78, 88]]}, "info": {"source": "exploitdb", "exploit_id": "51487"}} {"text": "Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Seowon SLR-120 Router": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50821"}} {"text": "Shelly PRO 4PM v0.11.0 - Authentication Bypass", "spans": {"SYSTEM: Shelly PRO 4PM v0.11.0": [[0, 22]], "VULNERABILITY: Authentication Bypass": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51657"}} {"text": "Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation", "spans": {"SYSTEM: Sielco Analog FM Transmitter 2.12": [[0, 33]], "VULNERABILITY: Privilege Escalation": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51366"}} {"text": "Siklu MultiHaul TG series < 2.0.0 - unauthenticated credential disclosure", "spans": {"SYSTEM: Siklu MultiHaul TG series < 2.0.0": [[0, 33]], "VULNERABILITY: unauthenticated credential disclosure": [[36, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51932"}} {"text": "SmartRG Router SR510n 2.6.13 - Remote Code Execution", "spans": {"SYSTEM: SmartRG Router SR510n 2.6.13": [[0, 28]], "VULNERABILITY: Remote Code Execution": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51031"}} {"text": "SolarView Compact 6.0 - OS Command Injection", "spans": {"SYSTEM: SolarView Compact 6.0": [[0, 21]], "VULNERABILITY: Command Injection": [[27, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50940"}} {"text": "SolarView Compact 6.00 - Command Injection", "spans": {"SYSTEM: SolarView Compact 6.00": [[0, 22]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51886"}} {"text": "SolarView Compact 6.00 - Directory Traversal", "spans": {"SYSTEM: SolarView Compact 6.00": [[0, 22]], "VULNERABILITY: Directory Traversal": [[25, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50950"}} {"text": "Sony IPELA Network Camera 1.82.01 - 'ftpclient.cgi' Remote Stack Buffer Overflow", "spans": {"SYSTEM: Sony IPELA Network Camera 1.82.01": [[0, 33]], "VULNERABILITY: Buffer Overflow": [[65, 80]]}, "info": {"source": "exploitdb", "exploit_id": "48842"}} {"text": "SOUND4 LinkAndShare Transmitter 1.1.2 - Format String Stack Buffer Overflow", "spans": {"SYSTEM: SOUND4 LinkAndShare Transmitter 1.1.2": [[0, 37]], "VULNERABILITY: Buffer Overflow": [[60, 75]]}, "info": {"source": "exploitdb", "exploit_id": "51259"}} {"text": "Synology DiskStation Manager - smart.cgi Remote Command Execution (Metasploit)", "spans": {"SYSTEM: Synology DiskStation Manager": [[0, 28]], "VULNERABILITY: Remote Command Execution": [[41, 65]], "TOOL: Metasploit": [[67, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48514"}} {"text": "Tapo C310 RTSP server v1.3.0 - Unauthorised Video Stream Access", "spans": {"SYSTEM: Tapo C310 RTSP server v1.3.0": [[0, 28]], "VULNERABILITY: Unauthorised Video Stream Access": [[31, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51107"}} {"text": "Techview LA-5570 Wireless Gateway Home Automation Controller - Multiple Vulnerabilities", "spans": {"SYSTEM: Techview LA-5570 Wireless Gateway Home Automation Controller": [[0, 60]], "VULNERABILITY: Multiple Vulnerabilities": [[63, 87]]}, "info": {"source": "exploitdb", "exploit_id": "51720"}} {"text": "Telesquare SDT-CW3B1 1.1.0 - OS Command Injection", "spans": {"SYSTEM: Telesquare SDT-CW3B1 1.1.0": [[0, 26]], "VULNERABILITY: Command Injection": [[32, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50948"}} {"text": "TELSAT marKoni FM Transmitter 1.9.5 - Backdoor Account Information Disclosure", "spans": {"SYSTEM: TELSAT marKoni FM Transmitter 1.9.5": [[0, 35]], "VULNERABILITY: Information Disclosure": [[55, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51907"}} {"text": "TELSAT marKoni FM Transmitter 1.9.5 - Insecure Access Control Change Password", "spans": {"SYSTEM: TELSAT marKoni FM Transmitter 1.9.5": [[0, 35]], "VULNERABILITY: Insecure Access Control Change Password": [[38, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51908"}} {"text": "TELSAT marKoni FM Transmitter 1.9.5 - Root Command Injection", "spans": {"SYSTEM: TELSAT marKoni FM Transmitter 1.9.5": [[0, 35]], "VULNERABILITY: Command Injection": [[43, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51906"}} {"text": "TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution", "spans": {"SYSTEM: TEM Opera Plus FM Family Transmitter 35.45": [[0, 42]], "VULNERABILITY: Remote Code Execution": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51827"}} {"text": "TEM Opera Plus FM Family Transmitter 35.45 - XSRF", "spans": {"SYSTEM: TEM Opera Plus FM Family Transmitter 35.45": [[0, 42]], "VULNERABILITY: XSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51828"}} {"text": "Tenda D151 & D301 - Configuration Download (Unauthenticated)", "spans": {"SYSTEM: Tenda D151 & D301": [[0, 17]], "VULNERABILITY: Configuration Download": [[20, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49782"}} {"text": "Tenda HG6 v3.3.0 - Remote Command Injection", "spans": {"SYSTEM: Tenda HG6 v3.3.0": [[0, 16]], "VULNERABILITY: Command Injection": [[26, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50916"}} {"text": "Tenda N300 F3 12.01.01.48 - Malformed HTTP Request Header Processing", "spans": {"SYSTEM: Tenda N300 F3 12.01.01.48": [[0, 25]], "VULNERABILITY: Malformed HTTP Request Header Processing": [[28, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51317"}} {"text": "Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Admin Password Change", "spans": {"SYSTEM: Tinycontrol LAN Controller v3 (LK3) 1.58a": [[0, 41]], "VULNERABILITY: Remote Admin Password Change": [[44, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51732"}} {"text": "Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Credentials Extraction", "spans": {"SYSTEM: Tinycontrol LAN Controller v3 (LK3) 1.58a": [[0, 41]], "VULNERABILITY: Remote Credentials Extraction": [[44, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51731"}} {"text": "TitanNit Web Control 2.01 / Atemio 7600 - Root Remote Code Execution", "spans": {"SYSTEM: TitanNit Web Control 2.01 / Atemio 7600": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51853"}} {"text": "TP-Link Archer AX21 - Unauthenticated Command Injection", "spans": {"SYSTEM: TP-Link Archer AX21": [[0, 19]], "VULNERABILITY: Command Injection": [[38, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51677"}} {"text": "TP-Link Router AX50 firmware 210730 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: TP-Link Router AX50 firmware 210730": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50962"}} {"text": "TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: TP-Link TL-WR902AC firmware 210730 (V3)": [[0, 39]], "VULNERABILITY: Remote Code Execution (RCE)": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51192"}} {"text": "TP-Link WDR4300 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: TP-Link WDR4300": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48994"}} {"text": "TPC-110W - Missing Authentication for Critical Function", "spans": {"SYSTEM: TPC-110W": [[0, 8]], "VULNERABILITY: Missing Authentication for Critical Function": [[11, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51846"}} {"text": "USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 - Remote Root Backdoor", "spans": {"SYSTEM: USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36": [[0, 52]], "VULNERABILITY: Remote Root Backdoor": [[55, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50894"}} {"text": "Verizon 4G LTE Network Extender - Weak Credentials Algorithm", "spans": {"SYSTEM: Verizon 4G LTE Network Extender": [[0, 31]], "VULNERABILITY: Weak Credentials Algorithm": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50875"}} {"text": "Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Viessmann Vitogate 300 2.1.3.0": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51887"}} {"text": "WAGO 750-8212 PFC200 G2 2ETH RS - Privilege Escalation", "spans": {"SYSTEM: WAGO 750-8212 PFC200 G2 2ETH RS": [[0, 31]], "VULNERABILITY: Privilege Escalation": [[34, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50793"}} {"text": "WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4) - Authenticated RCE", "spans": {"SYSTEM: WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4)": [[0, 45]], "VULNERABILITY: RCE": [[62, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51311"}} {"text": "Zyxel NWA-1100-NH - Command Injection", "spans": {"SYSTEM: Zyxel NWA-1100-NH": [[0, 17]], "VULNERABILITY: Command Injection": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50870"}} {"text": "Zyxel USG FLEX 5.21 - OS Command Injection", "spans": {"SYSTEM: Zyxel USG FLEX 5.21": [[0, 19]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50946"}} {"text": "Zyxel zysh - Format string", "spans": {"SYSTEM: Zyxel zysh": [[0, 10]], "VULNERABILITY: Format string": [[13, 26]]}, "info": {"source": "exploitdb", "exploit_id": "51786"}} {"text": "ABB FlowX v4.00 - Exposure of Sensitive Information", "spans": {"SYSTEM: ABB FlowX v4.00": [[0, 15]], "VULNERABILITY: Exposure of Sensitive Information": [[18, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51603"}} {"text": "Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Adtran Personal Phone Manager 10.8.1": [[0, 36]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[54, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49785"}} {"text": "Adtran Personal Phone Manager 10.8.1 - 'Multiple' Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Adtran Personal Phone Manager 10.8.1": [[0, 36]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[50, 86]]}, "info": {"source": "exploitdb", "exploit_id": "49786"}} {"text": "Adtran Personal Phone Manager 10.8.1 - DNS Exfiltration", "spans": {"SYSTEM: Adtran Personal Phone Manager 10.8.1": [[0, 36]], "VULNERABILITY: DNS Exfiltration": [[39, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49787"}} {"text": "AirControl 1.4.2 - PreAuth Remote Code Execution", "spans": {"SYSTEM: AirControl 1.4.2": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48541"}} {"text": "AKCP sensorProbe SPX476 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: AKCP sensorProbe SPX476": [[0, 23]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[37, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50080"}} {"text": "All-Dynamics Digital Signage System 2.0.2 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: All-Dynamics Digital Signage System 2.0.2": [[0, 41]], "VULNERABILITY: Cross-Site Request Forgery": [[44, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48736"}} {"text": "Altenergy Power Control Software C1.2.5 - OS command injection", "spans": {"SYSTEM: Altenergy Power Control Software C1.2.5": [[0, 39]], "VULNERABILITY: OS command injection": [[42, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51325"}} {"text": "Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure", "spans": {"SYSTEM: Aptina AR0130 960P 1.3MP Camera": [[0, 31]], "VULNERABILITY: Remote Configuration Disclosure": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48127"}} {"text": "Aquatronica Control System 5.1.6 - Information Disclosure", "spans": {"SYSTEM: Aquatronica Control System 5.1.6": [[0, 32]], "VULNERABILITY: Information Disclosure": [[35, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52028"}} {"text": "Artica Proxy 4.3.0 - Authentication Bypass", "spans": {"SYSTEM: Artica Proxy 4.3.0": [[0, 18]], "VULNERABILITY: Authentication Bypass": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48744"}} {"text": "ASUS TM-AC1900 - Arbitrary Command Execution (Metasploit)", "spans": {"SYSTEM: ASUS TM-AC1900": [[0, 14]], "VULNERABILITY: Arbitrary Command Execution": [[17, 44]], "TOOL: Metasploit": [[46, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49036"}} {"text": "Ateme TITAN File 3.9 - SSRF File Enumeration", "spans": {"SYSTEM: Ateme TITAN File 3.9": [[0, 20]], "VULNERABILITY: SSRF": [[23, 27]]}, "info": {"source": "exploitdb", "exploit_id": "51582"}} {"text": "ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure", "spans": {"SYSTEM: ATX MiniCMTS200a Broadband Gateway 2.0": [[0, 38]], "VULNERABILITY: Credential Disclosure": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49124"}} {"text": "Avaya Aura Communication Manager 5.2 - Remote Code Execution", "spans": {"SYSTEM: Avaya Aura Communication Manager 5.2": [[0, 36]], "VULNERABILITY: Remote Code Execution": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48077"}} {"text": "Avaya IP Office Application Server 11.0.0.0 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: Avaya IP Office Application Server 11.0.0.0": [[0, 43]], "VULNERABILITY: Cross-Site Scripting": [[57, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48105"}} {"text": "Black Box Kvm Extender 3.4.31307 - Local File Inclusion", "spans": {"SYSTEM: Black Box Kvm Extender 3.4.31307": [[0, 32]], "VULNERABILITY: Local File Inclusion": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50100"}} {"text": "BrightSign Digital Signage Diagnostic Web Server 8.2.26 - File Delete Path Traversal", "spans": {"SYSTEM: BrightSign Digital Signage Diagnostic Web Server 8.2.26": [[0, 55]], "VULNERABILITY: Path Traversal": [[70, 84]]}, "info": {"source": "exploitdb", "exploit_id": "48844"}} {"text": "BrightSign Digital Signage Diagnostic Web Server 8.2.26 - Server-Side Request Forgery (Unauthenticated)", "spans": {"SYSTEM: BrightSign Digital Signage Diagnostic Web Server 8.2.26": [[0, 55]], "VULNERABILITY: Server-Side Request Forgery": [[58, 85]]}, "info": {"source": "exploitdb", "exploit_id": "48843"}} {"text": "BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password)", "spans": {"SYSTEM: BSA Radar 1.6.7234.24750": [[0, 24]], "VULNERABILITY: Cross-Site Request Forgery": [[27, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48653"}} {"text": "Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass", "spans": {"SYSTEM: Buffalo TeraStation Network Attached Storage (NAS) 1.66": [[0, 55]], "VULNERABILITY: Authentication Bypass": [[58, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51012"}} {"text": "Carel pCOWeb HVAC BACnet Gateway 2.1.0 - Directory Traversal", "spans": {"SYSTEM: Carel pCOWeb HVAC BACnet Gateway 2.1.0": [[0, 38]], "VULNERABILITY: Directory Traversal": [[41, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50986"}} {"text": "Check Point Security Gateway - Information Disclosure (Unauthenticated)", "spans": {"SYSTEM: Check Point Security Gateway": [[0, 28]], "VULNERABILITY: Information Disclosure": [[31, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52029"}} {"text": "CHIYU IoT Devices - Denial of Service (DoS)", "spans": {"SYSTEM: CHIYU IoT Devices": [[0, 17]], "VULNERABILITY: Denial of Service (DoS)": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49937"}} {"text": "Cisco Adaptive Security Appliance Software 9.11 - Local File Inclusion", "spans": {"SYSTEM: Cisco Adaptive Security Appliance Software 9.11": [[0, 47]], "VULNERABILITY: Local File Inclusion": [[50, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48722"}} {"text": "Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion", "spans": {"SYSTEM: Cisco Adaptive Security Appliance Software 9.7": [[0, 46]], "VULNERABILITY: Arbitrary File Deletion": [[65, 88]]}, "info": {"source": "exploitdb", "exploit_id": "48723"}} {"text": "Cisco ASA 9.14.1.10 and FTD 6.6.0.1 - Path Traversal (2)", "spans": {"SYSTEM: Cisco ASA 9.14.1.10 and FTD 6.6.0.1": [[0, 35]], "VULNERABILITY: Path Traversal": [[38, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49262"}} {"text": "Cisco ASA and FTD 9.6.4.42 - Path Traversal", "spans": {"SYSTEM: Cisco ASA and FTD 9.6.4.42": [[0, 26]], "VULNERABILITY: Path Traversal": [[29, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48871"}} {"text": "Cisco Firepower Management Center < 6.6.7.1 - Authenticated RCE", "spans": {"SYSTEM: Cisco Firepower Management Center < 6.6.7.1": [[0, 43]], "VULNERABILITY: RCE": [[60, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51881"}} {"text": "Cisco UCS Manager 2.2(1d) - Remote Command Execution", "spans": {"SYSTEM: Cisco UCS Manager 2.2(1d)": [[0, 25]], "VULNERABILITY: Remote Command Execution": [[28, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49436"}} {"text": "Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass", "spans": {"SYSTEM: Cisco UCS-IMC Supervisor 2.2.0.0": [[0, 32]], "VULNERABILITY: Authentication Bypass": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51589"}} {"text": "Citrix ADC NetScaler - Local File Inclusion (Metasploit)", "spans": {"SYSTEM: Citrix ADC NetScaler": [[0, 20]], "VULNERABILITY: Local File Inclusion": [[23, 43]], "TOOL: Metasploit": [[45, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49038"}} {"text": "COMMAX Biometric Access Control System 1.0.0 - Authentication Bypass", "spans": {"SYSTEM: COMMAX Biometric Access Control System 1.0.0": [[0, 44]], "VULNERABILITY: Authentication Bypass": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50206"}} {"text": "COMMAX CVD-Axx DVR 5.1.4 - Weak Default Credentials Stream Disclosure", "spans": {"SYSTEM: COMMAX CVD-Axx DVR 5.1.4": [[0, 24]], "VULNERABILITY: Weak Default Credentials Stream Disclosure": [[27, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50210"}} {"text": "COMMAX Smart Home IoT Control System CDP-1020n - SQL Injection Authentication Bypass", "spans": {"SYSTEM: COMMAX Smart Home IoT Control System CDP-1020n": [[0, 46]], "VULNERABILITY: Authentication Bypass": [[63, 84]]}, "info": {"source": "exploitdb", "exploit_id": "50207"}} {"text": "COMMAX Smart Home Ruvie CCTV Bridge DVR Service - Config Write / DoS (Unauthenticated)", "spans": {"SYSTEM: COMMAX Smart Home Ruvie CCTV Bridge DVR Service": [[0, 47]], "VULNERABILITY: Config Write / DoS": [[50, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50209"}} {"text": "COMMAX Smart Home Ruvie CCTV Bridge DVR Service - RTSP Credentials Disclosure", "spans": {"SYSTEM: COMMAX Smart Home Ruvie CCTV Bridge DVR Service": [[0, 47]], "VULNERABILITY: RTSP Credentials Disclosure": [[50, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50208"}} {"text": "COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow", "spans": {"SYSTEM: COMMAX UMS Client ActiveX Control 1.7.0.2": [[0, 41]], "VULNERABILITY: Buffer Overflow": [[64, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50232"}} {"text": "COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow", "spans": {"SYSTEM: COMMAX WebViewer ActiveX Control 2.1.4.5": [[0, 40]], "VULNERABILITY: Buffer Overflow": [[66, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50231"}} {"text": "Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure", "spans": {"SYSTEM: Compro Technology IP Camera": [[0, 27]], "VULNERABILITY: Stream Disclosure": [[49, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50253"}} {"text": "Compro Technology IP Camera - ' mjpegStreamer.cgi' Screenshot Disclosure", "spans": {"SYSTEM: Compro Technology IP Camera": [[0, 27]], "VULNERABILITY: Screenshot Disclosure": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50254"}} {"text": "Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS)", "spans": {"SYSTEM: Compro Technology IP Camera": [[0, 27]], "VULNERABILITY: Denial of Service (DoS)": [[43, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50250"}} {"text": "Compro Technology IP Camera - 'Multiple' Credential Disclosure", "spans": {"SYSTEM: Compro Technology IP Camera": [[0, 27]], "VULNERABILITY: Credential Disclosure": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50252"}} {"text": "Compro Technology IP Camera - RTSP stream disclosure (Unauthenticated)", "spans": {"SYSTEM: Compro Technology IP Camera": [[0, 27]], "VULNERABILITY: RTSP stream disclosure": [[30, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50251"}} {"text": "Comtrend AR-5387un router - Persistent XSS (Authenticated)", "spans": {"SYSTEM: Comtrend AR-5387un router": [[0, 25]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48908"}} {"text": "Comtrend VR-3033 - Command Injection", "spans": {"SYSTEM: Comtrend VR-3033": [[0, 16]], "VULNERABILITY: Command Injection": [[19, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48142"}} {"text": "Creston Web Interface 1.0.0.2159 - Credential Disclosure", "spans": {"SYSTEM: Creston Web Interface 1.0.0.2159": [[0, 32]], "VULNERABILITY: Credential Disclosure": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50675"}} {"text": "D-Link DAP-1325 - Broken Access Control", "spans": {"SYSTEM: D-Link DAP-1325": [[0, 15]], "VULNERABILITY: Broken Access Control": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51556"}} {"text": "D-Link DIR-615 T1 20.10 - CAPTCHA Bypass", "spans": {"SYSTEM: D-Link DIR-615 T1 20.10": [[0, 23]], "VULNERABILITY: CAPTCHA Bypass": [[26, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48551"}} {"text": "D-Link DSR-250N 3.12 - Denial of Service (PoC)", "spans": {"SYSTEM: D-Link DSR-250N 3.12": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[23, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48863"}} {"text": "Dbltek GoIP - Local File Inclusion", "spans": {"SYSTEM: Dbltek GoIP": [[0, 11]], "VULNERABILITY: Local File Inclusion": [[14, 34]]}, "info": {"source": "exploitdb", "exploit_id": "50775"}} {"text": "DBPower C300 HD Camera - Remote Configuration Disclosure", "spans": {"SYSTEM: DBPower C300 HD Camera": [[0, 22]], "VULNERABILITY: Remote Configuration Disclosure": [[25, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48095"}} {"text": "Denver IP Camera SHO-110 - Unauthenticated Snapshot", "spans": {"SYSTEM: Denver IP Camera SHO-110": [[0, 24]], "VULNERABILITY: Unauthenticated Snapshot": [[27, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50162"}} {"text": "Dingtian-DT-R002 3.1.276A - Authentication Bypass", "spans": {"SYSTEM: Dingtian-DT-R002 3.1.276A": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50984"}} {"text": "DLINK DPH-400SE - Exposure of Sensitive Information", "spans": {"SYSTEM: DLINK DPH-400SE": [[0, 15]], "VULNERABILITY: Exposure of Sensitive Information": [[18, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51709"}} {"text": "Draytek VigorAP 1000C - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Draytek VigorAP 1000C": [[0, 21]], "VULNERABILITY: Persistent Cross-Site Scripting": [[24, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48436"}} {"text": "Eaton Intelligent Power Manager 1.6 - Directory Traversal", "spans": {"SYSTEM: Eaton Intelligent Power Manager 1.6": [[0, 35]], "VULNERABILITY: Directory Traversal": [[38, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48614"}} {"text": "ECOA Building Automation System - 'multiple' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: CSRF": [[73, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50278"}} {"text": "ECOA Building Automation System - Arbitrary File Deletion", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Arbitrary File Deletion": [[34, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50286"}} {"text": "ECOA Building Automation System - Configuration Download Information Disclosure", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Information Disclosure": [[57, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50280"}} {"text": "ECOA Building Automation System - Cookie Poisoning Authentication Bypass", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50279"}} {"text": "ECOA Building Automation System - Directory Traversal Content Disclosure", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Directory Traversal": [[34, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50277"}} {"text": "ECOA Building Automation System - Local File Disclosure", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Local File Disclosure": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50285"}} {"text": "ECOA Building Automation System - Path Traversal Arbitrary File Upload", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Path Traversal": [[34, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50276"}} {"text": "ECOA Building Automation System - Remote Privilege Escalation", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Privilege Escalation": [[41, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50284"}} {"text": "ECOA Building Automation System - Weak Default Credentials", "spans": {"SYSTEM: ECOA Building Automation System": [[0, 31]], "VULNERABILITY: Weak Default Credentials": [[34, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50275"}} {"text": "Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering)", "spans": {"SYSTEM: Edimax EW-7438RPn": [[0, 17]], "VULNERABILITY: Cross-Site Request Forgery": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48366"}} {"text": "Edimax EW-7438RPn - Information Disclosure (WiFi Password)", "spans": {"SYSTEM: Edimax EW-7438RPn": [[0, 17]], "VULNERABILITY: Information Disclosure": [[20, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48365"}} {"text": "Edimax EW-7438RPn 1.13 - Remote Code Execution", "spans": {"SYSTEM: Edimax EW-7438RPn 1.13": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48377"}} {"text": "Edimax Technology EW-7438RPn-v3 Mini 1.27 - Remote Code Execution", "spans": {"SYSTEM: Edimax Technology EW-7438RPn-v3 Mini 1.27": [[0, 41]], "VULNERABILITY: Remote Code Execution": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48318"}} {"text": "Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass", "spans": {"SYSTEM: Eibiz i-Media Server Digital Signage 3.8.0": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48763"}} {"text": "Eibiz i-Media Server Digital Signage 3.8.0 - Configuration Disclosure", "spans": {"SYSTEM: Eibiz i-Media Server Digital Signage 3.8.0": [[0, 42]], "VULNERABILITY: Configuration Disclosure": [[45, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48764"}} {"text": "Eibiz i-Media Server Digital Signage 3.8.0 - Privilege Escalation", "spans": {"SYSTEM: Eibiz i-Media Server Digital Signage 3.8.0": [[0, 42]], "VULNERABILITY: Privilege Escalation": [[45, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48774"}} {"text": "Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass", "spans": {"SYSTEM: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0": [[0, 53]], "VULNERABILITY: Authentication Bypass": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52004"}} {"text": "Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass", "spans": {"SYSTEM: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x": [[0, 43]], "VULNERABILITY: Authentication Bypass": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "52069"}} {"text": "Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Device Config", "spans": {"SYSTEM: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x": [[0, 43]], "VULNERABILITY: Device Config": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52070"}} {"text": "Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass", "spans": {"SYSTEM: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link": [[0, 51]], "VULNERABILITY: Authentication Bypass": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "52006"}} {"text": "Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure", "spans": {"SYSTEM: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link": [[0, 51]], "VULNERABILITY: Device Config Disclosure": [[54, 78]]}, "info": {"source": "exploitdb", "exploit_id": "52007"}} {"text": "Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass", "spans": {"SYSTEM: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999": [[0, 50]], "VULNERABILITY: Authentication Bypass": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "52002"}} {"text": "Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Device Config Disclosure", "spans": {"SYSTEM: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999": [[0, 50]], "VULNERABILITY: Device Config Disclosure": [[53, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52003"}} {"text": "Elber Wayber Analog/Digital Audio STL 4.00 - Authentication Bypass", "spans": {"SYSTEM: Elber Wayber Analog/Digital Audio STL 4.00": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "52071"}} {"text": "Elber Wayber Analog/Digital Audio STL 4.00 - Device Config Disclosure", "spans": {"SYSTEM: Elber Wayber Analog/Digital Audio STL 4.00": [[0, 42]], "VULNERABILITY: Device Config Disclosure": [[45, 69]]}, "info": {"source": "exploitdb", "exploit_id": "52072"}} {"text": "Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure", "spans": {"SYSTEM: Electrolink FM/DAB/TV Transmitter (controlloLogin.js)": [[0, 53]], "VULNERABILITY: Credentials Disclosure": [[56, 78]]}, "info": {"source": "exploitdb", "exploit_id": "51771"}} {"text": "Electrolink FM/DAB/TV Transmitter (Login Cookie) - Authentication Bypass", "spans": {"SYSTEM: Electrolink FM/DAB/TV Transmitter (Login Cookie)": [[0, 48]], "VULNERABILITY: Authentication Bypass": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51772"}} {"text": "Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm) - Credentials Disclosure", "spans": {"SYSTEM: Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm)": [[0, 54]], "VULNERABILITY: Credentials Disclosure": [[57, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51770"}} {"text": "Electrolink FM/DAB/TV Transmitter - Pre-Auth MPFS Image Remote Code Execution", "spans": {"SYSTEM: Electrolink FM/DAB/TV Transmitter": [[0, 33]], "VULNERABILITY: Remote Code Execution": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51775"}} {"text": "Electrolink FM/DAB/TV Transmitter - Remote Authentication Removal", "spans": {"SYSTEM: Electrolink FM/DAB/TV Transmitter": [[0, 33]], "VULNERABILITY: Remote Authentication Removal": [[36, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51773"}} {"text": "ESCAM QD-900 WIFI HD Camera - Remote Configuration Disclosure", "spans": {"SYSTEM: ESCAM QD-900 WIFI HD Camera": [[0, 27]], "VULNERABILITY: Remote Configuration Disclosure": [[30, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48107"}} {"text": "F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion", "spans": {"SYSTEM: F5 Big-IP 13.1.3 Build 0.0.6": [[0, 28]], "VULNERABILITY: Local File Inclusion": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48711"}} {"text": "F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: F5 BIG-IP 16.0.x": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49738"}} {"text": "FatPipe Networks WARP 10.2.2 - Authorization Bypass", "spans": {"SYSTEM: FatPipe Networks WARP 10.2.2": [[0, 28]], "VULNERABILITY: Authorization Bypass": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50339"}} {"text": "FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - 'Add Admin' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2": [[0, 40]], "VULNERABILITY: CSRF": [[83, 87]]}, "info": {"source": "exploitdb", "exploit_id": "50338"}} {"text": "FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Config Download (Unauthenticated)", "spans": {"SYSTEM: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2": [[0, 40]], "VULNERABILITY: Config Download": [[43, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50340"}} {"text": "FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Hidden Backdoor Account (Write Access)", "spans": {"SYSTEM: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2": [[0, 40]], "VULNERABILITY: Hidden Backdoor Account": [[43, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50341"}} {"text": "FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Remote Privilege Escalation", "spans": {"SYSTEM: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2": [[0, 40]], "VULNERABILITY: Privilege Escalation": [[50, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50342"}} {"text": "Fifthplay S.A.M.I 2019.2_HP - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Fifthplay S.A.M.I 2019.2_HP": [[0, 27]], "VULNERABILITY: Persistent Cross-Site Scripting": [[30, 61]]}, "info": {"source": "exploitdb", "exploit_id": "47979"}} {"text": "FLIR AX8 1.46.16 - Remote Command Injection", "spans": {"SYSTEM: FLIR AX8 1.46.16": [[0, 16]], "VULNERABILITY: Command Injection": [[27, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52240"}} {"text": "Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification", "spans": {"SYSTEM: Fortinet FortiOS 6.0.4": [[0, 22]], "VULNERABILITY: Unauthenticated SSL VPN User Password Modification": [[25, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49074"}} {"text": "Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE", "spans": {"SYSTEM: Genexis PLATINUM 4410 2.1 P4410-V2-1.28": [[0, 39]], "VULNERABILITY: RCE": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49764"}} {"text": "Genexis Platinum-4410 - 'SSID' Persistent XSS", "spans": {"SYSTEM: Genexis Platinum-4410": [[0, 21]], "VULNERABILITY: XSS": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48948"}} {"text": "Genexis Platinum-4410 2.1 - Authentication Bypass", "spans": {"SYSTEM: Genexis Platinum-4410 2.1": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47961"}} {"text": "Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF", "spans": {"SYSTEM: Genexis Platinum-4410 P4410-V2-1.28": [[0, 35]], "VULNERABILITY: CSRF": [[64, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49000"}} {"text": "Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot", "spans": {"SYSTEM: Genexis Platinum-4410 P4410-V2-1.28": [[0, 35]], "VULNERABILITY: Cross Site Request Forgery to Reboot": [[38, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48972"}} {"text": "Genexis Platinum-4410 P4410-V2-1.31A - 'start_addr' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Genexis Platinum-4410 P4410-V2-1.31A": [[0, 36]], "VULNERABILITY: Persistent Cross-Site Scripting": [[52, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49709"}} {"text": "GeoVision Camera GV-ADR2701 - Authentication Bypass", "spans": {"SYSTEM: GeoVision Camera GV-ADR2701": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51179"}} {"text": "GeoVision Geowebserver 5.3.3 - Local FIle Inclusion", "spans": {"SYSTEM: GeoVision Geowebserver 5.3.3": [[0, 28]], "VULNERABILITY: Local FIle Inclusion": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50211"}} {"text": "GLiNet - Router Authentication Bypass", "spans": {"SYSTEM: GLiNet": [[0, 6]], "VULNERABILITY: Authentication Bypass": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51865"}} {"text": "Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection", "spans": {"SYSTEM: Grandstream UCM6200 Series CTI Interface": [[0, 40]], "VULNERABILITY: SQL Injection": [[59, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48270"}} {"text": "Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection", "spans": {"SYSTEM: Grandstream UCM6200 Series WebSocket 1.0.20.20": [[0, 46]], "VULNERABILITY: SQL Injection": [[65, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48271"}} {"text": "Hikvision Web Server Build 210702 - Command Injection", "spans": {"SYSTEM: Hikvision Web Server Build 210702": [[0, 33]], "VULNERABILITY: Command Injection": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50441"}} {"text": "HiSecOS 04.0.01 - Privilege Escalation", "spans": {"SYSTEM: HiSecOS 04.0.01": [[0, 15]], "VULNERABILITY: Privilege Escalation": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51537"}} {"text": "HiSilicon Video Encoders - Full admin access via backdoor password", "spans": {"SYSTEM: HiSilicon Video Encoders": [[0, 24]], "VULNERABILITY: Full admin access via backdoor password": [[27, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48902"}} {"text": "HiSilicon Video Encoders - RCE via unauthenticated command injection", "spans": {"SYSTEM: HiSilicon Video Encoders": [[0, 24]], "VULNERABILITY: RCE": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "48900"}} {"text": "HiSilicon video encoders - RCE via unauthenticated upload of malicious firmware", "spans": {"SYSTEM: HiSilicon video encoders": [[0, 24]], "VULNERABILITY: RCE": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "48901"}} {"text": "HiSilicon Video Encoders - Unauthenticated file disclosure via path traversal", "spans": {"SYSTEM: HiSilicon Video Encoders": [[0, 24]], "VULNERABILITY: Unauthenticated file disclosure via path traversal": [[27, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48899"}} {"text": "HiSilicon Video Encoders - Unauthenticated RTSP buffer overflow (DoS)", "spans": {"SYSTEM: HiSilicon Video Encoders": [[0, 24]], "VULNERABILITY: Unauthenticated RTSP buffer overflow": [[27, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48903"}} {"text": "Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR", "spans": {"SYSTEM: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01": [[0, 79]], "VULNERABILITY: IDOR": [[82, 86]]}, "info": {"source": "exploitdb", "exploit_id": "51872"}} {"text": "HP OfficeJet 4630/7110 MYM1FN2025AR/2117A - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: HP OfficeJet 4630/7110 MYM1FN2025AR/2117A": [[0, 41]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[44, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50227"}} {"text": "Huawei DG8045 Router 1.0 - Credential Disclosure", "spans": {"SYSTEM: Huawei DG8045 Router 1.0": [[0, 24]], "VULNERABILITY: Credential Disclosure": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50701"}} {"text": "Huawei HG255 - Directory Traversal (Metasploit)", "spans": {"SYSTEM: Huawei HG255": [[0, 12]], "VULNERABILITY: Directory Traversal": [[15, 34]], "TOOL: Metasploit": [[36, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47923"}} {"text": "Huawei HG630 2 Router - Authentication Bypass", "spans": {"SYSTEM: Huawei HG630 2 Router": [[0, 21]], "VULNERABILITY: Authentication Bypass": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48310"}} {"text": "HughesNet HT2000W Satellite Modem - Password Reset", "spans": {"SYSTEM: HughesNet HT2000W Satellite Modem": [[0, 33]], "VULNERABILITY: Password Reset": [[36, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52073"}} {"text": "I6032B-P POE 2.0MP Outdoor Camera - Remote Configuration Disclosure", "spans": {"SYSTEM: I6032B-P POE 2.0MP Outdoor Camera": [[0, 33]], "VULNERABILITY: Remote Configuration Disclosure": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48118"}} {"text": "iBall-Baton WRA150N Rom-0 Backup - File Disclosure (Sensitive Information)", "spans": {"SYSTEM: iBall-Baton WRA150N Rom-0 Backup": [[0, 32]], "VULNERABILITY: File Disclosure": [[35, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49386"}} {"text": "IBM InfoPrint 4247-Z03 Impact Matrix Printer - Directory Traversal", "spans": {"SYSTEM: IBM InfoPrint 4247-Z03 Impact Matrix Printer": [[0, 44]], "VULNERABILITY: Directory Traversal": [[47, 66]]}, "info": {"source": "exploitdb", "exploit_id": "47835"}} {"text": "IBM RICOH 6400 Printer - HTML Injection", "spans": {"SYSTEM: IBM RICOH 6400 Printer": [[0, 22]], "VULNERABILITY: HTML Injection": [[25, 39]]}, "info": {"source": "exploitdb", "exploit_id": "47918"}} {"text": "IBM RICOH Infoprint 1532 Printer - Persistent Cross-Site Scripting", "spans": {"SYSTEM: IBM RICOH Infoprint 1532 Printer": [[0, 32]], "VULNERABILITY: Persistent Cross-Site Scripting": [[35, 66]]}, "info": {"source": "exploitdb", "exploit_id": "47850"}} {"text": "IBM RICOH InfoPrint 6500 Printer - HTML Injection", "spans": {"SYSTEM: IBM RICOH InfoPrint 6500 Printer": [[0, 32]], "VULNERABILITY: HTML Injection": [[35, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47917"}} {"text": "iDS6 DSSPro Digital Signage System 6.2 - CAPTCHA Security Bypass", "spans": {"SYSTEM: iDS6 DSSPro Digital Signage System 6.2": [[0, 38]], "VULNERABILITY: CAPTCHA Security Bypass": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48991"}} {"text": "iDS6 DSSPro Digital Signage System 6.2 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: iDS6 DSSPro Digital Signage System 6.2": [[0, 38]], "VULNERABILITY: CSRF": [[69, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48990"}} {"text": "iDS6 DSSPro Digital Signage System 6.2 - Improper Access Control Privilege Escalation", "spans": {"SYSTEM: iDS6 DSSPro Digital Signage System 6.2": [[0, 38]], "VULNERABILITY: Privilege Escalation": [[65, 85]]}, "info": {"source": "exploitdb", "exploit_id": "48992"}} {"text": "Intelbras Router RF 301K - 'DNS Hijacking' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Intelbras Router RF 301K": [[0, 24]], "VULNERABILITY: CSRF": [[71, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49969"}} {"text": "Intelbras Router RF 301K 1.1.2 - Authentication Bypass", "spans": {"SYSTEM: Intelbras Router RF 301K 1.1.2": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49126"}} {"text": "Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)", "spans": {"SYSTEM: Intelbras Wireless N 150Mbps WRN240": [[0, 35]], "VULNERABILITY: Authentication Bypass": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48158"}} {"text": "IQrouter 3.3.1 Firmware - Remote Code Execution", "spans": {"SYSTEM: IQrouter 3.3.1 Firmware": [[0, 23]], "VULNERABILITY: Remote Code Execution": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48358"}} {"text": "Karel IP Phone IP1211 Web Management Panel - Directory Traversal", "spans": {"SYSTEM: Karel IP Phone IP1211 Web Management Panel": [[0, 42]], "VULNERABILITY: Directory Traversal": [[45, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48857"}} {"text": "KevinLAB BEMS 1.0 - Authentication Bypass", "spans": {"SYSTEM: KevinLAB BEMS 1.0": [[0, 17]], "VULNERABILITY: Authentication Bypass": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50146"}} {"text": "KevinLAB BEMS 1.0 - File Path Traversal Information Disclosure (Authenticated)", "spans": {"SYSTEM: KevinLAB BEMS 1.0": [[0, 17]], "VULNERABILITY: Path Traversal": [[25, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50147"}} {"text": "Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated)", "spans": {"SYSTEM: Kyocera Command Center RX ECOSYS M2035dn": [[0, 40]], "VULNERABILITY: Directory Traversal": [[43, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50738"}} {"text": "Kyocera Printer d-COPIA253MF - Directory Traversal (PoC)", "spans": {"SYSTEM: Kyocera Printer d-COPIA253MF": [[0, 28]], "VULNERABILITY: Directory Traversal": [[31, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48561"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Authentication Bypass": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49681"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Command Injection (Authenticated)", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Command Injection": [[50, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49680"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Config Download (Unauthenticated)", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Config Download": [[50, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49686"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated)", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Factory Reset": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49684"}} {"text": "KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution", "spans": {"SYSTEM: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1": [[0, 47]], "VULNERABILITY: Remote Code Execution": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49683"}} {"text": "Linksys AX3200 V1.1.00 - Command Injection", "spans": {"SYSTEM: Linksys AX3200 V1.1.00": [[0, 22]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51035"}} {"text": "Linksys EA7500 2.0.8.194281 - Cross-Site Scripting", "spans": {"SYSTEM: Linksys EA7500 2.0.8.194281": [[0, 27]], "VULNERABILITY: Cross-Site Scripting": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49708"}} {"text": "Linksys RE6500 1.0.11.001 - Unauthenticated RCE", "spans": {"SYSTEM: Linksys RE6500 1.0.11.001": [[0, 25]], "VULNERABILITY: RCE": [[44, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49270"}} {"text": "Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download", "spans": {"SYSTEM: Longjing Technology BEMS API 1.21": [[0, 33]], "VULNERABILITY: Arbitrary File Download": [[43, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50163"}} {"text": "MAC 1200R - Directory Traversal", "spans": {"SYSTEM: MAC 1200R": [[0, 9]], "VULNERABILITY: Directory Traversal": [[12, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51315"}} {"text": "Macally WIFISD2-2A82 2.000.010 - Guest to Root Privilege Escalation", "spans": {"SYSTEM: Macally WIFISD2-2A82 2.000.010": [[0, 30]], "VULNERABILITY: Privilege Escalation": [[47, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49256"}} {"text": "MCL-Net 4.3.5.8788 - Information Disclosure", "spans": {"SYSTEM: MCL-Net 4.3.5.8788": [[0, 18]], "VULNERABILITY: Information Disclosure": [[21, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51542"}} {"text": "Mida eFramework 2.8.9 - Remote Code Execution", "spans": {"SYSTEM: Mida eFramework 2.8.9": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48835"}} {"text": "Mida eFramework 2.9.0 - Back Door Access", "spans": {"SYSTEM: Mida eFramework 2.9.0": [[0, 21]], "VULNERABILITY: Back Door Access": [[24, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48823"}} {"text": "Mikrotik Router Monitoring System 1.2.3 - 'community' SQL Injection", "spans": {"SYSTEM: Mikrotik Router Monitoring System 1.2.3": [[0, 39]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48474"}} {"text": "Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Mitsubishi Electric & INEA SmartRTU": [[0, 35]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[38, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50423"}} {"text": "Mitsubishi Electric & INEA SmartRTU - Source Code Disclosure", "spans": {"SYSTEM: Mitsubishi Electric & INEA SmartRTU": [[0, 35]], "VULNERABILITY: Source Code Disclosure": [[38, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50422"}} {"text": "Multilaser Router RE018 AC1200 - Cross-Site Request Forgery (Enable Remote Access)", "spans": {"SYSTEM: Multilaser Router RE018 AC1200": [[0, 30]], "VULNERABILITY: Cross-Site Request Forgery": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49775"}} {"text": "Nanometrics Centaur 4.3.23 - Unauthenticated Remote Memory Leak", "spans": {"SYSTEM: Nanometrics Centaur 4.3.23": [[0, 26]], "VULNERABILITY: Unauthenticated Remote Memory Leak": [[29, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48098"}} {"text": "NEC Electra Elite IPK II WebPro 01.03.01 - Session Enumeration", "spans": {"SYSTEM: NEC Electra Elite IPK II WebPro 01.03.01": [[0, 40]], "VULNERABILITY: Session Enumeration": [[43, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48425"}} {"text": "NetGear D1500 V1.0.0.21_1.0.1PE - 'Wireless Repeater' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: NetGear D1500 V1.0.0.21_1.0.1PE": [[0, 31]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[54, 87]]}, "info": {"source": "exploitdb", "exploit_id": "50201"}} {"text": "Netgear DGN2200v1 - Remote Command Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Netgear DGN2200v1": [[0, 17]], "VULNERABILITY: Remote Command Execution": [[20, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50099"}} {"text": "Netgear R7000 Router - Remote Code Execution", "spans": {"SYSTEM: Netgear R7000 Router": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48588"}} {"text": "Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Netgear WNAP320 2.0.3": [[0, 21]], "VULNERABILITY: Remote Code Execution (RCE)": [[37, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50069"}} {"text": "Netis E1+ 1.2.32533 - Backdoor Account (root)", "spans": {"SYSTEM: Netis E1+ 1.2.32533": [[0, 19]], "VULNERABILITY: Backdoor Account": [[22, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48382"}} {"text": "Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak", "spans": {"SYSTEM: Netis E1+ V1.2.32533": [[0, 20]], "VULNERABILITY: Unauthenticated WiFi Password Leak": [[23, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48384"}} {"text": "Netis WF2419 2.2.36123 - Remote Code Execution", "spans": {"SYSTEM: Netis WF2419 2.2.36123": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48149"}} {"text": "Netlink GPON Router 1.0.11 - Remote Code Execution", "spans": {"SYSTEM: Netlink GPON Router 1.0.11": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48225"}} {"text": "Netlink XPON 1GE WiFi V2801RGW - Remote Command Execution", "spans": {"SYSTEM: Netlink XPON 1GE WiFi V2801RGW": [[0, 30]], "VULNERABILITY: Remote Command Execution": [[33, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48470"}} {"text": "Network Video Recorder NVR304-16EP - Reflected Cross-Site Scripting (XSS) (Unauthenticated)", "spans": {"SYSTEM: Network Video Recorder NVR304-16EP": [[0, 34]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[37, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50744"}} {"text": "NuCom 11N Wireless Router 5.07.90 - Remote Privilege Escalation", "spans": {"SYSTEM: NuCom 11N Wireless Router 5.07.90": [[0, 33]], "VULNERABILITY: Privilege Escalation": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49634"}} {"text": "OptiLink ONT1GEW GPON 2.1.11_X101 Build 1127.190306 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: OptiLink ONT1GEW GPON 2.1.11_X101 Build 1127.190306": [[0, 51]], "VULNERABILITY: Remote Code Execution": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49955"}} {"text": "P5 FNIP-8x16A FNIP-4xSH 1.0.20 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: P5 FNIP-8x16A FNIP-4xSH 1.0.20": [[0, 30]], "VULNERABILITY: Cross-Site Request Forgery": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48362"}} {"text": "Panasonic Sanyo CCTV Network Camera 2.03-0x - Cross-Site Request Forgery (Change Password)", "spans": {"SYSTEM: Panasonic Sanyo CCTV Network Camera 2.03-0x": [[0, 43]], "VULNERABILITY: Cross-Site Request Forgery": [[46, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50172"}} {"text": "piSignage 2.6.4 - Directory Traversal", "spans": {"SYSTEM: piSignage 2.6.4": [[0, 15]], "VULNERABILITY: Directory Traversal": [[18, 37]]}, "info": {"source": "exploitdb", "exploit_id": "47882"}} {"text": "PNPSCADA 2.200816204020 - 'interf' SQL Injection (Authenticated)", "spans": {"SYSTEM: PNPSCADA 2.200816204020": [[0, 23]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48757"}} {"text": "PnPSCADA v2.x - Unauthenticated PostgreSQL Injection", "spans": {"SYSTEM: PnPSCADA v2.x": [[0, 13]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51448"}} {"text": "QiHang Media Web Digital Signage 3.0.9 - Cleartext Credential Disclosure", "spans": {"SYSTEM: QiHang Media Web Digital Signage 3.0.9": [[0, 38]], "VULNERABILITY: Credential Disclosure": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48748"}} {"text": "QiHang Media Web Digital Signage 3.0.9 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: QiHang Media Web Digital Signage 3.0.9": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48751"}} {"text": "QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Deletion", "spans": {"SYSTEM: QiHang Media Web Digital Signage 3.0.9": [[0, 38]], "VULNERABILITY: Arbitrary File Deletion": [[57, 80]]}, "info": {"source": "exploitdb", "exploit_id": "48749"}} {"text": "QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure", "spans": {"SYSTEM: QiHang Media Web Digital Signage 3.0.9": [[0, 38]], "VULNERABILITY: Unauthenticated Arbitrary File Disclosure": [[41, 82]]}, "info": {"source": "exploitdb", "exploit_id": "48750"}} {"text": "RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: RAD SecFlow-1v SF_0290_2.3.01.26": [[0, 32]], "VULNERABILITY: Persistent Cross-Site Scripting": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48807"}} {"text": "RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)", "spans": {"SYSTEM: RAD SecFlow-1v SF_0290_2.3.01.26": [[0, 32]], "VULNERABILITY: Cross-Site Request Forgery": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48809"}} {"text": "Razer Sila - Command Injection", "spans": {"SYSTEM: Razer Sila": [[0, 10]], "VULNERABILITY: Command Injection": [[13, 30]]}, "info": {"source": "exploitdb", "exploit_id": "50865"}} {"text": "Razer Sila - Local File Inclusion (LFI)", "spans": {"SYSTEM: Razer Sila": [[0, 10]], "VULNERABILITY: Local File Inclusion": [[13, 33]]}, "info": {"source": "exploitdb", "exploit_id": "50864"}} {"text": "ReQuest Serious Play F3 Media Server 7.0.3 - Debug Log Disclosure", "spans": {"SYSTEM: ReQuest Serious Play F3 Media Server 7.0.3": [[0, 42]], "VULNERABILITY: Debug Log Disclosure": [[45, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48950"}} {"text": "ReQuest Serious Play F3 Media Server 7.0.3 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: ReQuest Serious Play F3 Media Server 7.0.3": [[0, 42]], "VULNERABILITY: Remote Code Execution": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48952"}} {"text": "ReQuest Serious Play F3 Media Server 7.0.3 - Remote Denial of Service", "spans": {"SYSTEM: ReQuest Serious Play F3 Media Server 7.0.3": [[0, 42]], "VULNERABILITY: Denial of Service": [[52, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48951"}} {"text": "ReQuest Serious Play Media Player 3.0 - Directory Traversal File Disclosure", "spans": {"SYSTEM: ReQuest Serious Play Media Player 3.0": [[0, 37]], "VULNERABILITY: Directory Traversal": [[40, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48949"}} {"text": "RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection", "spans": {"SYSTEM: RICOH Aficio SP 5200S Printer": [[0, 29]], "VULNERABILITY: HTML Injection": [[46, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48161"}} {"text": "RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection", "spans": {"SYSTEM: RICOH Aficio SP 5210SF Printer": [[0, 30]], "VULNERABILITY: HTML Injection": [[47, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48164"}} {"text": "Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)", "spans": {"SYSTEM: Ricon Industrial Cellular Router S9922XL": [[0, 40]], "VULNERABILITY: Remote Command Execution": [[43, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50096"}} {"text": "Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21 - Remote Code Execution", "spans": {"SYSTEM: Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21": [[0, 47]], "VULNERABILITY: Remote Code Execution": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49110"}} {"text": "Ruijie Networks Switch eWeb S29_RGOS 11.4 - Directory Traversal", "spans": {"SYSTEM: Ruijie Networks Switch eWeb S29_RGOS 11.4": [[0, 41]], "VULNERABILITY: Directory Traversal": [[44, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48755"}} {"text": "SAM SUNNY TRIPOWER 5.0 - Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: SAM SUNNY TRIPOWER 5.0": [[0, 22]], "VULNERABILITY: Insecure Direct Object Reference": [[25, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50860"}} {"text": "Satellian 1.12 - Remote Code Execution", "spans": {"SYSTEM: Satellian 1.12": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "47976"}} {"text": "Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection", "spans": {"SYSTEM: Schneider Electric U.Motion Builder 1.3.4": [[0, 41]], "VULNERABILITY: Command Injection": [[58, 75]]}, "info": {"source": "exploitdb", "exploit_id": "47991"}} {"text": "Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection", "spans": {"SYSTEM: Seagate BlackArmor NAS sg2000-2000.1331": [[0, 39]], "VULNERABILITY: Command Injection": [[42, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50132"}} {"text": "Secure Computing SnapGear Management Console SG560 3.1.5 - Arbitrary File Read", "spans": {"SYSTEM: Secure Computing SnapGear Management Console SG560 3.1.5": [[0, 56]], "VULNERABILITY: Arbitrary File Read": [[59, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48556"}} {"text": "SecuSTATION IPCAM-130 HD Camera - Remote Configuration Disclosure", "spans": {"SYSTEM: SecuSTATION IPCAM-130 HD Camera": [[0, 31]], "VULNERABILITY: Remote Configuration Disclosure": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48110"}} {"text": "SecuSTATION SC-831 HD Camera - Remote Configuration Disclosure", "spans": {"SYSTEM: SecuSTATION SC-831 HD Camera": [[0, 28]], "VULNERABILITY: Remote Configuration Disclosure": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48115"}} {"text": "Selea Targa 512 IP OCR-ANPR Camera - Stream Disclosure (Unauthenticated)", "spans": {"SYSTEM: Selea Targa 512 IP OCR-ANPR Camera": [[0, 34]], "VULNERABILITY: Stream Disclosure": [[37, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49459"}} {"text": "Selea Targa IP OCR-ANPR Camera - 'addr' Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Selea Targa IP OCR-ANPR Camera": [[0, 30]], "VULNERABILITY: Remote Code Execution": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49460"}} {"text": "Selea Targa IP OCR-ANPR Camera - 'files_list' Remote Stored XSS", "spans": {"SYSTEM: Selea Targa IP OCR-ANPR Camera": [[0, 30]], "VULNERABILITY: XSS": [[60, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49454"}} {"text": "Selea Targa IP OCR-ANPR Camera - CSRF Add Admin", "spans": {"SYSTEM: Selea Targa IP OCR-ANPR Camera": [[0, 30]], "VULNERABILITY: CSRF": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49458"}} {"text": "Selea Targa IP OCR-ANPR Camera - Developer Backdoor Config Overwrite", "spans": {"SYSTEM: Selea Targa IP OCR-ANPR Camera": [[0, 30]], "VULNERABILITY: Developer Backdoor Config Overwrite": [[33, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49455"}} {"text": "Selea Targa IP OCR-ANPR Camera - Directory Traversal File Disclosure (Unauthenticated)", "spans": {"SYSTEM: Selea Targa IP OCR-ANPR Camera": [[0, 30]], "VULNERABILITY: Directory Traversal": [[33, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49456"}} {"text": "Selea Targa IP OCR-ANPR Camera - Multiple SSRF (Unauthenticated)", "spans": {"SYSTEM: Selea Targa IP OCR-ANPR Camera": [[0, 30]], "VULNERABILITY: SSRF": [[42, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49457"}} {"text": "Seowon 130-SLC router - 'queriesCnt' Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Seowon 130-SLC router": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50295"}} {"text": "Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated)", "spans": {"SYSTEM: Seowon 130-SLC router 1.0.11": [[0, 28]], "VULNERABILITY: RCE": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49097"}} {"text": "Seowon SlC 130 Router - Remote Code Execution", "spans": {"SYSTEM: Seowon SlC 130 Router": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48759"}} {"text": "Sickbeard 0.1 - Remote Command Injection", "spans": {"SYSTEM: Sickbeard 0.1": [[0, 13]], "VULNERABILITY: Command Injection": [[23, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48646"}} {"text": "Sielco Analog FM Transmitter 2.12 - 'id' Cookie Brute Force Session Hijacking", "spans": {"SYSTEM: Sielco Analog FM Transmitter 2.12": [[0, 33]], "VULNERABILITY: Cookie Brute Force Session Hijacking": [[41, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51363"}} {"text": "Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery", "spans": {"SYSTEM: Sielco Analog FM Transmitter 2.12": [[0, 33]], "VULNERABILITY: Cross-Site Request Forgery": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51364"}} {"text": "Sielco Analog FM Transmitter 2.12 - Improper Access Control Change Admin Password", "spans": {"SYSTEM: Sielco Analog FM Transmitter 2.12": [[0, 33]], "VULNERABILITY: Improper Access Control Change Admin Password": [[36, 81]]}, "info": {"source": "exploitdb", "exploit_id": "51365"}} {"text": "Sielco PolyEco Digital FM Transmitter 2.0.6 - Account Takeover / Lockout / EoP", "spans": {"SYSTEM: Sielco PolyEco Digital FM Transmitter 2.0.6": [[0, 43]], "VULNERABILITY: Account Takeover / Lockout / EoP": [[46, 78]]}, "info": {"source": "exploitdb", "exploit_id": "51371"}} {"text": "Sielco PolyEco Digital FM Transmitter 2.0.6 - Authentication Bypass Exploit", "spans": {"SYSTEM: Sielco PolyEco Digital FM Transmitter 2.0.6": [[0, 43]], "VULNERABILITY: Authentication Bypass": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51367"}} {"text": "Sielco PolyEco Digital FM Transmitter 2.0.6 - Authorization Bypass Factory Reset", "spans": {"SYSTEM: Sielco PolyEco Digital FM Transmitter 2.0.6": [[0, 43]], "VULNERABILITY: Authorization Bypass": [[46, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51368"}} {"text": "Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation", "spans": {"SYSTEM: Sielco PolyEco Digital FM Transmitter 2.0.6": [[0, 43]], "VULNERABILITY: Radio Data System POST Manipulation": [[46, 81]]}, "info": {"source": "exploitdb", "exploit_id": "51369"}} {"text": "Sielco PolyEco Digital FM Transmitter 2.0.6 - Unauthenticated Information Disclosure", "spans": {"SYSTEM: Sielco PolyEco Digital FM Transmitter 2.0.6": [[0, 43]], "VULNERABILITY: Information Disclosure": [[62, 84]]}, "info": {"source": "exploitdb", "exploit_id": "51370"}} {"text": "Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Sipwise C5 NGCP CSC": [[0, 19]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49800"}} {"text": "Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Sipwise C5 NGCP CSC": [[0, 19]], "VULNERABILITY: CSRF": [[61, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49801"}} {"text": "SnapGear Management Console SG560 3.1.5 - Cross-Site Request Forgery (Add Super User)", "spans": {"SYSTEM: SnapGear Management Console SG560 3.1.5": [[0, 39]], "VULNERABILITY: Cross-Site Request Forgery": [[42, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48554"}} {"text": "Solar-Log 200 PM+ 3.6.0 Build 99 - 15.10.2019 - Stored XSS", "spans": {"SYSTEM: Solar-Log 200 PM+ 3.6.0 Build 99 - 15.10.2019": [[0, 45]], "VULNERABILITY: XSS": [[55, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51857"}} {"text": "SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: SolarView Compact 6.00": [[0, 22]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50968"}} {"text": "SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: SolarView Compact 6.00": [[0, 22]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[38, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50967"}} {"text": "SonicWall SMA 10.2.1.0-17sv - Password Reset", "spans": {"SYSTEM: SonicWall SMA 10.2.1.0-17sv": [[0, 27]], "VULNERABILITY: Password Reset": [[30, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50430"}} {"text": "Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Sonicwall SonicOS 6.5.4": [[0, 23]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[40, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50485"}} {"text": "Sonicwall SonicOS 7.0 - Host Header Injection", "spans": {"SYSTEM: Sonicwall SonicOS 7.0": [[0, 21]], "VULNERABILITY: Host Header Injection": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50414"}} {"text": "SonicWall SSL-VPN 8.0.0.0 - 'visualdoor' Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: SonicWall SSL-VPN 8.0.0.0": [[0, 25]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49499"}} {"text": "Sony BRAVIA Digital Signage 1.7.8 - System API Information Disclosure", "spans": {"SYSTEM: Sony BRAVIA Digital Signage 1.7.8": [[0, 33]], "VULNERABILITY: Information Disclosure": [[47, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49187"}} {"text": "Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion", "spans": {"SYSTEM: Sony BRAVIA Digital Signage 1.7.8": [[0, 33]], "VULNERABILITY: Remote File Inclusion": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49186"}} {"text": "Sony Playstation 4 (PS4) < 6.72 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC)", "spans": {"SYSTEM: Sony Playstation 4 (PS4) < 6.72": [[0, 31]], "VULNERABILITY: Use-After-Free": [[73, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49308"}} {"text": "Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC)", "spans": {"SYSTEM: Sony Playstation 4 (PS4) < 7.02": [[0, 31]], "VULNERABILITY: Use-After-Free": [[73, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49309"}} {"text": "Sophos XG115w Firewall 17.0.10 MR-10 - Authentication Bypass", "spans": {"SYSTEM: Sophos XG115w Firewall 17.0.10 MR-10": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51006"}} {"text": "SOYAL Biometric Access Control System 5.0 - 'Change Admin Password' CSRF", "spans": {"SYSTEM: SOYAL Biometric Access Control System 5.0": [[0, 41]], "VULNERABILITY: CSRF": [[68, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49677"}} {"text": "SOYAL Biometric Access Control System 5.0 - Master Code Disclosure", "spans": {"SYSTEM: SOYAL Biometric Access Control System 5.0": [[0, 41]], "VULNERABILITY: Master Code Disclosure": [[44, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49676"}} {"text": "SpinetiX Fusion Digital Signage 3.4.8 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: SpinetiX Fusion Digital Signage 3.4.8": [[0, 37]], "VULNERABILITY: Cross-Site Request Forgery": [[40, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48846"}} {"text": "SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure", "spans": {"SYSTEM: SpinetiX Fusion Digital Signage 3.4.8": [[0, 37]], "VULNERABILITY: Database Backup Disclosure": [[40, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48845"}} {"text": "SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration", "spans": {"SYSTEM: SpinetiX Fusion Digital Signage 3.4.8": [[0, 37]], "VULNERABILITY: Username Enumeration": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48847"}} {"text": "SuperMicro IPMI 03.40 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: SuperMicro IPMI 03.40": [[0, 21]], "VULNERABILITY: Cross-Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48652"}} {"text": "SuperMicro IPMI WebInterface 03.40 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: SuperMicro IPMI WebInterface 03.40": [[0, 34]], "VULNERABILITY: Cross-Site Request Forgery": [[37, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48668"}} {"text": "Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS)", "spans": {"SYSTEM: Symantec SiteMinder WebAgent v12.52": [[0, 35]], "VULNERABILITY: XSS": [[60, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51530"}} {"text": "Telesquare TLR-2855KS6 - Arbitrary File Creation", "spans": {"SYSTEM: Telesquare TLR-2855KS6": [[0, 22]], "VULNERABILITY: Arbitrary File Creation": [[25, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50862"}} {"text": "Telesquare TLR-2855KS6 - Arbitrary File Deletion", "spans": {"SYSTEM: Telesquare TLR-2855KS6": [[0, 22]], "VULNERABILITY: Arbitrary File Deletion": [[25, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50863"}} {"text": "Tenda AC5 AC1200 Wireless - 'WiFi Name & Password' Stored Cross Site Scripting", "spans": {"SYSTEM: Tenda AC5 AC1200 Wireless": [[0, 25]], "VULNERABILITY: Stored Cross Site Scripting": [[51, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49478"}} {"text": "Thecus N4800Eco Nas Server Control Panel - Comand Injection", "spans": {"SYSTEM: Thecus N4800Eco Nas Server Control Panel": [[0, 40]], "VULNERABILITY: Comand Injection": [[43, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49926"}} {"text": "Tiandy IPC and NVR 9.12.7 - Credential Disclosure", "spans": {"SYSTEM: Tiandy IPC and NVR 9.12.7": [[0, 25]], "VULNERABILITY: Credential Disclosure": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48799"}} {"text": "TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware)", "spans": {"SYSTEM: TL-WR849N 0.9.1 4.16": [[0, 20]], "VULNERABILITY: Authentication Bypass": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48152"}} {"text": "TLR-2005KSH - Arbitrary File Delete", "spans": {"SYSTEM: TLR-2005KSH": [[0, 11]], "VULNERABILITY: Arbitrary File Delete": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50935"}} {"text": "TLR-2005KSH - Arbitrary File Upload", "spans": {"SYSTEM: TLR-2005KSH": [[0, 11]], "VULNERABILITY: Arbitrary File Upload": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50931"}} {"text": "TP LINK TL-WR849N - Remote Code Execution", "spans": {"SYSTEM: TP LINK TL-WR849N": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48155"}} {"text": "TP-Link Devices - 'setDefaultHostname' Stored Cross-site Scripting (Unauthenticated)", "spans": {"SYSTEM: TP-Link Devices": [[0, 15]], "VULNERABILITY: Stored Cross-site Scripting": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49720"}} {"text": "TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)", "spans": {"SYSTEM: TP-Link Tapo c200 1.1.15": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[27, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51017"}} {"text": "TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass", "spans": {"SYSTEM: TP-Link TL-WA855RE V5_200415": [[0, 28]], "VULNERABILITY: Device Reset Auth Bypass": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49092"}} {"text": "TP-Link TL-WR740N - Authenticated Directory Transversal", "spans": {"SYSTEM: TP-Link TL-WR740N": [[0, 17]], "VULNERABILITY: Authenticated Directory Transversal": [[20, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51606"}} {"text": "TP-Link TL-WR740N - Buffer Overflow 'DOS'", "spans": {"SYSTEM: TP-Link TL-WR740N": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[20, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51866"}} {"text": "TP-LINK TL-WR740N - Multiple HTML Injection", "spans": {"SYSTEM: TP-LINK TL-WR740N": [[0, 17]], "VULNERABILITY: Multiple HTML Injection": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51769"}} {"text": "TP-Link TL-WR740N - UnAuthenticated Directory Transversal", "spans": {"SYSTEM: TP-Link TL-WR740N": [[0, 17]], "VULNERABILITY: UnAuthenticated Directory Transversal": [[20, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51768"}} {"text": "TP-Link TL-WR841N - Command Injection", "spans": {"SYSTEM: TP-Link TL-WR841N": [[0, 17]], "VULNERABILITY: Command Injection": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50058"}} {"text": "TP-Link TP-SG105E 1.0.0 - Unauthenticated Remote Reboot", "spans": {"SYSTEM: TP-Link TP-SG105E 1.0.0": [[0, 23]], "VULNERABILITY: Unauthenticated Remote Reboot": [[26, 55]]}, "info": {"source": "exploitdb", "exploit_id": "47958"}} {"text": "TVT NVMS 1000 - Directory Traversal", "spans": {"SYSTEM: TVT NVMS 1000": [[0, 13]], "VULNERABILITY: Directory Traversal": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48311"}} {"text": "Ubee EVW327 - 'Enable Remote Access' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Ubee EVW327": [[0, 11]], "VULNERABILITY: CSRF": [[65, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49920"}} {"text": "UBICOD Medivision Digital Signage 1.5.1 - Authorization Bypass", "spans": {"SYSTEM: UBICOD Medivision Digital Signage 1.5.1": [[0, 39]], "VULNERABILITY: Authorization Bypass": [[42, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48684"}} {"text": "UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: UBICOD Medivision Digital Signage 1.5.1": [[0, 39]], "VULNERABILITY: Cross-Site Request Forgery": [[42, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48694"}} {"text": "UCM6202 1.0.18.13 - Remote Command Injection", "spans": {"SYSTEM: UCM6202 1.0.18.13": [[0, 17]], "VULNERABILITY: Command Injection": [[27, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48247"}} {"text": "Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Uniview NVR301-04S2-P4": [[0, 22]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[25, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51130"}} {"text": "Visual Tools DVR VX16 4.2.28 - Local Privilege Escalation", "spans": {"SYSTEM: Visual Tools DVR VX16 4.2.28": [[0, 28]], "VULNERABILITY: Local Privilege Escalation": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50104"}} {"text": "Vodafone H-500-s 3.5.10 - WiFi Password Disclosure", "spans": {"SYSTEM: Vodafone H-500-s 3.5.10": [[0, 23]], "VULNERABILITY: Password Disclosure": [[31, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50636"}} {"text": "Wago PFC200 - Authenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Wago PFC200": [[0, 11]], "VULNERABILITY: Authenticated Remote Code Execution": [[14, 49]], "TOOL: Metasploit": [[51, 61]]}, "info": {"source": "exploitdb", "exploit_id": "47998"}} {"text": "Wavlink WN530HG4 - Password Disclosure", "spans": {"SYSTEM: Wavlink WN530HG4": [[0, 16]], "VULNERABILITY: Password Disclosure": [[19, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50991"}} {"text": "Wavlink WN533A8 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Wavlink WN533A8": [[0, 15]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[18, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50989"}} {"text": "Wavlink WN533A8 - Password Disclosure", "spans": {"SYSTEM: Wavlink WN533A8": [[0, 15]], "VULNERABILITY: Password Disclosure": [[18, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50990"}} {"text": "YeaLink SIP-TXXXP 53.84.0.15 - 'cmd' Command Injection (Authenticated)", "spans": {"SYSTEM: YeaLink SIP-TXXXP 53.84.0.15": [[0, 28]], "VULNERABILITY: Command Injection": [[37, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50509"}} {"text": "ZBL EPON ONU Broadband Router 1.0 - Remote Privilege Escalation", "spans": {"SYSTEM: ZBL EPON ONU Broadband Router 1.0": [[0, 33]], "VULNERABILITY: Privilege Escalation": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49737"}} {"text": "ZTE Router F602W - Captcha Bypass", "spans": {"SYSTEM: ZTE Router F602W": [[0, 16]], "VULNERABILITY: Captcha Bypass": [[19, 33]]}, "info": {"source": "exploitdb", "exploit_id": "48801"}} {"text": "Zucchetti Axess CLOKI Access Control 1.64 - Cross Site Request Forgery (CSRF)", "spans": {"SYSTEM: Zucchetti Axess CLOKI Access Control 1.64": [[0, 41]], "VULNERABILITY: CSRF": [[72, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50595"}} {"text": "Zyxel Armor X1 WAP6806 - Directory Traversal", "spans": {"SYSTEM: Zyxel Armor X1 WAP6806": [[0, 22]], "VULNERABILITY: Directory Traversal": [[25, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48669"}} {"text": "Color Notes 1.4 - Denial of Service (PoC)", "spans": {"SYSTEM: Color Notes 1.4": [[0, 15]], "VULNERABILITY: Denial of Service (PoC)": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49952"}} {"text": "Macaron Notes great notebook 5.5 - Denial of Service (PoC)", "spans": {"SYSTEM: Macaron Notes great notebook 5.5": [[0, 32]], "VULNERABILITY: Denial of Service (PoC)": [[35, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49953"}} {"text": "My Notes Safe 5.3 - Denial of Service (PoC)", "spans": {"SYSTEM: My Notes Safe 5.3": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49954"}} {"text": "n+otes 1.6.2 - Denial of Service (PoC)", "spans": {"SYSTEM: n+otes 1.6.2": [[0, 12]], "VULNERABILITY: Denial of Service (PoC)": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49979"}} {"text": "Notex the best notes 6.4 - Denial of Service (PoC)", "spans": {"SYSTEM: Notex the best notes 6.4": [[0, 24]], "VULNERABILITY: Denial of Service (PoC)": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50003"}} {"text": "P2PWIFICAM2 for iOS 10.4.1 - 'Camera ID' Denial of Service (PoC)", "spans": {"SYSTEM: P2PWIFICAM2 for iOS 10.4.1": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47993"}} {"text": "Post-it 5.0.1 - Denial of Service (PoC)", "spans": {"SYSTEM: Post-it 5.0.1": [[0, 13]], "VULNERABILITY: Denial of Service (PoC)": [[16, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50002"}} {"text": "ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC)", "spans": {"SYSTEM: ProficySCADA for iOS 5.0.25920": [[0, 30]], "VULNERABILITY: Denial of Service (PoC)": [[44, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48236"}} {"text": "Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC)", "spans": {"SYSTEM: Secure Notepad Private Notes 3.0.3": [[0, 34]], "VULNERABILITY: Denial of Service (PoC)": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50001"}} {"text": "Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC)", "spans": {"SYSTEM: Sticky Notes & Color Widgets 1.4.2": [[0, 34]], "VULNERABILITY: Denial of Service (PoC)": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49957"}} {"text": "Sticky Notes Widget Version 3.0.6 - Denial of Service (PoC)", "spans": {"SYSTEM: Sticky Notes Widget Version 3.0.6": [[0, 33]], "VULNERABILITY: Denial of Service (PoC)": [[36, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49978"}} {"text": "WebSSH for iOS 14.16.10 - 'mashREPL' Denial of Service (PoC)", "spans": {"SYSTEM: WebSSH for iOS 14.16.10": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49883"}} {"text": "memono Notepad Version 4.2 - Denial of Service (PoC)", "spans": {"SYSTEM: memono Notepad Version 4.2": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49977"}} {"text": "AirKeyboard iOS App 1.0.5 - Remote Input Injection", "spans": {"SYSTEM: AirKeyboard iOS App 1.0.5": [[0, 25]], "VULNERABILITY: Remote Input Injection": [[28, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52333"}} {"text": "Wifi HD Wireless Disk Drive 11 - Local File Inclusion", "spans": {"SYSTEM: Wifi HD Wireless Disk Drive 11": [[0, 30]], "VULNERABILITY: Local File Inclusion": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51015"}} {"text": "AirDisk Pro 5.5.3 for iOS - Persistent Cross-Site Scripting", "spans": {"SYSTEM: AirDisk Pro 5.5.3 for iOS": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48321"}} {"text": "Easy Transfer 1.7 for iOS - Directory Traversal", "spans": {"SYSTEM: Easy Transfer 1.7 for iOS": [[0, 25]], "VULNERABILITY: Directory Traversal": [[28, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48395"}} {"text": "File Transfer iFamily 2.1 - Directory Traversal", "spans": {"SYSTEM: File Transfer iFamily 2.1": [[0, 25]], "VULNERABILITY: Directory Traversal": [[28, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48327"}} {"text": "HardDrive 2.1 for iOS - Arbitrary File Upload", "spans": {"SYSTEM: HardDrive 2.1 for iOS": [[0, 21]], "VULNERABILITY: Arbitrary File Upload": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48406"}} {"text": "Mini Mouse 9.3.0 - Local File inclusion", "spans": {"SYSTEM: Mini Mouse 9.3.0": [[0, 16]], "VULNERABILITY: Local File inclusion": [[19, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49747"}} {"text": "Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities", "spans": {"SYSTEM: Owlfiles File Manager 12.0.1": [[0, 28]], "VULNERABILITY: Multiple Vulnerabilities": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51036"}} {"text": "Playable 9.18 iOS - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Playable 9.18 iOS": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48340"}} {"text": "Sky File 2.1.0 iOS - Directory Traversal", "spans": {"SYSTEM: Sky File 2.1.0 iOS": [[0, 18]], "VULNERABILITY: Directory Traversal": [[21, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48375"}} {"text": "Super Backup 2.0.5 for iOS - Directory Traversal", "spans": {"SYSTEM: Super Backup 2.0.5 for iOS": [[0, 26]], "VULNERABILITY: Directory Traversal": [[29, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48405"}} {"text": "SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting", "spans": {"SYSTEM: SuperBackup 2.0.5 for iOS": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48322"}} {"text": "H2 Database 1.4.199 - JNI Code Execution", "spans": {"SYSTEM: H2 Database 1.4.199": [[0, 19]], "VULNERABILITY: JNI Code Execution": [[22, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49384"}} {"text": "AD Manager Plus 7122 - Remote Code Execution (RCE)", "spans": {"SYSTEM: AD Manager Plus 7122": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51183"}} {"text": "Apache Log4j 2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Apache Log4j 2": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50592"}} {"text": "Apache Log4j2 2.14.1 - Information Disclosure", "spans": {"SYSTEM: Apache Log4j2 2.14.1": [[0, 20]], "VULNERABILITY: Information Disclosure": [[23, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50590"}} {"text": "CatDV 9.2 - RMI Authentication Bypass", "spans": {"SYSTEM: CatDV 9.2": [[0, 9]], "VULNERABILITY: Authentication Bypass": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49621"}} {"text": "Cisco DCNM JBoss 10.4 - Credential Leakage", "spans": {"SYSTEM: Cisco DCNM JBoss 10.4": [[0, 21]], "VULNERABILITY: Credential Leakage": [[24, 42]]}, "info": {"source": "exploitdb", "exploit_id": "47885"}} {"text": "GitLab CE/EE < 16.7.2 - Password Reset", "spans": {"SYSTEM: GitLab CE/EE < 16.7.2": [[0, 21]], "VULNERABILITY: Password Reset": [[24, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51889"}} {"text": "JetBrains TeamCity 2018.2.4 - Remote Code Execution", "spans": {"SYSTEM: JetBrains TeamCity 2018.2.4": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "47891"}} {"text": "JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: JetBrains TeamCity 2023.05.3": [[0, 28]], "VULNERABILITY: Remote Code Execution (RCE)": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51884"}} {"text": "Liferay Portal - Java Unmarshalling via JSONWS RCE (Metasploit)", "spans": {"SYSTEM: Liferay Portal": [[0, 14]], "VULNERABILITY: RCE": [[47, 50]], "TOOL: Metasploit": [[52, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48332"}} {"text": "Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)", "spans": {"SYSTEM: Neo4j 3.4.18": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50170"}} {"text": "Alkacon OpenCMS 15.0 - Multiple Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Alkacon OpenCMS 15.0": [[0, 20]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[32, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51564"}} {"text": "Ametys CMS v4.4.1 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Ametys CMS v4.4.1": [[0, 17]], "VULNERABILITY: Cross Site Scripting": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50692"}} {"text": "Apache Flink 1.11.0 - Unauthenticated Arbitrary File Read (Metasploit)", "spans": {"SYSTEM: Apache Flink 1.11.0": [[0, 19]], "VULNERABILITY: Arbitrary File Read": [[38, 57]], "TOOL: Metasploit": [[59, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49398"}} {"text": "Apache Flink 1.9.x - File Upload RCE (Unauthenticated)", "spans": {"SYSTEM: Apache Flink 1.9.x": [[0, 18]], "VULNERABILITY: RCE": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48978"}} {"text": "Apache HugeGraph Server 1.2.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Apache HugeGraph Server 1.2.0": [[0, 29]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52149"}} {"text": "Apache OFBiz 17.12.03 - Cross-Site Request Forgery (Account Takeover)", "spans": {"SYSTEM: Apache OFBiz 17.12.03": [[0, 21]], "VULNERABILITY: Cross-Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48408"}} {"text": "Apache OFBiz 18.12.12 - Directory Traversal", "spans": {"SYSTEM: Apache OFBiz 18.12.12": [[0, 21]], "VULNERABILITY: Directory Traversal": [[24, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52020"}} {"text": "Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution", "spans": {"SYSTEM: Apache Struts 2": [[0, 15]], "VULNERABILITY: DefaultActionMapper Prefixes OGNL Code Execution": [[18, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48917"}} {"text": "ApacheOfBiz 17.12.01 - Remote Command Execution (RCE)", "spans": {"SYSTEM: ApacheOfBiz 17.12.01": [[0, 20]], "VULNERABILITY: Remote Command Execution": [[23, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50178"}} {"text": "AppSmith 1.47 - Remote Code Execution (RCE)", "spans": {"SYSTEM: AppSmith 1.47": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52118"}} {"text": "Atlassian Confluence 7.12.2 - Pre-Authorization Arbitrary File Read", "spans": {"SYSTEM: Atlassian Confluence 7.12.2": [[0, 27]], "VULNERABILITY: Arbitrary File Read": [[48, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50377"}} {"text": "Cisco Data Center Network Manager 11.2 - Remote Code Execution", "spans": {"SYSTEM: Cisco Data Center Network Manager 11.2": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48018"}} {"text": "Cisco Data Center Network Manager 11.2.1 - 'getVmHostData' SQL Injection", "spans": {"SYSTEM: Cisco Data Center Network Manager 11.2.1": [[0, 40]], "VULNERABILITY: SQL Injection": [[59, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48019"}} {"text": "Cisco Data Center Network Manager 11.2.1 - 'LanFabricImpl' Command Injection", "spans": {"SYSTEM: Cisco Data Center Network Manager 11.2.1": [[0, 40]], "VULNERABILITY: Command Injection": [[59, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48020"}} {"text": "Cisco Digital Network Architecture Center 1.3.1.4 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Cisco Digital Network Architecture Center 1.3.1.4": [[0, 49]], "VULNERABILITY: Persistent Cross-Site Scripting": [[52, 83]]}, "info": {"source": "exploitdb", "exploit_id": "48459"}} {"text": "CITSmart ITSM 9.1.2.22 - LDAP Injection", "spans": {"SYSTEM: CITSmart ITSM 9.1.2.22": [[0, 22]], "VULNERABILITY: LDAP Injection": [[25, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49762"}} {"text": "CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated)", "spans": {"SYSTEM: CITSmart ITSM 9.1.2.27": [[0, 22]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49763"}} {"text": "CloverDX 5.9.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: CloverDX 5.9.0": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50166"}} {"text": "Confluence Data Center 7.18.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Confluence Data Center 7.18.0": [[0, 29]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50952"}} {"text": "Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Confluence Server 7.12.4": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[44, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50243"}} {"text": "DataEase 2.4.0 - Database Configuration Information Exposure", "spans": {"SYSTEM: DataEase 2.4.0": [[0, 14]], "VULNERABILITY: Database Configuration Information Exposure": [[17, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52128"}} {"text": "Eclipse Jetty 11.0.5 - Sensitive File Disclosure", "spans": {"SYSTEM: Eclipse Jetty 11.0.5": [[0, 20]], "VULNERABILITY: Sensitive File Disclosure": [[23, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50478"}} {"text": "ERPNext 12.29 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ERPNext 12.29": [[0, 13]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51255"}} {"text": "Exhibitor Web UI 1.7.1 - Remote Code Execution", "spans": {"SYSTEM: Exhibitor Web UI 1.7.1": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48654"}} {"text": "ForgeRock Access Manager 14.6.3 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: ForgeRock Access Manager 14.6.3": [[0, 31]], "VULNERABILITY: Remote Code Execution (RCE)": [[34, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50131"}} {"text": "Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution", "spans": {"SYSTEM: Furukawa Electric ConsciusMAP 2.8.1": [[0, 35]], "VULNERABILITY: Remote Code Execution": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48380"}} {"text": "Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Goanywhere Encryption helper 7.1.1": [[0, 34]], "VULNERABILITY: Remote Code Execution (RCE)": [[37, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51339"}} {"text": "Java-springboot-codebase 1.1 - Arbitrary File Read", "spans": {"SYSTEM: Java-springboot-codebase 1.1": [[0, 28]], "VULNERABILITY: Arbitrary File Read": [[31, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52304"}} {"text": "Jenkins 2.235.3 - 'Description' Stored XSS", "spans": {"SYSTEM: Jenkins 2.235.3": [[0, 15]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49237"}} {"text": "Jenkins 2.235.3 - 'tooltip' Stored Cross-Site Scripting", "spans": {"SYSTEM: Jenkins 2.235.3": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49232"}} {"text": "Jenkins 2.235.3 - 'X-Forwarded-For' Stored XSS", "spans": {"SYSTEM: Jenkins 2.235.3": [[0, 15]], "VULNERABILITY: XSS": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49244"}} {"text": "Jenkins 2.441 - Local File Inclusion", "spans": {"SYSTEM: Jenkins 2.441": [[0, 13]], "VULNERABILITY: Local File Inclusion": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51993"}} {"text": "Jenkins 2.63 - Sandbox bypass in pipeline: Groovy plug-in", "spans": {"SYSTEM: Jenkins 2.63": [[0, 12]], "VULNERABILITY: Sandbox bypass in pipeline: Groovy plug-in": [[15, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48904"}} {"text": "Jenkins Gitlab Hook Plugin 1.4.2 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: Jenkins Gitlab Hook Plugin 1.4.2": [[0, 32]], "VULNERABILITY: Reflected Cross-Site Scripting": [[35, 65]]}, "info": {"source": "exploitdb", "exploit_id": "47927"}} {"text": "Jetty 9.4.37.v20210219 - Information Disclosure", "spans": {"SYSTEM: Jetty 9.4.37.v20210219": [[0, 22]], "VULNERABILITY: Information Disclosure": [[25, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50438"}} {"text": "Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal", "spans": {"SYSTEM: Jinfornet Jreport 15.6": [[0, 22]], "VULNERABILITY: Directory Traversal": [[41, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48260"}} {"text": "Jira 8.3.4 - Information Disclosure (Username Enumeration)", "spans": {"SYSTEM: Jira 8.3.4": [[0, 10]], "VULNERABILITY: Information Disclosure": [[13, 35]]}, "info": {"source": "exploitdb", "exploit_id": "47990"}} {"text": "Karaf v4.4.3 Console - RCE", "spans": {"SYSTEM: Karaf v4.4.3 Console": [[0, 20]], "VULNERABILITY: RCE": [[23, 26]]}, "info": {"source": "exploitdb", "exploit_id": "51895"}} {"text": "Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated)", "spans": {"SYSTEM: Keycloak 12.0.1": [[0, 15]], "VULNERABILITY: Server-Side Request Forgery (SSRF)": [[39, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50405"}} {"text": "Kronos WebTA 4.0 - Authenticated Remote Privilege Escalation", "spans": {"SYSTEM: Kronos WebTA 4.0": [[0, 16]], "VULNERABILITY: Privilege Escalation": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48001"}} {"text": "LabVantage 8.3 - Information Disclosure", "spans": {"SYSTEM: LabVantage 8.3": [[0, 14]], "VULNERABILITY: Information Disclosure": [[17, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48090"}} {"text": "Liferay CE Portal 6.0.2 - Remote Command Execution", "spans": {"SYSTEM: Liferay CE Portal 6.0.2": [[0, 23]], "VULNERABILITY: Remote Command Execution": [[26, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47972"}} {"text": "Liferay Portal 6.2.5 - Insecure Permissions", "spans": {"SYSTEM: Liferay Portal 6.2.5": [[0, 20]], "VULNERABILITY: Insecure Permissions": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51244"}} {"text": "ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: ManageEngine ADSelfService Build prior to 6003": [[0, 46]], "VULNERABILITY: Remote Code Execution": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48739"}} {"text": "ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection", "spans": {"SYSTEM: ManageEngine Applications Manager 13": [[0, 36]], "VULNERABILITY: SQL Injection": [[60, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48692"}} {"text": "ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: ManageEngine Applications Manager 14700": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48793"}} {"text": "ManageEngine EventLog Analyzer 10.0 - Information Disclosure", "spans": {"SYSTEM: ManageEngine EventLog Analyzer 10.0": [[0, 35]], "VULNERABILITY: Information Disclosure": [[38, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48119"}} {"text": "ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection", "spans": {"SYSTEM: ManageEngine Network Configuration Manager 12.2": [[0, 47]], "VULNERABILITY: SQL Injection": [[59, 72]]}, "info": {"source": "exploitdb", "exploit_id": "47949"}} {"text": "ManageEngine Service Desk 10.0 - Cross-Site Scripting", "spans": {"SYSTEM: ManageEngine Service Desk 10.0": [[0, 30]], "VULNERABILITY: Cross-Site Scripting": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48473"}} {"text": "Nacos 2.0.3 - Access Control vulnerability", "spans": {"SYSTEM: Nacos 2.0.3": [[0, 11]], "VULNERABILITY: Access Control vulnerability": [[14, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51205"}} {"text": "Netlify CMS 2.10.192 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Netlify CMS 2.10.192": [[0, 20]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[23, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51576"}} {"text": "Novel Boutique House-plus 3.5.1 - Arbitrary File Download", "spans": {"SYSTEM: Novel Boutique House-plus 3.5.1": [[0, 31]], "VULNERABILITY: Arbitrary File Download": [[34, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49724"}} {"text": "OpenAM 13.0 - LDAP Injection", "spans": {"SYSTEM: OpenAM 13.0": [[0, 11]], "VULNERABILITY: LDAP Injection": [[14, 28]]}, "info": {"source": "exploitdb", "exploit_id": "50480"}} {"text": "Oracle Hospitality RES 3700 5.7 - Remote Code Execution", "spans": {"SYSTEM: Oracle Hospitality RES 3700 5.7": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48477"}} {"text": "Oracle Weblogic 10.3.6.0.0 - Remote Command Execution", "spans": {"SYSTEM: Oracle Weblogic 10.3.6.0.0": [[0, 26]], "VULNERABILITY: Remote Command Execution": [[29, 53]]}, "info": {"source": "exploitdb", "exploit_id": "47895"}} {"text": "Oracle WebLogic Server 12.2.1.0 - RCE (Unauthenticated)", "spans": {"SYSTEM: Oracle WebLogic Server 12.2.1.0": [[0, 31]], "VULNERABILITY: RCE": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49479"}} {"text": "Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution", "spans": {"SYSTEM: Oracle WebLogic Server 12.2.1.4.0": [[0, 33]], "VULNERABILITY: Remote Code Execution": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48320"}} {"text": "Oracle WebLogic Server 14.1.1.0 - RCE (Authenticated)", "spans": {"SYSTEM: Oracle WebLogic Server 14.1.1.0": [[0, 31]], "VULNERABILITY: RCE": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49461"}} {"text": "Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)", "spans": {"SYSTEM: Scopia XT Desktop 8.3.915.4": [[0, 27]], "VULNERABILITY: Cross-Site Request Forgery": [[30, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48798"}} {"text": "Shopizer 2.16.0 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Shopizer 2.16.0": [[0, 15]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[29, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49901"}} {"text": "Sonatype Nexus 3.21.1 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Sonatype Nexus 3.21.1": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49385"}} {"text": "Spring Boot common-user-management 0.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Spring Boot common-user-management 0.1": [[0, 38]], "VULNERABILITY: Remote Code Execution (RCE)": [[41, 68]]}, "info": {"source": "exploitdb", "exploit_id": "52206"}} {"text": "Spring Cloud 3.2.2 - Remote Command Execution (RCE)", "spans": {"SYSTEM: Spring Cloud 3.2.2": [[0, 18]], "VULNERABILITY: Remote Command Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51577"}} {"text": "Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Spring Cloud Gateway 3.1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50799"}} {"text": "Sysaid 20.1.11 b26 - Remote Command Execution", "spans": {"SYSTEM: Sysaid 20.1.11 b26": [[0, 18]], "VULNERABILITY: Remote Command Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48188"}} {"text": "Tomcat proprietaryEvaluate 9.0.0.M1 - Sandbox Escape", "spans": {"SYSTEM: Tomcat proprietaryEvaluate 9.0.0.M1": [[0, 35]], "VULNERABILITY: Sandbox Escape": [[38, 52]]}, "info": {"source": "exploitdb", "exploit_id": "47892"}} {"text": "TylerTech Eagle 2018.3.11 - Remote Code Execution", "spans": {"SYSTEM: TylerTech Eagle 2018.3.11": [[0, 25]], "VULNERABILITY: Remote Code Execution": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48462"}} {"text": "VMWAre vCloud Director 9.7.0.15498291 - Remote Code Execution", "spans": {"SYSTEM: VMWAre vCloud Director 9.7.0.15498291": [[0, 37]], "VULNERABILITY: Remote Code Execution": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48549"}} {"text": "WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure", "spans": {"SYSTEM: WatchGuard Fireware AD Helper Component 5.8.5.10317": [[0, 51]], "VULNERABILITY: Credential Disclosure": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48203"}} {"text": "WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request", "spans": {"SYSTEM: WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0": [[0, 78]], "VULNERABILITY: RCE": [[97, 100]]}, "info": {"source": "exploitdb", "exploit_id": "48971"}} {"text": "WSO2 3.1.0 - Arbitrary File Delete", "spans": {"SYSTEM: WSO2 3.1.0": [[0, 10]], "VULNERABILITY: Arbitrary File Delete": [[13, 34]]}, "info": {"source": "exploitdb", "exploit_id": "48313"}} {"text": "WSO2 3.1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WSO2 3.1.0": [[0, 10]], "VULNERABILITY: Persistent Cross-Site Scripting": [[13, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48319"}} {"text": "Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration", "spans": {"SYSTEM: Zoho ManageEngine ServiceDesk Plus MSP 9.4": [[0, 42]], "VULNERABILITY: User Enumeration": [[45, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50027"}} {"text": "AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)", "spans": {"SYSTEM: AVideo Platform 8.1": [[0, 19]], "VULNERABILITY: Cross Site Request Forgery": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48003"}} {"text": "AVideo Platform 8.1 - Information Disclosure (User Enumeration)", "spans": {"SYSTEM: AVideo Platform 8.1": [[0, 19]], "VULNERABILITY: Information Disclosure": [[22, 44]]}, "info": {"source": "exploitdb", "exploit_id": "47997"}} {"text": "EasyPMS 1.0.0 - Authentication Bypass", "spans": {"SYSTEM: EasyPMS 1.0.0": [[0, 13]], "VULNERABILITY: Authentication Bypass": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48858"}} {"text": "NSClient++ 0.5.2.35 - Authenticated Remote Code Execution", "spans": {"SYSTEM: NSClient++ 0.5.2.35": [[0, 19]], "VULNERABILITY: Authenticated Remote Code Execution": [[22, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48360"}} {"text": "openMAINT 1.1-2.4.2 - Arbitrary File Upload", "spans": {"SYSTEM: openMAINT 1.1-2.4.2": [[0, 19]], "VULNERABILITY: Arbitrary File Upload": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48866"}} {"text": "Swagger UI 4.1.3 - User Interface (UI) Misrepresentation of Critical Information", "spans": {"SYSTEM: Swagger UI 4.1.3": [[0, 16]], "VULNERABILITY: User Interface (UI) Misrepresentation of Critical Information": [[19, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51379"}} {"text": "Verodin Director Web Console 3.5.4.0 - Remote Authenticated Password Disclosure (PoC)", "spans": {"SYSTEM: Verodin Director Web Console 3.5.4.0": [[0, 36]], "VULNERABILITY: Password Disclosure": [[60, 79]]}, "info": {"source": "exploitdb", "exploit_id": "48002"}} {"text": "BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE", "spans": {"SYSTEM: BMC Compuware iStrobe Web": [[0, 25]], "VULNERABILITY: RCE": [[45, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51991"}} {"text": "Desktop Central 9.1.0 - Multiple Vulnerabilities", "spans": {"SYSTEM: Desktop Central 9.1.0": [[0, 21]], "VULNERABILITY: Multiple Vulnerabilities": [[24, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51082"}} {"text": "dizqueTV 1.5.3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: dizqueTV 1.5.3": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52079"}} {"text": "Openfire 4.6.0 - 'groupchatJID' Stored XSS", "spans": {"SYSTEM: Openfire 4.6.0": [[0, 14]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49233"}} {"text": "Openfire 4.6.0 - 'path' Stored XSS", "spans": {"SYSTEM: Openfire 4.6.0": [[0, 14]], "VULNERABILITY: XSS": [[31, 34]]}, "info": {"source": "exploitdb", "exploit_id": "49229"}} {"text": "Openfire 4.6.0 - 'sql' Stored XSS", "spans": {"SYSTEM: Openfire 4.6.0": [[0, 14]], "VULNERABILITY: XSS": [[30, 33]]}, "info": {"source": "exploitdb", "exploit_id": "49235"}} {"text": "Openfire 4.6.0 - 'users' Stored XSS", "spans": {"SYSTEM: Openfire 4.6.0": [[0, 14]], "VULNERABILITY: XSS": [[32, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49234"}} {"text": "Pentaho BA Server EE 9.3.0.0-428 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Pentaho BA Server EE 9.3.0.0-428": [[0, 32]], "VULNERABILITY: Remote Code Execution (RCE)": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51350"}} {"text": "STARFACE 7.3.0.10 - Authentication with Password Hash Possible", "spans": {"SYSTEM: STARFACE 7.3.0.10": [[0, 17]], "VULNERABILITY: Authentication with Password Hash Possible": [[20, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51503"}} {"text": "ZKTeco ZEM/ZMM 8.88 - Missing Authentication", "spans": {"SYSTEM: ZKTeco ZEM/ZMM 8.88": [[0, 19]], "VULNERABILITY: Missing Authentication": [[22, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51112"}} {"text": "BearFTP 0.1.0 - 'PASV' Denial of Service", "spans": {"SYSTEM: BearFTP 0.1.0": [[0, 13]], "VULNERABILITY: Denial of Service": [[23, 40]]}, "info": {"source": "exploitdb", "exploit_id": "47987"}} {"text": "dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC)", "spans": {"SYSTEM: dnsmasq-utils 2.79-1": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[38, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48301"}} {"text": "Go SSH servers 0.0.2 - Denial of Service (PoC)", "spans": {"SYSTEM: Go SSH servers 0.0.2": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[23, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48121"}} {"text": "Grafana 7.0.1 - Denial of Service (PoC)", "spans": {"SYSTEM: Grafana 7.0.1": [[0, 13]], "VULNERABILITY: Denial of Service (PoC)": [[16, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48638"}} {"text": "libupnp 1.6.18 - Stack-based buffer overflow (DoS)", "spans": {"SYSTEM: libupnp 1.6.18": [[0, 14]], "VULNERABILITY: Stack-based buffer overflow": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49119"}} {"text": "Redir 3.3 - Denial of Service (PoC)", "spans": {"SYSTEM: Redir 3.3": [[0, 9]], "VULNERABILITY: Denial of Service (PoC)": [[12, 35]]}, "info": {"source": "exploitdb", "exploit_id": "47919"}} {"text": "Sudo 1.8.25p - 'pwfeedback' Buffer Overflow (PoC)", "spans": {"SYSTEM: Sudo 1.8.25p": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[28, 43]]}, "info": {"source": "exploitdb", "exploit_id": "47995"}} {"text": "usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init", "spans": {"SYSTEM: usersctp": [[0, 8]], "VULNERABILITY: Out-of-Bounds Read": [[11, 29]]}, "info": {"source": "exploitdb", "exploit_id": "48034"}} {"text": "VIM 8.2 - Denial of Service (PoC)", "spans": {"SYSTEM: VIM 8.2": [[0, 7]], "VULNERABILITY: Denial of Service (PoC)": [[10, 33]]}, "info": {"source": "exploitdb", "exploit_id": "48008"}} {"text": "(shellcode) Linux-x64 - create a shell with execve() sending argument using XOR (/bin//sh) [55 bytes]", "spans": {"SYSTEM: (shellcode) Linux-x64": [[0, 21]], "VULNERABILITY: create a shell with execve() sending argument using XOR (/bin//sh) [55 bytes]": [[24, 101]]}, "info": {"source": "exploitdb", "exploit_id": "51834"}} {"text": "Apport 2.20 - Local Privilege Escalation", "spans": {"SYSTEM: Apport 2.20": [[0, 11]], "VULNERABILITY: Local Privilege Escalation": [[14, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49572"}} {"text": "aptdaemon < 1.1.1 - File Existence Disclosure", "spans": {"SYSTEM: aptdaemon < 1.1.1": [[0, 17]], "VULNERABILITY: File Existence Disclosure": [[20, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48962"}} {"text": "binutils 2.37 - Objdump Segmentation Fault", "spans": {"SYSTEM: binutils 2.37": [[0, 13]], "VULNERABILITY: Objdump Segmentation Fault": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50858"}} {"text": "Blueman < 2.1.4 - Local Privilege Escalation", "spans": {"SYSTEM: Blueman < 2.1.4": [[0, 15]], "VULNERABILITY: Local Privilege Escalation": [[18, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48963"}} {"text": "Dell Security Management Server <1.9.0 - Local Privilege Escalation", "spans": {"SYSTEM: Dell Security Management Server <1.9.0": [[0, 38]], "VULNERABILITY: Local Privilege Escalation": [[41, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51934"}} {"text": "Diamorphine Rootkit - Signal Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Diamorphine Rootkit": [[0, 19]], "VULNERABILITY: Privilege Escalation": [[29, 49]], "TOOL: Metasploit": [[51, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48131"}} {"text": "Enlightenment v0.25.3 - Privilege escalation", "spans": {"SYSTEM: Enlightenment v0.25.3": [[0, 21]], "VULNERABILITY: Privilege escalation": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51180"}} {"text": "ExifTool 12.23 - Arbitrary Code Execution", "spans": {"SYSTEM: ExifTool 12.23": [[0, 14]], "VULNERABILITY: Arbitrary Code Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50911"}} {"text": "glibc 2.38 - Buffer Overflow", "spans": {"SYSTEM: glibc 2.38": [[0, 10]], "VULNERABILITY: Buffer Overflow": [[13, 28]]}, "info": {"source": "exploitdb", "exploit_id": "52479"}} {"text": "Gnome Fonts Viewer 3.34.0 - Heap Corruption", "spans": {"SYSTEM: Gnome Fonts Viewer 3.34.0": [[0, 25]], "VULNERABILITY: Heap Corruption": [[28, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48803"}} {"text": "GNU screen v4.9.0 - Privilege Escalation", "spans": {"SYSTEM: GNU screen v4.9.0": [[0, 17]], "VULNERABILITY: Privilege Escalation": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51252"}} {"text": "Google Chrome 109.0.5414.74 - Code Execution via missing lib file (Ubuntu)", "spans": {"SYSTEM: Google Chrome 109.0.5414.74": [[0, 28]], "VULNERABILITY: Code Execution via missing lib file": [[31, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51331"}} {"text": "Google SLO-Generator 2.0.0 - Code Execution", "spans": {"SYSTEM: Google SLO-Generator 2.0.0": [[0, 26]], "VULNERABILITY: Code Execution": [[29, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50385"}} {"text": "libbabl 0.1.62 - Broken Double Free Detection (PoC)", "spans": {"SYSTEM: libbabl 0.1.62": [[0, 14]], "VULNERABILITY: Double Free": [[24, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49259"}} {"text": "Linux Kernel 2.6.19 < 5.9 - 'Netfilter Local Privilege Escalation", "spans": {"SYSTEM: Linux Kernel 2.6.19 < 5.9": [[0, 25]], "VULNERABILITY: Local Privilege Escalation": [[39, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50135"}} {"text": "Linux Kernel 5.1.x - 'PTRACE_TRACEME' pkexec Local Privilege Escalation (2)", "spans": {"SYSTEM: Linux Kernel 5.1.x": [[0, 18]], "VULNERABILITY: Local Privilege Escalation": [[45, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50541"}} {"text": "Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)", "spans": {"SYSTEM: Linux Kernel 5.8 < 5.16.11": [[0, 26]], "VULNERABILITY: Local Privilege Escalation": [[29, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50808"}} {"text": "Linux Kernel 6.2 - Userspace Processes To Enable Mitigation", "spans": {"SYSTEM: Linux Kernel 6.2": [[0, 16]], "VULNERABILITY: Userspace Processes To Enable Mitigation": [[20, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51384"}} {"text": "Linux PAM Environment - Variable Injection Local Privilege Escalation", "spans": {"SYSTEM: Linux PAM Environment": [[0, 21]], "VULNERABILITY: Local Privilege Escalation": [[43, 69]]}, "info": {"source": "exploitdb", "exploit_id": "52386"}} {"text": "MariaDB 10.2 - 'wsrep_provider' OS Command Execution", "spans": {"SYSTEM: MariaDB 10.2": [[0, 12]], "VULNERABILITY: OS Command Execution": [[32, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49765"}} {"text": "Mini-XML 3.2 - Heap Overflow", "spans": {"SYSTEM: Mini-XML 3.2": [[0, 12]], "VULNERABILITY: Heap Overflow": [[15, 28]]}, "info": {"source": "exploitdb", "exploit_id": "50465"}} {"text": "MySQL User-Defined (Linux) x32 / x86_64 - 'sys_exec' Local Privilege Escalation (2)", "spans": {"SYSTEM: MySQL User-Defined (Linux) x32 / x86_64": [[0, 39]], "VULNERABILITY: Local Privilege Escalation": [[53, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50236"}} {"text": "NVIDIA Container Toolkit 1.16.1 - Time-of-check Time-of-Use (TOCTOU)", "spans": {"SYSTEM: NVIDIA Container Toolkit 1.16.1": [[0, 31]], "VULNERABILITY: Time-of-check Time-of-Use": [[34, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52095"}} {"text": "OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)", "spans": {"SYSTEM: OpenSMTPD": [[0, 9]], "VULNERABILITY: Local Privilege Escalation": [[21, 47]], "TOOL: Metasploit": [[49, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48185"}} {"text": "PackageKit < 1.1.13 - File Existence Disclosure", "spans": {"SYSTEM: PackageKit < 1.1.13": [[0, 19]], "VULNERABILITY: File Existence Disclosure": [[22, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48961"}} {"text": "PolicyKit-1 0.105-31 - Privilege Escalation", "spans": {"SYSTEM: PolicyKit-1 0.105-31": [[0, 20]], "VULNERABILITY: Privilege Escalation": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50689"}} {"text": "Polkit 0.105-26 0.117-2 - Local Privilege Escalation", "spans": {"SYSTEM: Polkit 0.105-26 0.117-2": [[0, 23]], "VULNERABILITY: Local Privilege Escalation": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50011"}} {"text": "Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Reliable Datagram Sockets (RDS)": [[0, 31]], "VULNERABILITY: Privilege Escalation": [[78, 98]], "TOOL: Metasploit": [[100, 110]]}, "info": {"source": "exploitdb", "exploit_id": "47957"}} {"text": "Socat 1.7.3.4 - Heap-Based Overflow (PoC)", "spans": {"SYSTEM: Socat 1.7.3.4": [[0, 13]], "VULNERABILITY: Heap-Based Overflow": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "47999"}} {"text": "sudo 1.8.0 to 1.9.12p1 - Privilege Escalation", "spans": {"SYSTEM: sudo 1.8.0 to 1.9.12p1": [[0, 22]], "VULNERABILITY: Privilege Escalation": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51217"}} {"text": "Sudo 1.8.25p - 'pwfeedback' Buffer Overflow", "spans": {"SYSTEM: Sudo 1.8.25p": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[28, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48052"}} {"text": "Sudo 1.9.17 Host Option - Elevation of Privilege", "spans": {"SYSTEM: Sudo 1.9.17 Host Option": [[0, 23]], "VULNERABILITY: Elevation of Privilege": [[26, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52354"}} {"text": "Sudo chroot 1.9.17 - Local Privilege Escalation", "spans": {"SYSTEM: Sudo chroot 1.9.17": [[0, 18]], "VULNERABILITY: Local Privilege Escalation": [[21, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52352"}} {"text": "tar-fs 3.0.0 - Arbitrary File Write/Overwrite", "spans": {"SYSTEM: tar-fs 3.0.0": [[0, 12]], "VULNERABILITY: Arbitrary File Write": [[15, 35]]}, "info": {"source": "exploitdb", "exploit_id": "52268"}} {"text": "xglance-bin 11.00 - Privilege Escalation", "spans": {"SYSTEM: xglance-bin 11.00": [[0, 17]], "VULNERABILITY: Privilege Escalation": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48000"}} {"text": "Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Airspan AirSpot 5410 version 0.3.4.1": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51011"}} {"text": "AnyDesk 5.5.2 - Remote Code Execution", "spans": {"SYSTEM: AnyDesk 5.5.2": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49613"}} {"text": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Apache CouchDB 3.2.1": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50914"}} {"text": "Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit)", "spans": {"SYSTEM: Apache James Server 2.3.2": [[0, 25]], "VULNERABILITY: Arbitrary File Write": [[51, 71]], "TOOL: Metasploit": [[73, 83]]}, "info": {"source": "exploitdb", "exploit_id": "48130"}} {"text": "Apache James Server 2.3.2 - Remote Command Execution (RCE) (Authenticated) (2)", "spans": {"SYSTEM: Apache James Server 2.3.2": [[0, 25]], "VULNERABILITY: Remote Command Execution": [[28, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50347"}} {"text": "Aruba ClearPass Policy Manager 6.7.0 - Unauthenticated Remote Command Execution", "spans": {"SYSTEM: Aruba ClearPass Policy Manager 6.7.0": [[0, 36]], "VULNERABILITY: Remote Command Execution": [[55, 79]]}, "info": {"source": "exploitdb", "exploit_id": "48661"}} {"text": "ASTPP VoIP 4.0.1 - Remote Code Execution", "spans": {"SYSTEM: ASTPP VoIP 4.0.1": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "47889"}} {"text": "Barco WePresent - file_transfer.cgi Command Injection (Metasploit)", "spans": {"SYSTEM: Barco WePresent": [[0, 15]], "VULNERABILITY: Command Injection": [[36, 53]], "TOOL: Metasploit": [[55, 65]]}, "info": {"source": "exploitdb", "exploit_id": "47924"}} {"text": "crossfire-server 1.9.0 - 'SetUp()' Remote Buffer Overflow", "spans": {"SYSTEM: crossfire-server 1.9.0": [[0, 22]], "VULNERABILITY: Remote Buffer Overflow": [[35, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50216"}} {"text": "CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit)", "spans": {"SYSTEM: CTROMS Terminal OS Port Portal": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[50, 71]], "TOOL: Metasploit": [[73, 83]]}, "info": {"source": "exploitdb", "exploit_id": "48196"}} {"text": "Franklin Fueling Systems Colibri Controller Module 1.8.19.8580 - Local File Inclusion (LFI)", "spans": {"SYSTEM: Franklin Fueling Systems Colibri Controller Module 1.8.19.8580": [[0, 62]], "VULNERABILITY: Local File Inclusion": [[65, 85]]}, "info": {"source": "exploitdb", "exploit_id": "50861"}} {"text": "GNU gdbserver 9.2 - Remote Command Execution (RCE)", "spans": {"SYSTEM: GNU gdbserver 9.2": [[0, 17]], "VULNERABILITY: Remote Command Execution": [[20, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50539"}} {"text": "GNU Wget < 1.18 - Arbitrary File Upload (2)", "spans": {"SYSTEM: GNU Wget < 1.18": [[0, 15]], "VULNERABILITY: Arbitrary File Upload": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49815"}} {"text": "HD-Network Real-time Monitoring System 2.0 - Local File Inclusion (LFI)", "spans": {"SYSTEM: HD-Network Real-time Monitoring System 2.0": [[0, 42]], "VULNERABILITY: Local File Inclusion": [[45, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50588"}} {"text": "LBT-T300-mini1 - Remote Buffer Overflow", "spans": {"SYSTEM: LBT-T300-mini1": [[0, 14]], "VULNERABILITY: Remote Buffer Overflow": [[17, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51922"}} {"text": "Linux Kernel 5.4 - 'BleedingTooth' Bluetooth Zero-Click Remote Code Execution", "spans": {"SYSTEM: Linux Kernel 5.4": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49754"}} {"text": "Mitel mitel-cs018 - Call Data Information Disclosure", "spans": {"SYSTEM: Mitel mitel-cs018": [[0, 17]], "VULNERABILITY: Information Disclosure": [[30, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49176"}} {"text": "Multiple DrayTek Products - Pre-authentication Remote Root Code Execution", "spans": {"SYSTEM: Multiple DrayTek Products": [[0, 25]], "VULNERABILITY: Pre-authentication Remote Root Code Execution": [[28, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48268"}} {"text": "Nagios XI - Authenticated Remote Command Execution (Metasploit)", "spans": {"SYSTEM: Nagios XI": [[0, 9]], "VULNERABILITY: Remote Command Execution": [[26, 50]], "TOOL: Metasploit": [[52, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48191"}} {"text": "netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution", "spans": {"SYSTEM: netkit-telnet-0.17 telnetd (Fedora 31)": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48170"}} {"text": "Nexus Repository Manager - Java EL Injection RCE (Metasploit)", "spans": {"SYSTEM: Nexus Repository Manager": [[0, 24]], "VULNERABILITY: RCE": [[45, 48]], "TOOL: Metasploit": [[50, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48343"}} {"text": "OneTrust SDK 6.33.0 - Denial Of Service (DoS)", "spans": {"SYSTEM: OneTrust SDK 6.33.0": [[0, 19]], "VULNERABILITY: Denial Of Service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52340"}} {"text": "OpenSMTPD - MAIL FROM Remote Code Execution (Metasploit)", "spans": {"SYSTEM: OpenSMTPD": [[0, 9]], "VULNERABILITY: Remote Code Execution": [[22, 43]], "TOOL: Metasploit": [[45, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48038"}} {"text": "OpenSMTPD 6.6.1 - Remote Code Execution", "spans": {"SYSTEM: OpenSMTPD 6.6.1": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "47984"}} {"text": "OpenSMTPD 6.6.3 - Arbitrary File Read", "spans": {"SYSTEM: OpenSMTPD 6.6.3": [[0, 15]], "VULNERABILITY: Arbitrary File Read": [[18, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48139"}} {"text": "OpenSSH server (sshd) 9.8p1 - Race Condition", "spans": {"SYSTEM: OpenSSH server (sshd) 9.8p1": [[0, 27]], "VULNERABILITY: Race Condition": [[30, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52269"}} {"text": "Pachev FTP Server 1.0 - Path Traversal", "spans": {"SYSTEM: Pachev FTP Server 1.0": [[0, 21]], "VULNERABILITY: Path Traversal": [[24, 38]]}, "info": {"source": "exploitdb", "exploit_id": "47956"}} {"text": "Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Pandora FMS": [[0, 11]], "VULNERABILITY: Authenticated Remote Code Execution": [[19, 54]], "TOOL: Metasploit": [[56, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48334"}} {"text": "ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)", "spans": {"SYSTEM: ProFTPd 1.3.5": [[0, 13]], "VULNERABILITY: Remote Command Execution": [[27, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49908"}} {"text": "Proxmox VE - TOTP Brute Force", "spans": {"SYSTEM: Proxmox VE": [[0, 10]], "VULNERABILITY: TOTP Brute Force": [[13, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51763"}} {"text": "Raspberry Pi 5.10 - Default Credentials", "spans": {"SYSTEM: Raspberry Pi 5.10": [[0, 17]], "VULNERABILITY: Default Credentials": [[20, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50576"}} {"text": "Rconfig 3.x - Chained Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Rconfig 3.x": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[22, 43]], "TOOL: Metasploit": [[45, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48223"}} {"text": "Redis - Replication Code Execution (Metasploit)", "spans": {"SYSTEM: Redis": [[0, 5]], "VULNERABILITY: Replication Code Execution": [[8, 34]], "TOOL: Metasploit": [[36, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48272"}} {"text": "ThinkPHP - Multiple PHP Injection RCEs (Metasploit)", "spans": {"SYSTEM: ThinkPHP": [[0, 8]], "VULNERABILITY: RCE": [[34, 37]], "TOOL: Metasploit": [[40, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48333"}} {"text": "uftpd 2.10 - Directory Traversal (Authenticated)", "spans": {"SYSTEM: uftpd 2.10": [[0, 10]], "VULNERABILITY: Directory Traversal": [[13, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51000"}} {"text": "Unraid 6.8.0 - Auth Bypass PHP Code Execution (Metasploit)", "spans": {"SYSTEM: Unraid 6.8.0": [[0, 12]], "VULNERABILITY: Auth Bypass PHP Code Execution": [[15, 45]], "TOOL: Metasploit": [[47, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48353"}} {"text": "vCloud Director 9.7.0.15498291 - Remote Code Execution", "spans": {"SYSTEM: vCloud Director 9.7.0.15498291": [[0, 30]], "VULNERABILITY: Remote Code Execution": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48540"}} {"text": "aaPanel 6.8.21 - Directory Traversal (Authenticated)", "spans": {"SYSTEM: aaPanel 6.8.21": [[0, 14]], "VULNERABILITY: Directory Traversal": [[17, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50780"}} {"text": "ASTPP 4.0.1 VoIP Billing - Database Backup Download", "spans": {"SYSTEM: ASTPP 4.0.1 VoIP Billing": [[0, 24]], "VULNERABILITY: Database Backup Download": [[27, 51]]}, "info": {"source": "exploitdb", "exploit_id": "47900"}} {"text": "Aurba 501 - Authenticated RCE", "spans": {"SYSTEM: Aurba 501": [[0, 9]], "VULNERABILITY: RCE": [[26, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52074"}} {"text": "BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution", "spans": {"SYSTEM: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1": [[0, 104]], "VULNERABILITY: Remote Code Execution": [[149, 170]]}, "info": {"source": "exploitdb", "exploit_id": "48642"}} {"text": "BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution (PoC)", "spans": {"SYSTEM: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1": [[0, 104]], "VULNERABILITY: Remote Code Execution": [[149, 170]]}, "info": {"source": "exploitdb", "exploit_id": "48643"}} {"text": "Boa Web Server v0.94.14 - Authentication Bypass", "spans": {"SYSTEM: Boa Web Server v0.94.14": [[0, 23]], "VULNERABILITY: Authentication Bypass": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51139"}} {"text": "Cassandra Web 0.5.0 - Remote File Read", "spans": {"SYSTEM: Cassandra Web 0.5.0": [[0, 19]], "VULNERABILITY: Remote File Read": [[22, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49362"}} {"text": "CentOS Web Panel 0.9.8.1081 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: CentOS Web Panel 0.9.8.1081": [[0, 27]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[30, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50200"}} {"text": "Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: Centos Web Panel 7 v0.9.8.1147": [[0, 30]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[33, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51194"}} {"text": "Centos WebPanel 7 - 'term' SQL Injection", "spans": {"SYSTEM: Centos WebPanel 7": [[0, 17]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48212"}} {"text": "Cipi Control Panel 3.1.15 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Cipi Control Panel 3.1.15": [[0, 25]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[28, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50788"}} {"text": "F-Secure Internet Gatekeeper 5.40 - Heap Overflow (PoC)", "spans": {"SYSTEM: F-Secure Internet Gatekeeper 5.40": [[0, 33]], "VULNERABILITY: Heap Overflow": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47996"}} {"text": "Mahara 19.10.2 CMS - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Mahara 19.10.2 CMS": [[0, 18]], "VULNERABILITY: Persistent Cross-Site Scripting": [[21, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48367"}} {"text": "Metabase 0.46.6 - Pre-Auth Remote Code Execution", "spans": {"SYSTEM: Metabase 0.46.6": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51797"}} {"text": "Nokia BMC Log Scanner - Remote Code Execution", "spans": {"SYSTEM: Nokia BMC Log Scanner": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51896"}} {"text": "Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion", "spans": {"SYSTEM: Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0": [[0, 83]], "VULNERABILITY: Directory Traversal": [[104, 123]]}, "info": {"source": "exploitdb", "exploit_id": "48964"}} {"text": "Pi-hole 4.4.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Pi-hole 4.4.0": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48519"}} {"text": "Pi-hole < 4.4 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Pi-hole < 4.4": [[0, 13]], "VULNERABILITY: Authenticated Remote Code Execution": [[16, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48442"}} {"text": "Pi-hole < 4.4 - Authenticated Remote Code Execution / Privileges Escalation", "spans": {"SYSTEM: Pi-hole < 4.4": [[0, 13]], "VULNERABILITY: Authenticated Remote Code Execution": [[16, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48443"}} {"text": "Raysync 3.3.3.8 - RCE", "spans": {"SYSTEM: Raysync 3.3.3.8": [[0, 15]], "VULNERABILITY: RCE": [[18, 21]]}, "info": {"source": "exploitdb", "exploit_id": "49265"}} {"text": "Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated)", "spans": {"SYSTEM: Rocket.Chat 3.12.1": [[0, 18]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49960"}} {"text": "Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated) (2)", "spans": {"SYSTEM: Rocket.Chat 3.12.1": [[0, 18]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50108"}} {"text": "ScadaBR 1.0 - Arbitrary File Upload (Authenticated) (2)", "spans": {"SYSTEM: ScadaBR 1.0": [[0, 11]], "VULNERABILITY: Arbitrary File Upload": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49735"}} {"text": "Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver)", "spans": {"SYSTEM: Selenium 3.141.59": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49915"}} {"text": "TerraMaster TOS 4.2.06 - RCE (Unauthenticated)", "spans": {"SYSTEM: TerraMaster TOS 4.2.06": [[0, 22]], "VULNERABILITY: RCE": [[25, 28]]}, "info": {"source": "exploitdb", "exploit_id": "49321"}} {"text": "TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: TerraMaster TOS 4.2.06": [[0, 22]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[25, 62]], "TOOL: Metasploit": [[64, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49330"}} {"text": "Usermin 1.820 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Usermin 1.820": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50234"}} {"text": "Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit)", "spans": {"SYSTEM: Webmin 1.962": [[0, 12]], "VULNERABILITY: RCE": [[47, 50]], "TOOL: Metasploit": [[52, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49318"}} {"text": "Webmin 1.973 - 'run.cgi' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Webmin 1.973": [[0, 12]], "VULNERABILITY: CSRF": [[53, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50144"}} {"text": "Webmin 1.973 - 'save_user.cgi' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Webmin 1.973": [[0, 12]], "VULNERABILITY: CSRF": [[59, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50126"}} {"text": "Webmin 1.984 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Webmin 1.984": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50809"}} {"text": "Webmin 1.996 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Webmin 1.996": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50998"}} {"text": "ZeroShell 3.9.0 - 'cgi-bin/kerbynet' Remote Root Command Injection (Metasploit)", "spans": {"SYSTEM: ZeroShell 3.9.0": [[0, 15]], "VULNERABILITY: Command Injection": [[49, 66]], "TOOL: Metasploit": [[68, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49096"}} {"text": "ZeroShell 3.9.0 - Remote Command Execution", "spans": {"SYSTEM: ZeroShell 3.9.0": [[0, 15]], "VULNERABILITY: Remote Command Execution": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49862"}} {"text": "Zoom Meeting Connector 4.6.239.20200613 - Remote Root Exploit (Authenticated)", "spans": {"SYSTEM: Zoom Meeting Connector 4.6.239.20200613": [[0, 39]], "VULNERABILITY: Remote Root Exploit": [[42, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49360"}} {"text": "D-Link Devices - Unauthenticated Remote Command Execution in ssdpcgi (Metasploit)", "spans": {"SYSTEM: D-Link Devices": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[33, 57]], "TOOL: Metasploit": [[70, 80]]}, "info": {"source": "exploitdb", "exploit_id": "48037"}} {"text": "TP-Link Archer A7/C7 - Unauthenticated LAN Remote Code Execution (Metasploit)", "spans": {"SYSTEM: TP-Link Archer A7/C7": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[43, 64]], "TOOL: Metasploit": [[66, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48331"}} {"text": "Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation", "spans": {"SYSTEM: Palo Alto PAN-OS < v11.1.2-h3": [[0, 30]], "VULNERABILITY: Command Injection": [[34, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51996"}} {"text": "Wing FTP Server 6.3.8 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Wing FTP Server 6.3.8": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48676"}} {"text": "Fetch Softworks Fetch FTP Client 5.8 - Remote CPU Consumption (Denial of Service)", "spans": {"SYSTEM: Fetch Softworks Fetch FTP Client 5.8": [[0, 36]], "VULNERABILITY: Denial of Service": [[63, 80]]}, "info": {"source": "exploitdb", "exploit_id": "50696"}} {"text": "Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS)", "spans": {"SYSTEM: Google Chrome Browser 111.0.5563.64": [[0, 35]], "VULNERABILITY: AXPlatformNodeCocoa Fatal OOM/Crash": [[38, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51361"}} {"text": "HospitalRun 1.0.0-beta - Local Root Exploit for macOS", "spans": {"SYSTEM: HospitalRun 1.0.0-beta": [[0, 23]], "VULNERABILITY: Local Root Exploit for macOS": [[26, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51310"}} {"text": "Laravel Valet 2.0.3 - Local Privilege Escalation (macOS)", "spans": {"SYSTEM: Laravel Valet 2.0.3": [[0, 19]], "VULNERABILITY: Local Privilege Escalation": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50591"}} {"text": "MacOS 320.whatis Script - Privilege Escalation", "spans": {"SYSTEM: MacOS 320.whatis Script": [[0, 23]], "VULNERABILITY: Privilege Escalation": [[26, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48464"}} {"text": "macOS LaunchDaemon iOS 17.2 - Privilege Escalation", "spans": {"SYSTEM: macOS LaunchDaemon iOS 17.2": [[0, 27]], "VULNERABILITY: Privilege Escalation": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52316"}} {"text": "Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution", "spans": {"SYSTEM: Source Engine CS:GO BuildID: 4937372": [[0, 36]], "VULNERABILITY: Arbitrary Code Execution": [[39, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48387"}} {"text": "VMWare Fusion - Local Privilege Escalation", "spans": {"SYSTEM: VMWare Fusion": [[0, 13]], "VULNERABILITY: Local Privilege Escalation": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48232"}} {"text": "VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)", "spans": {"SYSTEM: VMware Fusion": [[0, 13]], "VULNERABILITY: Privilege Escalation": [[38, 58]], "TOOL: Metasploit": [[60, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48337"}} {"text": "VMware Fusion 11.5.2 - Privilege Escalation", "spans": {"SYSTEM: VMware Fusion 11.5.2": [[0, 20]], "VULNERABILITY: Privilege Escalation": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48235"}} {"text": "RoyalTSX 6.0.1 - RTSZ File Handling Heap Memory Corruption PoC", "spans": {"SYSTEM: RoyalTSX 6.0.1": [[0, 14]], "VULNERABILITY: Memory Corruption": [[41, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51764"}} {"text": "Atlassian Jira Server Data Center 8.16.0 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Atlassian Jira Server Data Center 8.16.0": [[0, 40]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[43, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50068"}} {"text": "Apache Tomcat 10.1 - Denial Of Service", "spans": {"SYSTEM: Apache Tomcat 10.1": [[0, 18]], "VULNERABILITY: Denial Of Service": [[21, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51262"}} {"text": "BIND - 'TSIG' Denial of Service", "spans": {"SYSTEM: BIND": [[0, 4]], "VULNERABILITY: Denial of Service": [[14, 31]]}, "info": {"source": "exploitdb", "exploit_id": "48521"}} {"text": "Elasticsearch - StackOverflow DoS", "spans": {"SYSTEM: Elasticsearch": [[0, 13]], "VULNERABILITY: StackOverflow DoS": [[16, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51787"}} {"text": "glFTPd 2.11a - Remote Denial of Service", "spans": {"SYSTEM: glFTPd 2.11a": [[0, 12]], "VULNERABILITY: Denial of Service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49773"}} {"text": "Hasura GraphQL 1.3.3 - Denial of Service", "spans": {"SYSTEM: Hasura GraphQL 1.3.3": [[0, 20]], "VULNERABILITY: Denial of Service": [[23, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49789"}} {"text": "iOS/macOS - Out-of-Bounds Timestamp Write in IOAccelCommandQueue2::processSegmentKernelCommand()", "spans": {"SYSTEM: iOS/macOS": [[0, 9]]}, "info": {"source": "exploitdb", "exploit_id": "48035"}} {"text": "jQuery UI 1.12.1 - Denial of Service (DoS)", "spans": {"SYSTEM: jQuery UI 1.12.1": [[0, 16]], "VULNERABILITY: Denial of Service (DoS)": [[19, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49489"}} {"text": "KeePass 2.44 - Denial of Service (PoC)", "spans": {"SYSTEM: KeePass 2.44": [[0, 12]], "VULNERABILITY: Denial of Service (PoC)": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "47952"}} {"text": "macOS/iOS ImageIO - Heap Corruption when Processing Malformed TIFF Image", "spans": {"SYSTEM: macOS/iOS ImageIO": [[0, 17]], "VULNERABILITY: Heap Corruption when Processing Malformed TIFF Image": [[20, 72]]}, "info": {"source": "exploitdb", "exploit_id": "47970"}} {"text": "Nxlog Community Edition 2.10.2150 - DoS (Poc)", "spans": {"SYSTEM: Nxlog Community Edition 2.10.2150": [[0, 33]], "VULNERABILITY: DoS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49283"}} {"text": "OpenPLC WebServer 3 - Denial of Service", "spans": {"SYSTEM: OpenPLC WebServer 3": [[0, 19]], "VULNERABILITY: Denial of Service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51746"}} {"text": "ProFTPD 1.3.7a - Remote Denial of Service", "spans": {"SYSTEM: ProFTPD 1.3.7a": [[0, 14]], "VULNERABILITY: Denial of Service": [[24, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49697"}} {"text": "Pure-FTPd 1.0.48 - Remote Denial of Service", "spans": {"SYSTEM: Pure-FTPd 1.0.48": [[0, 16]], "VULNERABILITY: Denial of Service": [[26, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49105"}} {"text": "Tautulli 2.1.9 - Denial of Service (Metasploit)", "spans": {"SYSTEM: Tautulli 2.1.9": [[0, 14]], "VULNERABILITY: Denial of Service": [[17, 34]], "TOOL: Metasploit": [[36, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47929"}} {"text": "Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'DoS'", "spans": {"SYSTEM: Wyrestorm Apollo VX20 < 1.3.58": [[0, 31]], "VULNERABILITY: Incorrect Access Control 'DoS'": [[34, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51815"}} {"text": "Xlight FTP 1.1 - Denial Of Service (DOS)", "spans": {"SYSTEM: Xlight FTP 1.1": [[0, 14]], "VULNERABILITY: Denial Of Service": [[17, 34]]}, "info": {"source": "exploitdb", "exploit_id": "52382"}} {"text": "ABB Cylon Aspect 3.07.02 (userManagement.php) - Weak Password Policy", "spans": {"SYSTEM: ABB Cylon Aspect 3.07.02 (userManagement.php)": [[0, 45]], "VULNERABILITY: Weak Password Policy": [[48, 68]]}, "info": {"source": "exploitdb", "exploit_id": "52221"}} {"text": "ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (bbmdUpdate.php)": [[0, 41]], "VULNERABILITY: Remote Code Execution": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "52217"}} {"text": "ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) - Stored Cross-Site Scripting", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php)": [[0, 50]], "VULNERABILITY: Stored Cross-Site Scripting": [[53, 80]]}, "info": {"source": "exploitdb", "exploit_id": "52214"}} {"text": "ABB Cylon Aspect 3.08.02 (licenseUpload.php) - Stored Cross-Site Scripting", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (licenseUpload.php)": [[0, 44]], "VULNERABILITY: Stored Cross-Site Scripting": [[47, 74]]}, "info": {"source": "exploitdb", "exploit_id": "52215"}} {"text": "ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (uploadDb.php)": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52216"}} {"text": "ABB Cylon Aspect 3.08.02 - Cookie User Password Disclosure", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02": [[0, 24]], "VULNERABILITY: Password Disclosure": [[39, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52224"}} {"text": "ABB Cylon Aspect 3.08.02 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02": [[0, 24]], "VULNERABILITY: CSRF": [[55, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52231"}} {"text": "ABB Cylon Aspect 3.08.02 - PHP Session Fixation", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02": [[0, 24]], "VULNERABILITY: PHP Session Fixation": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52182"}} {"text": "ABB Cylon Aspect 3.08.03 (CookieDB) - SQL Injection", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.03 (CookieDB)": [[0, 35]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52220"}} {"text": "ABB Cylon FLXeon 9.3.4 - Cross-Site Request Forgery", "spans": {"SYSTEM: ABB Cylon FLXeon 9.3.4": [[0, 22]], "VULNERABILITY: Cross-Site Request Forgery": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52180"}} {"text": "ABB Cylon FLXeon 9.3.4 - Default Credentials", "spans": {"SYSTEM: ABB Cylon FLXeon 9.3.4": [[0, 22]], "VULNERABILITY: Default Credentials": [[25, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52179"}} {"text": "ABB Cylon FLXeon 9.3.4 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: ABB Cylon FLXeon 9.3.4": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52188"}} {"text": "ABB Cylon FLXeon 9.3.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: ABB Cylon FLXeon 9.3.4": [[0, 22]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "52186"}} {"text": "ABB Cylon FLXeon 9.3.4 - System Logs Information Disclosure", "spans": {"SYSTEM: ABB Cylon FLXeon 9.3.4": [[0, 22]], "VULNERABILITY: Information Disclosure": [[37, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52178"}} {"text": "ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning", "spans": {"SYSTEM: ABB Cylon FLXeon 9.3.4": [[0, 22]], "VULNERABILITY: WebSocket Command Spawning": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52184"}} {"text": "Cosy+ firmware 21.2s7 - Command Injection", "spans": {"SYSTEM: Cosy+ firmware 21.2s7": [[0, 21]], "VULNERABILITY: Command Injection": [[24, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52160"}} {"text": "D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)", "spans": {"SYSTEM: D-Link DIR-825 Rev.B 2.10": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[34, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52469"}} {"text": "Netman 204 - Remote command without authentication", "spans": {"SYSTEM: Netman 204": [[0, 10]], "VULNERABILITY: Remote command without authentication": [[13, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52183"}} {"text": "TOTOLINK N300RB 8.54 - Command Execution", "spans": {"SYSTEM: TOTOLINK N300RB 8.54": [[0, 20]], "VULNERABILITY: Command Execution": [[23, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52363"}} {"text": "ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass", "spans": {"SYSTEM: ZTE ZXHN H168N 3.1": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52191"}} {"text": "7-Zip 24.00 - Directory Traversal", "spans": {"SYSTEM: 7-Zip 24.00": [[0, 11]], "VULNERABILITY: Directory Traversal": [[14, 33]]}, "info": {"source": "exploitdb", "exploit_id": "52501"}} {"text": "A-PDF All to MP3 Converter 2.0.0 - DEP Bypass via HeapCreate + HeapAlloc", "spans": {"SYSTEM: A-PDF All to MP3 Converter 2.0.0": [[0, 32]], "VULNERABILITY: DEP Bypass via HeapCreate + HeapAlloc": [[35, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51849"}} {"text": "ABB Cylon Aspect Studio 3.08.03 - Binary Planting", "spans": {"SYSTEM: ABB Cylon Aspect Studio 3.08.03": [[0, 31]], "VULNERABILITY: Binary Planting": [[34, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52306"}} {"text": "Blink1Control2 2.2.7 - Weak Password Encryption", "spans": {"SYSTEM: Blink1Control2 2.2.7": [[0, 20]], "VULNERABILITY: Weak Password Encryption": [[23, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51014"}} {"text": "Chromium 83 - Full CSP Bypass", "spans": {"SYSTEM: Chromium 83": [[0, 11]], "VULNERABILITY: Full CSP Bypass": [[14, 29]]}, "info": {"source": "exploitdb", "exploit_id": "49195"}} {"text": "Codigo Markdown Editor v1.0.1 (Electron) - Remote Code Execution", "spans": {"SYSTEM: Codigo Markdown Editor v1.0.1 (Electron)": [[0, 40]], "VULNERABILITY: Remote Code Execution": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51432"}} {"text": "Counter Strike: GO - '.bsp' Memory Control (PoC)", "spans": {"SYSTEM: Counter Strike: GO": [[0, 18]], "VULNERABILITY: Memory Control": [[28, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48187"}} {"text": "Daikin Security Gateway 14 - Remote Password Reset", "spans": {"SYSTEM: Daikin Security Gateway 14": [[0, 27]], "VULNERABILITY: Remote Password Reset": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52278"}} {"text": "Docker Desktop 4.44.3 - Unauthenticated API Exposure", "spans": {"SYSTEM: Docker Desktop 4.44.3": [[0, 21]], "VULNERABILITY: Unauthenticated API Exposure": [[24, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52472"}} {"text": "Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution", "spans": {"SYSTEM: Gin Markdown Editor v0.7.4 (Electron)": [[0, 37]], "VULNERABILITY: Arbitrary Code Execution": [[40, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51469"}} {"text": "ImageMagick 7.1.0-49 - Arbitrary File Read", "spans": {"SYSTEM: ImageMagick 7.1.0-49": [[0, 20]], "VULNERABILITY: Arbitrary File Read": [[23, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51261"}} {"text": "is-localhost-ip 2.0.0 - SSRF", "spans": {"SYSTEM: is-localhost-ip 2.0.0": [[0, 21]], "VULNERABILITY: SSRF": [[24, 28]]}, "info": {"source": "exploitdb", "exploit_id": "52496"}} {"text": "Keeper Security desktop 16.10.2 & Browser Extension 16.5.4 - Password Dumping", "spans": {"SYSTEM: Keeper Security desktop 16.10.2 & Browser Extension 16.5.4": [[0, 58]], "VULNERABILITY: Password Dumping": [[61, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51623"}} {"text": "Lucee Scheduled Job v1.0 - Command Execution", "spans": {"SYSTEM: Lucee Scheduled Job v1.0": [[0, 24]], "VULNERABILITY: Command Execution": [[28, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51333"}} {"text": "Mbed TLS 3.6.4 - Use-After-Free", "spans": {"SYSTEM: Mbed TLS 3.6.4": [[0, 14]], "VULNERABILITY: Use-After-Free": [[17, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52427"}} {"text": "Metasploit Framework 6.0.11 - msfvenom APK template command injection", "spans": {"SYSTEM: Metasploit Framework 6.0.11": [[0, 27]], "VULNERABILITY: msfvenom APK template command injection": [[30, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49491"}} {"text": "Microsoft Defender for Endpoint (MDE) - Elevation of Privilege", "spans": {"SYSTEM: Microsoft Defender for Endpoint (MDE)": [[0, 37]], "VULNERABILITY: Elevation of Privilege": [[40, 62]]}, "info": {"source": "exploitdb", "exploit_id": "52355"}} {"text": "Microsoft Edge (Chromium-based) Webview2 1.0.1661.34 - Spoofing", "spans": {"SYSTEM: Microsoft Edge (Chromium-based) Webview2 1.0.1661.34": [[0, 52]], "VULNERABILITY: Spoofing": [[55, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51359"}} {"text": "Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure", "spans": {"SYSTEM: Microsoft Edge 114.0.1823.67 (64-bit)": [[0, 37]], "VULNERABILITY: Information Disclosure": [[40, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51571"}} {"text": "Microsoft VSCode Python Extension - Code Execution", "spans": {"SYSTEM: Microsoft VSCode Python Extension": [[0, 33]], "VULNERABILITY: Code Execution": [[36, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48231"}} {"text": "NetBT e-Fatura - Privilege Escalation", "spans": {"SYSTEM: NetBT e-Fatura": [[0, 14]], "VULNERABILITY: Privilege Escalation": [[17, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52509"}} {"text": "ollama 0.6.4 - Server Side Request Forgery (SSRF)", "spans": {"SYSTEM: ollama 0.6.4": [[0, 12]], "VULNERABILITY: Server Side Request Forgery": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52116"}} {"text": "Parrot and DJI variants Drone OSes - Kernel Panic Exploit", "spans": {"SYSTEM: Parrot and DJI variants Drone OSes": [[0, 34]], "VULNERABILITY: Kernel Panic Exploit": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52329"}} {"text": "PrusaSlicer 2.6.1 - Arbitrary code execution", "spans": {"SYSTEM: PrusaSlicer 2.6.1": [[0, 17]], "VULNERABILITY: Arbitrary code execution": [[20, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51983"}} {"text": "qBittorrent 5.0.1 - MITM RCE", "spans": {"SYSTEM: qBittorrent 5.0.1": [[0, 17]], "VULNERABILITY: RCE": [[25, 28]]}, "info": {"source": "exploitdb", "exploit_id": "52190"}} {"text": "RDPGuard 9.9.9 - Privilege Escalation", "spans": {"SYSTEM: RDPGuard 9.9.9": [[0, 14]], "VULNERABILITY: Privilege Escalation": [[17, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52289"}} {"text": "SAP Lumira 1.31 - Stored Cross-Site Scripting", "spans": {"SYSTEM: SAP Lumira 1.31": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49108"}} {"text": "sleuthkit 4.11.1 - Command Injection", "spans": {"SYSTEM: sleuthkit 4.11.1": [[0, 16]], "VULNERABILITY: Command Injection": [[19, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51225"}} {"text": "SmartFoxServer 2X 2.17.0 - Credentials Disclosure", "spans": {"SYSTEM: SmartFoxServer 2X 2.17.0": [[0, 24]], "VULNERABILITY: Credentials Disclosure": [[27, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49527"}} {"text": "SmartFoxServer 2X 2.17.0 - God Mode Console Remote Code Execution", "spans": {"SYSTEM: SmartFoxServer 2X 2.17.0": [[0, 24]], "VULNERABILITY: Remote Code Execution": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49526"}} {"text": "Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (1)", "spans": {"SYSTEM: Sudo 1.9.5p1": [[0, 12]], "VULNERABILITY: Privilege Escalation": [[59, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49521"}} {"text": "Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (2)", "spans": {"SYSTEM: Sudo 1.9.5p1": [[0, 12]], "VULNERABILITY: Privilege Escalation": [[59, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49522"}} {"text": "Tibco ObfuscationEngine 5.11 - Fixed Key Password Decryption", "spans": {"SYSTEM: Tibco ObfuscationEngine 5.11": [[0, 28]], "VULNERABILITY: Fixed Key Password Decryption": [[31, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49221"}} {"text": "TightVNC 2.8.83 - Control Pipe Manipulation", "spans": {"SYSTEM: TightVNC 2.8.83": [[0, 15]], "VULNERABILITY: Control Pipe Manipulation": [[18, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52322"}} {"text": "TP-Link VN020 F3v(T) TT_V6.2.1021) - DHCP Stack Buffer Overflow", "spans": {"SYSTEM: TP-Link VN020 F3v(T) TT_V6.2.1021)": [[0, 34]], "VULNERABILITY: Buffer Overflow": [[48, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52292"}} {"text": "vm2 - sandbox escape", "spans": {"SYSTEM: vm2": [[0, 3]], "VULNERABILITY: sandbox escape": [[6, 20]]}, "info": {"source": "exploitdb", "exploit_id": "51898"}} {"text": "Yank Note v3.52.1 (Electron) - Arbitrary Code Execution", "spans": {"SYSTEM: Yank Note v3.52.1 (Electron)": [[0, 28]], "VULNERABILITY: Arbitrary Code Execution": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51470"}} {"text": "zlog 1.2.15 - Buffer Overflow", "spans": {"SYSTEM: zlog 1.2.15": [[0, 11]], "VULNERABILITY: Buffer Overflow": [[14, 29]]}, "info": {"source": "exploitdb", "exploit_id": "50504"}} {"text": "ZTE ZXV10 H201L - RCE via authentication bypass", "spans": {"SYSTEM: ZTE ZXV10 H201L": [[0, 15]], "VULNERABILITY: RCE": [[18, 21]]}, "info": {"source": "exploitdb", "exploit_id": "52279"}} {"text": "Zyxel USG FLEX H series uOS 1.31 - Privilege Escalation", "spans": {"SYSTEM: Zyxel USG FLEX H series uOS 1.31": [[0, 32]], "VULNERABILITY: Privilege Escalation": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52293"}} {"text": "ABB Cylon Aspect 3.08.03 - Guest2Root Privilege Escalation", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.03": [[0, 24]], "VULNERABILITY: Privilege Escalation": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52305"}} {"text": "ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.04 DeploySource": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "52317"}} {"text": "Aerospike Database 5.1.0.3 - OS Command Execution", "spans": {"SYSTEM: Aerospike Database 5.1.0.3": [[0, 26]], "VULNERABILITY: OS Command Execution": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49067"}} {"text": "Akka HTTP 10.1.14 - Denial of Service", "spans": {"SYSTEM: Akka HTTP 10.1.14": [[0, 17]], "VULNERABILITY: Denial of Service": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50892"}} {"text": "Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Angular-Base64-Upload Library 0.1.20": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "52121"}} {"text": "Apache ActiveMQ 6.1.6 - Denial of Service (DOS)", "spans": {"SYSTEM: Apache ActiveMQ 6.1.6": [[0, 21]], "VULNERABILITY: Denial of Service": [[24, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52288"}} {"text": "Apache APISIX 2.12.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Apache APISIX 2.12.1": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50829"}} {"text": "Apache Shiro 1.2.4 - Cookie RememberME Deserial RCE (Metasploit)", "spans": {"SYSTEM: Apache Shiro 1.2.4": [[0, 18]], "VULNERABILITY: RCE": [[48, 51]], "TOOL: Metasploit": [[53, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48410"}} {"text": "Apache Solr - Remote Code Execution via Velocity Template (Metasploit)", "spans": {"SYSTEM: Apache Solr": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]], "TOOL: Metasploit": [[59, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48338"}} {"text": "Apache Struts 2.5.20 - Double OGNL evaluation", "spans": {"SYSTEM: Apache Struts 2.5.20": [[0, 20]], "VULNERABILITY: Double OGNL evaluation": [[23, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49068"}} {"text": "Apache Tomcat 10.1.39 - Denial of Service (DoS)", "spans": {"SYSTEM: Apache Tomcat 10.1.39": [[0, 21]], "VULNERABILITY: Denial of Service (DoS)": [[24, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52318"}} {"text": "Asterisk AMI - Partial File Content & Path Disclosure (Authenticated)", "spans": {"SYSTEM: Asterisk AMI": [[0, 12]], "VULNERABILITY: Partial File Content & Path Disclosure": [[15, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51927"}} {"text": "Automic Agent 24.3.0 HF4 - Privilege Escalation", "spans": {"SYSTEM: Automic Agent 24.3.0 HF4": [[0, 24]], "VULNERABILITY: Privilege Escalation": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52309"}} {"text": "Azure Apache Ambari 2302250400 - Spoofing", "spans": {"SYSTEM: Azure Apache Ambari 2302250400": [[0, 30]], "VULNERABILITY: Spoofing": [[33, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51546"}} {"text": "Belkin F9K1009 F9K1010 2.00.04/2.00.09 - Hard Coded Credentials", "spans": {"SYSTEM: Belkin F9K1009 F9K1010 2.00.04/2.00.09": [[0, 38]], "VULNERABILITY: Hard Coded Credentials": [[41, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52407"}} {"text": "Broadcom Wi-Fi Devices - 'KR00K Information Disclosure", "spans": {"SYSTEM: Broadcom Wi-Fi Devices": [[0, 22]], "VULNERABILITY: Information Disclosure": [[32, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48233"}} {"text": "Cisco ISE 3.0 - Authorization Bypass", "spans": {"SYSTEM: Cisco ISE 3.0": [[0, 13]], "VULNERABILITY: Authorization Bypass": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52397"}} {"text": "Cisco ISE 3.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Cisco ISE 3.0": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52396"}} {"text": "Citrix NetScaler ADC/Gateway 14.1 - Memory Disclosure", "spans": {"SYSTEM: Citrix NetScaler ADC/Gateway 14.1": [[0, 33]], "VULNERABILITY: Memory Disclosure": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52401"}} {"text": "ClipBucket 5.5.0 - Arbitrary File Upload", "spans": {"SYSTEM: ClipBucket 5.5.0": [[0, 16]], "VULNERABILITY: Arbitrary File Upload": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52435"}} {"text": "ClipBucket 5.5.2 Build #90 - Server-Side Request Forgery (SSRF)", "spans": {"SYSTEM: ClipBucket 5.5.2 Build #90": [[0, 26]], "VULNERABILITY: Server-Side Request Forgery (SSRF)": [[29, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52434"}} {"text": "ConnectWise Control 19.2.24707 - Username Enumeration", "spans": {"SYSTEM: ConnectWise Control 19.2.24707": [[0, 30]], "VULNERABILITY: Username Enumeration": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50618"}} {"text": "CrushFTP 11.3.1 - Authentication Bypass", "spans": {"SYSTEM: CrushFTP 11.3.1": [[0, 15]], "VULNERABILITY: Authentication Bypass": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52295"}} {"text": "CrushFTP < 11.1.0 - Directory Traversal", "spans": {"SYSTEM: CrushFTP < 11.1.0": [[0, 17]], "VULNERABILITY: Directory Traversal": [[20, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52012"}} {"text": "CyberArk PSMP 10.9.1 - Policy Restriction Bypass", "spans": {"SYSTEM: CyberArk PSMP 10.9.1": [[0, 20]], "VULNERABILITY: Policy Restriction Bypass": [[23, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48239"}} {"text": "Docker based datastores for IBM Instana 241-2 243-0 - No Authentication", "spans": {"SYSTEM: Docker based datastores for IBM Instana 241-2 243-0": [[0, 51]], "VULNERABILITY: No Authentication": [[54, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51314"}} {"text": "Erlang Cookie - Remote Code Execution", "spans": {"SYSTEM: Erlang Cookie": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49418"}} {"text": "Executables Created with perl2exe < V30.10C - Arbitrary Code Execution", "spans": {"SYSTEM: Executables Created with perl2exe < V30.10C": [[0, 43]], "VULNERABILITY: Arbitrary Code Execution": [[46, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51825"}} {"text": "EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)", "spans": {"SYSTEM: EyesOfNetwork": [[0, 13]], "VULNERABILITY: AutoDiscovery Target Command Execution": [[16, 54]], "TOOL: Metasploit": [[56, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48169"}} {"text": "F5 BIG-IP 16.0.x - Remote Code Execution (RCE)", "spans": {"SYSTEM: F5 BIG-IP 16.0.x": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50932"}} {"text": "Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution", "spans": {"SYSTEM: Firefox ESR 115.11": [[0, 18]], "VULNERABILITY: PDF.js Arbitrary JavaScript execution": [[21, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52273"}} {"text": "Flexense HTTP Server 10.6.24 - Buffer Overflow (DoS) (Metasploit)", "spans": {"SYSTEM: Flexense HTTP Server 10.6.24": [[0, 28]], "VULNERABILITY: Buffer Overflow": [[31, 46]], "TOOL: Metasploit": [[54, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51493"}} {"text": "FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse", "spans": {"SYSTEM: FortiOS SSL-VPN 7.4.4": [[0, 21]], "VULNERABILITY: Insufficient Session Expiration & Cookie Reuse": [[24, 70]]}, "info": {"source": "exploitdb", "exploit_id": "52336"}} {"text": "Fortra GoAnywhere MFT 7.4.1 - Authentication Bypass", "spans": {"SYSTEM: Fortra GoAnywhere MFT 7.4.1": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52308"}} {"text": "Freefloat FTP Server 1.0 - Remote Buffer Overflow", "spans": {"SYSTEM: Freefloat FTP Server 1.0": [[0, 24]], "VULNERABILITY: Remote Buffer Overflow": [[27, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52323"}} {"text": "GestioIP 3.5.7 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: GestioIP 3.5.7": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52200"}} {"text": "GestioIP 3.5.7 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: GestioIP 3.5.7": [[0, 14]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[17, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52203"}} {"text": "GestioIP 3.5.7 - Reflected Cross-Site Scripting (Reflected XSS)", "spans": {"SYSTEM: GestioIP 3.5.7": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting": [[17, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52202"}} {"text": "GestioIP 3.5.7 - Remote Command Execution (RCE)", "spans": {"SYSTEM: GestioIP 3.5.7": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52204"}} {"text": "GestioIP 3.5.7 - Stored Cross-Site Scripting (Stored XSS)", "spans": {"SYSTEM: GestioIP 3.5.7": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52201"}} {"text": "gogs 0.13.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: gogs 0.13.0": [[0, 11]], "VULNERABILITY: Remote Code Execution (RCE)": [[14, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52348"}} {"text": "Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit)", "spans": {"SYSTEM: Google Chrome 67_ 68 and 69": [[0, 27]], "VULNERABILITY: Type Confusion": [[44, 58]], "TOOL: Metasploit": [[60, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48184"}} {"text": "Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)", "spans": {"SYSTEM: Google Chrome 72 and 73": [[0, 23]], "VULNERABILITY: Out-of-Bounds Write": [[36, 55]], "TOOL: Metasploit": [[57, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48183"}} {"text": "Google Chrome 78.0.3904.70 - Remote Code Execution", "spans": {"SYSTEM: Google Chrome 78.0.3904.70": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50917"}} {"text": "Google Chrome 80 - JSCreate Side-effect Type Confusion (Metasploit)", "spans": {"SYSTEM: Google Chrome 80": [[0, 16]], "VULNERABILITY: Type Confusion": [[40, 54]], "TOOL: Metasploit": [[56, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48186"}} {"text": "Google Chrome 81.0.4044 V8 - Remote Code Execution", "spans": {"SYSTEM: Google Chrome 81.0.4044 V8": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49746"}} {"text": "Google Chrome 86.0.4240 V8 - Remote Code Execution", "spans": {"SYSTEM: Google Chrome 86.0.4240 V8": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49745"}} {"text": "Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow", "spans": {"SYSTEM: Grandstream GSD3710 1.0.11.13": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52303"}} {"text": "Grandstream GSD3710 1.0.11.13 - Stack Overflow", "spans": {"SYSTEM: Grandstream GSD3710 1.0.11.13": [[0, 29]], "VULNERABILITY: Stack Overflow": [[32, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52313"}} {"text": "Hashicorp Consul v1.0 - Remote Command Execution (RCE)", "spans": {"SYSTEM: Hashicorp Consul v1.0": [[0, 21]], "VULNERABILITY: Remote Command Execution": [[24, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51117"}} {"text": "HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC)", "spans": {"SYSTEM: HFS Http File Server 2.3m Build 300": [[0, 35]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48569"}} {"text": "HP LinuxKI 6.01 - Remote Command Injection", "spans": {"SYSTEM: HP LinuxKI 6.01": [[0, 15]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48483"}} {"text": "HTMLDOC 1.9.13 - Stack Buffer Overflow", "spans": {"SYSTEM: HTMLDOC 1.9.13": [[0, 14]], "VULNERABILITY: Buffer Overflow": [[23, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52425"}} {"text": "HTTP/2 2.0 - Denial Of Service (DOS)", "spans": {"SYSTEM: HTTP/2 2.0": [[0, 10]], "VULNERABILITY: Denial Of Service": [[13, 30]]}, "info": {"source": "exploitdb", "exploit_id": "52426"}} {"text": "IBM Aspera Faspex 4.4.1 - YAML deserialization (RCE)", "spans": {"SYSTEM: IBM Aspera Faspex 4.4.1": [[0, 23]], "VULNERABILITY: RCE": [[48, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51316"}} {"text": "IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: IBM TM1 / Planning Analytics": [[0, 28]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[31, 68]], "TOOL: Metasploit": [[70, 80]]}, "info": {"source": "exploitdb", "exploit_id": "48273"}} {"text": "InfluxDB OSS 2.7.11 - Operator Token Privilege Escalation", "spans": {"SYSTEM: InfluxDB OSS 2.7.11": [[0, 19]], "VULNERABILITY: Privilege Escalation": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52142"}} {"text": "Ingress-NGINX 4.11.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Ingress-NGINX 4.11.0": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52338"}} {"text": "Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE", "spans": {"SYSTEM: Ingress-NGINX Admission Controller v1.11.1": [[0, 42]], "VULNERABILITY: RCE": [[61, 64]]}, "info": {"source": "exploitdb", "exploit_id": "52475"}} {"text": "Invision Community 5.0.6 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Invision Community 5.0.6": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[27, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52294"}} {"text": "Ivanti Connect Secure 22.7R2.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Ivanti Connect Secure 22.7R2.5": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52213"}} {"text": "Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Ivanti Endpoint Manager 4.6": [[0, 27]], "VULNERABILITY: Remote Code Execution (RCE)": [[30, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50833"}} {"text": "Ivanti Endpoint Manager Mobile 12.5.0.0 - Authentication Bypass", "spans": {"SYSTEM: Ivanti Endpoint Manager Mobile 12.5.0.0": [[0, 39]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52421"}} {"text": "K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS)", "spans": {"SYSTEM: K7 Ultimate Security K7RKScan.sys 17.0.2019": [[0, 43]], "VULNERABILITY: Denial Of Service": [[46, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52158"}} {"text": "Ksix Zigbee Devices - Playback Protection Bypass (PoC)", "spans": {"SYSTEM: Ksix Zigbee Devices": [[0, 19]], "VULNERABILITY: Playback Protection Bypass": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49169"}} {"text": "Langflow 1.3.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Langflow 1.3.0": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52262"}} {"text": "ManageEngine Desktop Central - Java Deserialization (Metasploit)", "spans": {"SYSTEM: ManageEngine Desktop Central": [[0, 28]], "VULNERABILITY: Java Deserialization": [[31, 51]], "TOOL: Metasploit": [[53, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48224"}} {"text": "McAfee Agent 5.7.6 - Insecure Storage of Sensitive Information", "spans": {"SYSTEM: McAfee Agent 5.7.6": [[0, 18]], "VULNERABILITY: Insecure Storage of Sensitive Information": [[21, 62]]}, "info": {"source": "exploitdb", "exploit_id": "52345"}} {"text": "Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE)", "spans": {"SYSTEM: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit": [[0, 62]], "VULNERABILITY: Remote Code Execution (RCE)": [[65, 92]]}, "info": {"source": "exploitdb", "exploit_id": "51555"}} {"text": "Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE)", "spans": {"SYSTEM: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit": [[0, 62]], "VULNERABILITY: Remote Code Execution (RCE)": [[65, 92]]}, "info": {"source": "exploitdb", "exploit_id": "51552"}} {"text": "Microsoft Excel 365 MSO (Version 2302 Build 16.0.16130.20186) 64-bit - Remote Code Execution (RCE)", "spans": {"SYSTEM: Microsoft Excel 365 MSO (Version 2302 Build 16.0.16130.20186) 64-bit": [[0, 68]], "VULNERABILITY: Remote Code Execution (RCE)": [[71, 98]]}, "info": {"source": "exploitdb", "exploit_id": "51328"}} {"text": "Microsoft Office 365 Version 18.2305.1222.0 - Elevation of Privilege + RCE.", "spans": {"SYSTEM: Microsoft Office 365 Version 18.2305.1222.0": [[0, 43]], "VULNERABILITY: RCE": [[71, 74]]}, "info": {"source": "exploitdb", "exploit_id": "51609"}} {"text": "Microsoft OneNote (Version 2305 Build 16.0.16501.20074) 64-bit - Spoofing", "spans": {"SYSTEM: Microsoft OneNote (Version 2305 Build 16.0.16501.20074) 64-bit": [[0, 62]], "VULNERABILITY: Spoofing": [[65, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51538"}} {"text": "Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit - Remote Code Execution", "spans": {"SYSTEM: Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit": [[0, 80]], "VULNERABILITY: Remote Code Execution": [[83, 104]]}, "info": {"source": "exploitdb", "exploit_id": "51574"}} {"text": "Microsoft Word 16.72.23040900 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Microsoft Word 16.72.23040900": [[0, 29]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51376"}} {"text": "MikroTik RouterOS 7.19.1 - Reflected XSS", "spans": {"SYSTEM: MikroTik RouterOS 7.19.1": [[0, 24]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52366"}} {"text": "Nginx 1.20.0 - Denial of Service (DOS)", "spans": {"SYSTEM: Nginx 1.20.0": [[0, 12]], "VULNERABILITY: Denial of Service": [[15, 32]]}, "info": {"source": "exploitdb", "exploit_id": "50973"}} {"text": "nostromo 1.9.6 - Remote Code Execution", "spans": {"SYSTEM: nostromo 1.9.6": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "47837"}} {"text": "Opmon 9.11 - Cross-site Scripting", "spans": {"SYSTEM: Opmon 9.11": [[0, 10]], "VULNERABILITY: Cross-site Scripting": [[13, 33]]}, "info": {"source": "exploitdb", "exploit_id": "50857"}} {"text": "PAN-OS 10.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: PAN-OS 10.0": [[0, 11]], "VULNERABILITY: Remote Code Execution (RCE)": [[14, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51005"}} {"text": "PostgreSQL 9.3-11.7 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: PostgreSQL 9.3-11.7": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50847"}} {"text": "PostgreSQL 9.6.1 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: PostgreSQL 9.6.1": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51247"}} {"text": "PX4 Military UAV Autopilot 1.12.3 - Denial of Service (DoS)", "spans": {"SYSTEM: PX4 Military UAV Autopilot 1.12.3": [[0, 33]], "VULNERABILITY: Denial of Service (DoS)": [[36, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52339"}} {"text": "python jsonpickle 2.0.0 - Remote Code Execution", "spans": {"SYSTEM: python jsonpickle 2.0.0": [[0, 23]], "VULNERABILITY: Remote Code Execution": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49585"}} {"text": "Qmail SMTP 1.03 - Bash Environment Variable Injection", "spans": {"SYSTEM: Qmail SMTP 1.03": [[0, 15]], "VULNERABILITY: Bash Environment Variable Injection": [[18, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48651"}} {"text": "Saltstack 3000.1 - Remote Code Execution", "spans": {"SYSTEM: Saltstack 3000.1": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48421"}} {"text": "SAP BusinessObjects Intelligence 4.3 - XML External Entity (XXE)", "spans": {"SYSTEM: SAP BusinessObjects Intelligence 4.3": [[0, 36]], "VULNERABILITY: XXE": [[60, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50900"}} {"text": "SAP NetWeaver - 7.53 - HTTP Request Smuggling", "spans": {"SYSTEM: SAP NetWeaver": [[0, 13]], "VULNERABILITY: 7.53 - HTTP Request Smuggling": [[16, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52109"}} {"text": "ScriptCase 9.12.006 (23) - Remote Command Execution (RCE)", "spans": {"SYSTEM: ScriptCase 9.12.006 (23)": [[0, 24]], "VULNERABILITY: Remote Command Execution": [[27, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52353"}} {"text": "SolarWinds Serv-U 15.4.2 HF1 - Directory Traversal", "spans": {"SYSTEM: SolarWinds Serv-U 15.4.2 HF1": [[0, 28]], "VULNERABILITY: Directory Traversal": [[31, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52311"}} {"text": "Sony XAV-AX5500 1.13 - Firmware Update Validation Remote Code Execution (RCE)", "spans": {"SYSTEM: Sony XAV-AX5500 1.13": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[50, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52143"}} {"text": "SOS JobScheduler 1.13.3 - Stored Password Decryption", "spans": {"SYSTEM: SOS JobScheduler 1.13.3": [[0, 23]], "VULNERABILITY: Stored Password Decryption": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48587"}} {"text": "Sourcegraph Gitserver 3.36.3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Sourcegraph Gitserver 3.36.3": [[0, 28]], "VULNERABILITY: Remote Code Execution (RCE)": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50964"}} {"text": "Swagger UI 1.0.3 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Swagger UI 1.0.3": [[0, 16]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52392"}} {"text": "Tdarr 2.00.15 - Command Injection", "spans": {"SYSTEM: Tdarr 2.00.15": [[0, 13]], "VULNERABILITY: Command Injection": [[16, 33]]}, "info": {"source": "exploitdb", "exploit_id": "50822"}} {"text": "Teleport v10.1.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Teleport v10.1.1": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51019"}} {"text": "Tenda AC20 16.03.08.12 - Command Injection", "spans": {"SYSTEM: Tenda AC20 16.03.08.12": [[0, 22]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52418"}} {"text": "Tenda FH451 1.0.0.9 Router - Stack-based Buffer Overflow", "spans": {"SYSTEM: Tenda FH451 1.0.0.9 Router": [[0, 26]], "VULNERABILITY: Buffer Overflow": [[41, 56]]}, "info": {"source": "exploitdb", "exploit_id": "52374"}} {"text": "Tigo Energy Cloud Connect Advanced (CCA) 4.0.1 - Command Injection", "spans": {"SYSTEM: Tigo Energy Cloud Connect Advanced (CCA) 4.0.1": [[0, 46]], "VULNERABILITY: Command Injection": [[49, 66]]}, "info": {"source": "exploitdb", "exploit_id": "52404"}} {"text": "TP-Link VN020 F3v(T) TT_V6.2.1021 - Buffer Overflow Memory Corruption", "spans": {"SYSTEM: TP-Link VN020 F3v(T) TT_V6.2.1021": [[0, 33]], "VULNERABILITY: Buffer Overflow": [[36, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52249"}} {"text": "TP-Link VN020 F3v(T) TT_V6.2.1021 - Denial Of Service (DOS)", "spans": {"SYSTEM: TP-Link VN020 F3v(T) TT_V6.2.1021": [[0, 33]], "VULNERABILITY: Denial Of Service": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52250"}} {"text": "Vite 6.2.2 - Arbitrary File Read", "spans": {"SYSTEM: Vite 6.2.2": [[0, 10]], "VULNERABILITY: Arbitrary File Read": [[13, 32]]}, "info": {"source": "exploitdb", "exploit_id": "52111"}} {"text": "VMware Cloud Director 10.5 - Bypass identity verification", "spans": {"SYSTEM: VMware Cloud Director 10.5": [[0, 26]], "VULNERABILITY: Bypass identity verification": [[29, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51882"}} {"text": "vsftpd 3.0.3 - Remote Denial of Service", "spans": {"SYSTEM: vsftpd 3.0.3": [[0, 12]], "VULNERABILITY: Denial of Service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49719"}} {"text": "WebLogic Server - Deserialization RCE - BadAttributeValueExpException (Metasploit)", "spans": {"SYSTEM: WebLogic Server": [[0, 15]], "VULNERABILITY: RCE": [[34, 37]], "TOOL: Metasploit": [[71, 81]]}, "info": {"source": "exploitdb", "exploit_id": "48508"}} {"text": "Wing FTP Server 7.4.3 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: Wing FTP Server 7.4.3": [[0, 21]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[24, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52347"}} {"text": "Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration", "spans": {"SYSTEM: Wyrestorm Apollo VX20 < 1.3.58": [[0, 30]], "VULNERABILITY: Account Enumeration": [[33, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51814"}} {"text": "Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'Credentials Disclosure'", "spans": {"SYSTEM: Wyrestorm Apollo VX20 < 1.3.58": [[0, 30]], "VULNERABILITY: Incorrect Access Control 'Credentials Disclosure'": [[33, 82]]}, "info": {"source": "exploitdb", "exploit_id": "51816"}} {"text": "X-Skipper-Proxy v0.13.237 - Server Side Request Forgery (SSRF)", "spans": {"SYSTEM: X-Skipper-Proxy v0.13.237": [[0, 25]], "VULNERABILITY: Server Side Request Forgery": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51111"}} {"text": "ABB Cylon Aspect 3.07.02 - File Disclosure", "spans": {"SYSTEM: ABB Cylon Aspect 3.07.02": [[0, 24]], "VULNERABILITY: File Disclosure": [[27, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52115"}} {"text": "ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE)", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.01": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[27, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52107"}} {"text": "ABB Cylon Aspect 3.08.03 (MapServicesHandler) - Authenticated Reflected XSS", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.03 (MapServicesHandler)": [[0, 45]], "VULNERABILITY: XSS": [[72, 75]]}, "info": {"source": "exploitdb", "exploit_id": "52222"}} {"text": "ABB Cylon Aspect 3.08.03 - Hard-coded Secrets", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.03": [[0, 24]], "VULNERABILITY: Hard-coded Secrets": [[27, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52223"}} {"text": "Academy-LMS 4.3 - Stored XSS", "spans": {"SYSTEM: Academy-LMS 4.3": [[0, 15]], "VULNERABILITY: XSS": [[25, 28]]}, "info": {"source": "exploitdb", "exploit_id": "49298"}} {"text": "Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR)", "spans": {"SYSTEM: Accela Civic Platform 21.1": [[0, 26]], "VULNERABILITY: Insecure Direct Object Reference": [[48, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49991"}} {"text": "Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS)", "spans": {"SYSTEM: Accela Civic Platform 21.1": [[0, 26]], "VULNERABILITY: XSS": [[66, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49980"}} {"text": "Accela Civic Platform 21.1 - 'successURL' Cross-Site-Scripting (XSS)", "spans": {"SYSTEM: Accela Civic Platform 21.1": [[0, 26]], "VULNERABILITY: XSS": [[64, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49990"}} {"text": "Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF", "spans": {"SYSTEM: Acronis Cyber Backup 12.5 Build 16341": [[0, 37]], "VULNERABILITY: SSRF": [[56, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49113"}} {"text": "Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Active eCommerce CMS 6.5.0": [[0, 26]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[29, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51221"}} {"text": "Adapt Authoring Tool 0.11.3 - Remote Command Execution (RCE)", "spans": {"SYSTEM: Adapt Authoring Tool 0.11.3": [[0, 27]], "VULNERABILITY: Remote Command Execution": [[30, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52208"}} {"text": "Adobe ColdFusion 2023.6 - Remote File Read", "spans": {"SYSTEM: Adobe ColdFusion 2023.6": [[0, 23]], "VULNERABILITY: Remote File Read": [[26, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52387"}} {"text": "Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier - Arbitrary File Read", "spans": {"SYSTEM: Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier": [[0, 70]], "VULNERABILITY: Arbitrary File Read": [[73, 92]]}, "info": {"source": "exploitdb", "exploit_id": "51875"}} {"text": "Adobe Connect 10 - Username Disclosure", "spans": {"SYSTEM: Adobe Connect 10": [[0, 16]], "VULNERABILITY: Username Disclosure": [[19, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49550"}} {"text": "Adobe Connect 11.4.5 - Local File Disclosure", "spans": {"SYSTEM: Adobe Connect 11.4.5": [[0, 20]], "VULNERABILITY: Local File Disclosure": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51327"}} {"text": "Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE)", "spans": {"SYSTEM: Altova MobileTogether Server 7.3": [[0, 32]], "VULNERABILITY: XML External Entity Injection": [[35, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50191"}} {"text": "Anchor CMS 0.12.7 - 'markdown' Stored Cross-Site Scripting", "spans": {"SYSTEM: Anchor CMS 0.12.7": [[0, 17]], "VULNERABILITY: Stored Cross-Site Scripting": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49403"}} {"text": "Anchor CMS 0.12.7 - CSRF (Delete user)", "spans": {"SYSTEM: Anchor CMS 0.12.7": [[0, 17]], "VULNERABILITY: CSRF": [[20, 24]]}, "info": {"source": "exploitdb", "exploit_id": "49451"}} {"text": "Angular-Base64-Upload Library 0.1.21 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: Angular-Base64-Upload Library 0.1.21": [[0, 36]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[39, 76]]}, "info": {"source": "exploitdb", "exploit_id": "52253"}} {"text": "Anote 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Anote 1.0": [[0, 9]], "VULNERABILITY: Persistent Cross-Site Scripting": [[12, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49836"}} {"text": "Antminer Monitor 0.5.0 - Authentication Bypass", "spans": {"SYSTEM: Antminer Monitor 0.5.0": [[0, 22]], "VULNERABILITY: Authentication Bypass": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50267"}} {"text": "Apache 2.4.x - Buffer Overflow", "spans": {"SYSTEM: Apache 2.4.x": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[15, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51193"}} {"text": "Apache Airflow 1.10.10 - 'Example Dag' Remote Code Execution", "spans": {"SYSTEM: Apache Airflow 1.10.10": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49927"}} {"text": "Apache Commons Text 1.10.0 - Remote Code Execution", "spans": {"SYSTEM: Apache Commons Text 1.10.0": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52261"}} {"text": "Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE)", "spans": {"SYSTEM: Apache HTTP Server 2.4.49": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[45, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50383"}} {"text": "Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE)", "spans": {"SYSTEM: Apache HTTP Server 2.4.50": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[45, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50406"}} {"text": "Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (2)", "spans": {"SYSTEM: Apache HTTP Server 2.4.50": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50446"}} {"text": "Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3)", "spans": {"SYSTEM: Apache HTTP Server 2.4.50": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50512"}} {"text": "Apache OpenMeetings 5.0.0 - 'hostname' Denial of Service", "spans": {"SYSTEM: Apache OpenMeetings 5.0.0": [[0, 25]], "VULNERABILITY: Denial of Service": [[39, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49094"}} {"text": "Apache Superset 1.1.0 - Time-Based Account Enumeration", "spans": {"SYSTEM: Apache Superset 1.1.0": [[0, 21]], "VULNERABILITY: Time-Based Account Enumeration": [[24, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50072"}} {"text": "Apache Superset 2.0.0 - Authentication Bypass", "spans": {"SYSTEM: Apache Superset 2.0.0": [[0, 21]], "VULNERABILITY: Authentication Bypass": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51447"}} {"text": "Apache Tomcat - AJP 'Ghostcat File Read/Inclusion", "spans": {"SYSTEM: Apache Tomcat": [[0, 13]], "VULNERABILITY: AJP 'Ghostcat File Read/Inclusion": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48143"}} {"text": "Apache Tomcat - AJP 'Ghostcat' File Read/Inclusion (Metasploit)", "spans": {"SYSTEM: Apache Tomcat": [[0, 13]], "VULNERABILITY: AJP 'Ghostcat' File Read/Inclusion": [[16, 50]], "TOOL: Metasploit": [[52, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49039"}} {"text": "Apache Tomcat 11.0.3 - Remote Code Execution", "spans": {"SYSTEM: Apache Tomcat 11.0.3": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52134"}} {"text": "Apache Tomcat 9.0.0.M1 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Apache Tomcat 9.0.0.M1": [[0, 22]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50119"}} {"text": "Apache Tomcat 9.0.0.M1 - Open Redirect", "spans": {"SYSTEM: Apache Tomcat 9.0.0.M1": [[0, 22]], "VULNERABILITY: Open Redirect": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50118"}} {"text": "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Add Artwork", "spans": {"SYSTEM: Artworks Gallery 1.0": [[0, 20]], "VULNERABILITY: Arbitrary File Upload": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49166"}} {"text": "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile", "spans": {"SYSTEM: Artworks Gallery 1.0": [[0, 20]], "VULNERABILITY: Arbitrary File Upload": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49167"}} {"text": "ASP.net 8.0.10 - Bypass", "spans": {"SYSTEM: ASP.net 8.0.10": [[0, 15]], "VULNERABILITY: Bypass": [[18, 24]]}, "info": {"source": "exploitdb", "exploit_id": "52492"}} {"text": "atjiu pybbs 6.0.0 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: atjiu pybbs 6.0.0": [[0, 17]], "VULNERABILITY: Cross Site Scripting": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52400"}} {"text": "Atlassian Confluence < 8.5.3 - Remote Code Execution", "spans": {"SYSTEM: Atlassian Confluence < 8.5.3": [[0, 28]], "VULNERABILITY: Remote Code Execution": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51904"}} {"text": "Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit)", "spans": {"SYSTEM: Atlassian Confluence Data Center and Server": [[0, 43]], "VULNERABILITY: Authentication Bypass": [[46, 67]], "TOOL: Metasploit": [[69, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51829"}} {"text": "Atlassian Confluence Widget Connector Macro - SSTI", "spans": {"SYSTEM: Atlassian Confluence Widget Connector Macro": [[0, 43]], "VULNERABILITY: SSTI": [[46, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49465"}} {"text": "Atlassian JIRA 8.11.1 - User Enumeration", "spans": {"SYSTEM: Atlassian JIRA 8.11.1": [[0, 21]], "VULNERABILITY: User Enumeration": [[24, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49633"}} {"text": "Atlassian Jira 8.15.0 - Information Disclosure (Username Enumeration)", "spans": {"SYSTEM: Atlassian Jira 8.15.0": [[0, 21]], "VULNERABILITY: Information Disclosure": [[24, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49924"}} {"text": "Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read", "spans": {"SYSTEM: Atlassian Jira Server Data Center 8.16.0": [[0, 40]], "VULNERABILITY: Arbitrary File Read": [[43, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50380"}} {"text": "Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS", "spans": {"SYSTEM: Atlassian Jira Service Desk 4.9.1": [[0, 33]], "VULNERABILITY: XSS": [[64, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49748"}} {"text": "Avantune Genialcloud ProJ 10 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Avantune Genialcloud ProJ 10": [[0, 28]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50955"}} {"text": "Avaya IP Office 11 - Password Disclosure", "spans": {"SYSTEM: Avaya IP Office 11": [[0, 18]], "VULNERABILITY: Password Disclosure": [[21, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48581"}} {"text": "Axigen < 10.3.3.47_ 10.2.3.12 - Reflected XSS", "spans": {"SYSTEM: Axigen < 10.3.3.47_ 10.2.3.12": [[0, 29]], "VULNERABILITY: XSS": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51722"}} {"text": "B-swiss 3 Digital Signage System 3.6.5 - Database Disclosure", "spans": {"SYSTEM: B-swiss 3 Digital Signage System 3.6.5": [[0, 38]], "VULNERABILITY: Database Disclosure": [[42, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48834"}} {"text": "B-swiss 3 Digital Signage System 3.6.5 - Cross-Site Request Forgery (Add Maintenance Admin)", "spans": {"SYSTEM: B-swiss 3 Digital Signage System 3.6.5": [[0, 38]], "VULNERABILITY: Cross-Site Request Forgery": [[41, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48833"}} {"text": "B-swiss 3 Digital Signage System 3.6.5 - Remote Code Execution", "spans": {"SYSTEM: B-swiss 3 Digital Signage System 3.6.5": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48824"}} {"text": "Bagisto 1.3.3 - Client-Side Template Injection", "spans": {"SYSTEM: Bagisto 1.3.3": [[0, 13]], "VULNERABILITY: Client-Side Template Injection": [[16, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50548"}} {"text": "Baixar GLPI Project 9.4.6 - SQLi", "spans": {"SYSTEM: Baixar GLPI Project 9.4.6": [[0, 25]], "VULNERABILITY: SQLi": [[28, 32]]}, "info": {"source": "exploitdb", "exploit_id": "50823"}} {"text": "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting", "spans": {"SYSTEM: Bakeshop Online Ordering System 1.0": [[0, 35]], "VULNERABILITY: Persistent Cross-site scripting": [[46, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49161"}} {"text": "BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated)", "spans": {"SYSTEM: BeyondTrust Remote Support 6.0": [[0, 30]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[33, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50632"}} {"text": "BigAnt Office Messenger 5.6.06 - SQL Injection", "spans": {"SYSTEM: BigAnt Office Messenger 5.6.06": [[0, 30]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52412"}} {"text": "BigBlueButton 2.2.25 - Arbitrary File Disclosure and Server-Side Request Forgery", "spans": {"SYSTEM: BigBlueButton 2.2.25": [[0, 20]], "VULNERABILITY: Server-Side Request Forgery": [[53, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49070"}} {"text": "Bio Star 2.8.2 - Local File Inclusion", "spans": {"SYSTEM: Bio Star 2.8.2": [[0, 14]], "VULNERABILITY: Local File Inclusion": [[17, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48708"}} {"text": "Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure", "spans": {"SYSTEM: Birth Chart Compatibility WordPress Plugin 2.0": [[0, 46]], "VULNERABILITY: Full Path Disclosure": [[49, 69]]}, "info": {"source": "exploitdb", "exploit_id": "52419"}} {"text": "Blitar Tourism 1.0 - Authentication Bypass SQLi", "spans": {"SYSTEM: Blitar Tourism 1.0": [[0, 18]], "VULNERABILITY: Authentication Bypass": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49759"}} {"text": "Blood Bank & Donor Management System 2.4 - CSRF Improper Input Validation", "spans": {"SYSTEM: Blood Bank & Donor Management System 2.4": [[0, 40]], "VULNERABILITY: CSRF": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52256"}} {"text": "Bludit 3.9.2 - Directory Traversal", "spans": {"SYSTEM: Bludit 3.9.2": [[0, 12]], "VULNERABILITY: Directory Traversal": [[15, 34]]}, "info": {"source": "exploitdb", "exploit_id": "48701"}} {"text": "Bookwyrm v0.4.3 - Authentication Bypass", "spans": {"SYSTEM: Bookwyrm v0.4.3": [[0, 15]], "VULNERABILITY: Authentication Bypass": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51013"}} {"text": "Boss Mini v1.4.0 - Local File Inclusion (LFI)", "spans": {"SYSTEM: Boss Mini v1.4.0": [[0, 16]], "VULNERABILITY: Local File Inclusion": [[19, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52482"}} {"text": "Broken Access Control - on NodeBB v3.6.7", "spans": {"SYSTEM: Broken Access Control": [[0, 21]], "VULNERABILITY: on NodeBB v3.6.7": [[24, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51930"}} {"text": "BSA Radar 1.6.7234.24750 - Authenticated Privilege Escalation", "spans": {"SYSTEM: BSA Radar 1.6.7234.24750": [[0, 24]], "VULNERABILITY: Privilege Escalation": [[41, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48649"}} {"text": "BSA Radar 1.6.7234.24750 - Local File Inclusion", "spans": {"SYSTEM: BSA Radar 1.6.7234.24750": [[0, 24]], "VULNERABILITY: Local File Inclusion": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48666"}} {"text": "BSA Radar 1.6.7234.24750 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: BSA Radar 1.6.7234.24750": [[0, 24]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48619"}} {"text": "BTCPay Server v1.7.4 - HTML Injection", "spans": {"SYSTEM: BTCPay Server v1.7.4": [[0, 20]], "VULNERABILITY: HTML Injection": [[23, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51254"}} {"text": "Cabot 0.11.12 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Cabot 0.11.12": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48791"}} {"text": "Cacti 1.2.8 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Cacti 1.2.8": [[0, 11]], "VULNERABILITY: Authenticated Remote Code Execution": [[14, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48144"}} {"text": "Cacti 1.2.8 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Cacti 1.2.8": [[0, 11]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[14, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48145"}} {"text": "Calibre-web 0.6.21 - Stored XSS", "spans": {"SYSTEM: Calibre-web 0.6.21": [[0, 18]], "VULNERABILITY: XSS": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52067"}} {"text": "Campcodes Online Hospital Management System 1.0 - SQL Injection", "spans": {"SYSTEM: Campcodes Online Hospital Management System 1.0": [[0, 47]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52312"}} {"text": "Casdoor 1.13.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Casdoor 1.13.0": [[0, 14]], "VULNERABILITY: SQL Injection": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "50792"}} {"text": "Casdoor 2.55.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Casdoor 2.55.0": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52432"}} {"text": "Casdoor 2.95.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Casdoor 2.95.0": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52439"}} {"text": "Cayin Content Management Server 11.0 - Remote Command Injection (root)", "spans": {"SYSTEM: Cayin Content Management Server 11.0": [[0, 36]], "VULNERABILITY: Command Injection": [[46, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48553"}} {"text": "Cayin Digital Signage System xPost 2.5 - Remote Command Injection", "spans": {"SYSTEM: Cayin Digital Signage System xPost 2.5": [[0, 38]], "VULNERABILITY: Command Injection": [[48, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48558"}} {"text": "Cayin Signage Media Player 3.0 - Remote Command Injection (root)", "spans": {"SYSTEM: Cayin Signage Media Player 3.0": [[0, 30]], "VULNERABILITY: Command Injection": [[40, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48557"}} {"text": "Cerberus FTP Web Service 11 - 'svg' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Cerberus FTP Web Service 11": [[0, 27]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[36, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49981"}} {"text": "Chained Quiz 1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie", "spans": {"SYSTEM: Chained Quiz 1.3.5": [[0, 19]], "VULNERABILITY: Insecure Direct Object Reference": [[38, 70]]}, "info": {"source": "exploitdb", "exploit_id": "52464"}} {"text": "changedetection < 0.45.20 - Remote Code Execution (RCE)", "spans": {"SYSTEM: changedetection < 0.45.20": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52027"}} {"text": "Chevereto 3.17.1 - Cross Site Scripting (Stored)", "spans": {"SYSTEM: Chevereto 3.17.1": [[0, 16]], "VULNERABILITY: Cross Site Scripting": [[19, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49859"}} {"text": "ChurchCRM 4.2.0 - CSV/Formula Injection", "spans": {"SYSTEM: ChurchCRM 4.2.0": [[0, 15]], "VULNERABILITY: CSV/Formula Injection": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49171"}} {"text": "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)", "spans": {"SYSTEM: ChurchCRM 4.2.1": [[0, 15]], "VULNERABILITY: Cross Site Scripting": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49172"}} {"text": "ChurchRota 2.6.4 - RCE (Authenticated)", "spans": {"SYSTEM: ChurchRota 2.6.4": [[0, 16]], "VULNERABILITY: RCE": [[19, 22]]}, "info": {"source": "exploitdb", "exploit_id": "49443"}} {"text": "Cibele Thinfinity VirtualUI 2.5.41.0 - User Enumeration", "spans": {"SYSTEM: Cibele Thinfinity VirtualUI 2.5.41.0": [[0, 36]], "VULNERABILITY: User Enumeration": [[39, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50601"}} {"text": "Cisco Smart Software Manager On-Prem 8-202206 - Account Takeover", "spans": {"SYSTEM: Cisco Smart Software Manager On-Prem 8-202206": [[0, 45]], "VULNERABILITY: Account Takeover": [[48, 64]]}, "info": {"source": "exploitdb", "exploit_id": "52155"}} {"text": "Citadel WebCit < 926 - Session Hijacking Exploit", "spans": {"SYSTEM: Citadel WebCit < 926": [[0, 20]], "VULNERABILITY: Session Hijacking Exploit": [[23, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48975"}} {"text": "Citrix Application Delivery Controller (ADC) and Gateway 13.0 - Path Traversal", "spans": {"SYSTEM: Citrix Application Delivery Controller (ADC) and Gateway 13.0": [[0, 61]], "VULNERABILITY: Path Traversal": [[64, 78]]}, "info": {"source": "exploitdb", "exploit_id": "47930"}} {"text": "Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution", "spans": {"SYSTEM: Citrix Application Delivery Controller and Citrix Gateway": [[0, 57]], "VULNERABILITY: Remote Code Execution": [[60, 81]]}, "info": {"source": "exploitdb", "exploit_id": "47902"}} {"text": "Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution (PoC)", "spans": {"SYSTEM: Citrix Application Delivery Controller and Citrix Gateway": [[0, 57]], "VULNERABILITY: Remote Code Execution": [[60, 81]]}, "info": {"source": "exploitdb", "exploit_id": "47901"}} {"text": "Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Citrix Application Delivery Controller and Gateway 10.5": [[0, 55]], "VULNERABILITY: Remote Code Execution": [[58, 79]], "TOOL: Metasploit": [[81, 91]]}, "info": {"source": "exploitdb", "exploit_id": "47913"}} {"text": "Click2Magic 1.1.5 - Stored Cross-Site Scripting", "spans": {"SYSTEM: Click2Magic 1.1.5": [[0, 17]], "VULNERABILITY: Stored Cross-Site Scripting": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49347"}} {"text": "Cloudron 6.2 - 'returnTo ' Cross Site Scripting (Reflected)", "spans": {"SYSTEM: Cloudron 6.2": [[0, 12]], "VULNERABILITY: Cross Site Scripting": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50317"}} {"text": "CMDBuild 3.3.2 - 'Multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: CMDBuild 3.3.2": [[0, 14]], "VULNERABILITY: Cross Site Scripting": [[28, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50527"}} {"text": "CMU CERT/CC VINCE 2.0.6 - Stored XSS", "spans": {"SYSTEM: CMU CERT/CC VINCE 2.0.6": [[0, 23]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52181"}} {"text": "Cockpit CMS 0.11.1 - 'Username Enumeration & Password Reset' NoSQL Injection", "spans": {"SYSTEM: Cockpit CMS 0.11.1": [[0, 18]], "VULNERABILITY: SQL Injection": [[63, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50185"}} {"text": "Cockpit Version 234 - Server-Side Request Forgery (Unauthenticated)", "spans": {"SYSTEM: Cockpit Version 234": [[0, 19]], "VULNERABILITY: Server-Side Request Forgery": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49397"}} {"text": "Codiad 2.8.4 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Codiad 2.8.4": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49705"}} {"text": "Codiad 2.8.4 - Remote Code Execution (Authenticated) (2)", "spans": {"SYSTEM: Codiad 2.8.4": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49902"}} {"text": "Codiad 2.8.4 - Remote Code Execution (Authenticated) (3)", "spans": {"SYSTEM: Codiad 2.8.4": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49907"}} {"text": "Codiad 2.8.4 - Remote Code Execution (Authenticated) (4)", "spans": {"SYSTEM: Codiad 2.8.4": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50474"}} {"text": "Comodo Unified Threat Management Web Console 2.7.0 - Remote Code Execution", "spans": {"SYSTEM: Comodo Unified Threat Management Web Console 2.7.0": [[0, 50]], "VULNERABILITY: Remote Code Execution": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48825"}} {"text": "compop.ca 3.5.3 - Arbitrary code Execution", "spans": {"SYSTEM: compop.ca 3.5.3": [[0, 15]], "VULNERABILITY: Arbitrary code Execution": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52257"}} {"text": "Concrete CMS 9.4.3 - Stored XSS", "spans": {"SYSTEM: Concrete CMS 9.4.3": [[0, 18]], "VULNERABILITY: XSS": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52428"}} {"text": "Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Copyparty 1.18.6": [[0, 16]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[19, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52390"}} {"text": "CourseMS 2.1 - 'name' Stored XSS", "spans": {"SYSTEM: CourseMS 2.1": [[0, 12]], "VULNERABILITY: XSS": [[29, 32]]}, "info": {"source": "exploitdb", "exploit_id": "49731"}} {"text": "Covenant v0.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Covenant v0.5": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51141"}} {"text": "craftercms 4.x.x - CORS", "spans": {"SYSTEM: craftercms 4.x.x": [[0, 16]], "VULNERABILITY: CORS": [[19, 23]]}, "info": {"source": "exploitdb", "exploit_id": "51313"}} {"text": "Crystal Shard http-protection 0.2.0 - IP Spoofing Bypass", "spans": {"SYSTEM: Crystal Shard http-protection 0.2.0": [[0, 35]], "VULNERABILITY: IP Spoofing Bypass": [[38, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48533"}} {"text": "CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: CyberPanel 2.1": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50230"}} {"text": "CyberPanel 2.3.6 - Remote Code Execution (RCE)", "spans": {"SYSTEM: CyberPanel 2.3.6": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52172"}} {"text": "Cyclos 4.14.7 - 'groupId' DOM Based Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Cyclos 4.14.7": [[0, 13]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50909"}} {"text": "Cyclos 4.14.7 - DOM Based Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Cyclos 4.14.7": [[0, 13]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50908"}} {"text": "D-Link DIR-650IN - Authenticated Command Injection", "spans": {"SYSTEM: D-Link DIR-650IN": [[0, 16]], "VULNERABILITY: Command Injection": [[33, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52508"}} {"text": "Discourse 3.1.1 - Unauthenticated Chat Message Access", "spans": {"SYSTEM: Discourse 3.1.1": [[0, 15]], "VULNERABILITY: Unauthenticated Chat Message Access": [[18, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52375"}} {"text": "Discourse 3.2.x - Anonymous Cache Poisoning", "spans": {"SYSTEM: Discourse 3.2.x": [[0, 15]], "VULNERABILITY: Anonymous Cache Poisoning": [[18, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52358"}} {"text": "Django 5.1.13 - SQL Injection", "spans": {"SYSTEM: Django 5.1.13": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52456"}} {"text": "DMA Radius Manager 4.4.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: DMA Radius Manager 4.4.0": [[0, 24]], "VULNERABILITY: CSRF": [[55, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49752"}} {"text": "Docsify.js 4.11.4 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: Docsify.js 4.11.4": [[0, 17]], "VULNERABILITY: Cross-Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48681"}} {"text": "DotCMS 20.11 - Stored Cross-Site Scripting", "spans": {"SYSTEM: DotCMS 20.11": [[0, 12]], "VULNERABILITY: Stored Cross-Site Scripting": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49168"}} {"text": "dotCMS 25.07.02-1 - Authenticated Blind SQL Injection", "spans": {"SYSTEM: dotCMS 25.07.02-1": [[0, 17]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52431"}} {"text": "Dreamer CMS v4.0.0 - SQL Injection", "spans": {"SYSTEM: Dreamer CMS v4.0.0": [[0, 18]], "VULNERABILITY: SQL Injection": [[21, 34]]}, "info": {"source": "exploitdb", "exploit_id": "51134"}} {"text": "DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: DzzOffice 2.02.1": [[0, 16]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[30, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49799"}} {"text": "Easy File Sharing Web Server v7.2 - Buffer Overflow", "spans": {"SYSTEM: Easy File Sharing Web Server v7.2": [[0, 33]], "VULNERABILITY: Buffer Overflow": [[36, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52484"}} {"text": "Easywall 0.3.1 - Authenticated Remote Command Execution", "spans": {"SYSTEM: Easywall 0.3.1": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51856"}} {"text": "EgavilanMedia Address Book 1.0 Exploit - SQLi Auth Bypass", "spans": {"SYSTEM: EgavilanMedia Address Book 1.0 Exploit": [[0, 38]], "VULNERABILITY: SQLi": [[41, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49182"}} {"text": "EgavilanMedia User Registration & Login System with Admin Panel 1.0 - CSRF", "spans": {"SYSTEM: EgavilanMedia User Registration & Login System with Admin Panel 1.0": [[0, 67]], "VULNERABILITY: CSRF": [[70, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49151"}} {"text": "EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: EgavilanMedia User Registration & Login System with Admin Panel 1.0": [[0, 67]], "VULNERABILITY: Persistent Cross-Site Scripting": [[70, 101]]}, "info": {"source": "exploitdb", "exploit_id": "49367"}} {"text": "EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting", "spans": {"SYSTEM: EgavilanMedia User Registration & Login System with Admin Panel 1.0": [[0, 67]], "VULNERABILITY: Stored Cross Site Scripting": [[70, 97]]}, "info": {"source": "exploitdb", "exploit_id": "49153"}} {"text": "Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal", "spans": {"SYSTEM: Eibiz i-Media Server Digital Signage 3.8.0": [[0, 42]], "VULNERABILITY: Directory Traversal": [[45, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48766"}} {"text": "ElasticSearch 7.13.3 - Memory disclosure", "spans": {"SYSTEM: ElasticSearch 7.13.3": [[0, 20]], "VULNERABILITY: Memory disclosure": [[23, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50149"}} {"text": "Elasticsearch ECE 7.13.3 - Anonymous Database Dump", "spans": {"SYSTEM: Elasticsearch ECE 7.13.3": [[0, 24]], "VULNERABILITY: Anonymous Database Dump": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50152"}} {"text": "ELEX WooCommerce WordPress Plugin 1.4.3 - SQL Injection", "spans": {"SYSTEM: ELEX WooCommerce WordPress Plugin 1.4.3": [[0, 39]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52430"}} {"text": "Employee Record Management System 1.1 - Login Bypass SQL Injection", "spans": {"SYSTEM: Employee Record Management System 1.1": [[0, 37]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49165"}} {"text": "Ericom Access Server x64 9.2.0 - Server-Side Request Forgery", "spans": {"SYSTEM: Ericom Access Server x64 9.2.0": [[0, 30]], "VULNERABILITY: Server-Side Request Forgery": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48765"}} {"text": "Ericsson Network Location MPS GMPC21 - Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Ericsson Network Location MPS GMPC21": [[0, 36]], "VULNERABILITY: Privilege Escalation": [[39, 59]], "TOOL: Metasploit": [[61, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50469"}} {"text": "Ericsson Network Location MPS GMPC21 - Remote Code Execution (RCE) (Metasploit)", "spans": {"SYSTEM: Ericsson Network Location MPS GMPC21": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]], "TOOL: Metasploit": [[68, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50468"}} {"text": "ERPNext 12.14.0 - SQL Injection (Authenticated)", "spans": {"SYSTEM: ERPNext 12.14.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "49464"}} {"text": "esm-dev 136 - Path Traversal", "spans": {"SYSTEM: esm-dev 136": [[0, 11]], "VULNERABILITY: Path Traversal": [[14, 28]]}, "info": {"source": "exploitdb", "exploit_id": "52461"}} {"text": "EspoCRM 5.8.5 - Privilege Escalation", "spans": {"SYSTEM: EspoCRM 5.8.5": [[0, 13]], "VULNERABILITY: Privilege Escalation": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48376"}} {"text": "Ethercreative Logs 3.0.3 - Path Traversal", "spans": {"SYSTEM: Ethercreative Logs 3.0.3": [[0, 24]], "VULNERABILITY: Path Traversal": [[27, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52241"}} {"text": "Exclusive Addons for Elementor 2.6.9 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Exclusive Addons for Elementor 2.6.9": [[0, 36]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[39, 72]]}, "info": {"source": "exploitdb", "exploit_id": "52126"}} {"text": "Expense Management System - 'description' Stored Cross Site Scripting", "spans": {"SYSTEM: Expense Management System": [[0, 25]], "VULNERABILITY: Stored Cross Site Scripting": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49146"}} {"text": "ExpressVPN VPN Router 1.0 - Router Login Panel's Integer Overflow", "spans": {"SYSTEM: ExpressVPN VPN Router 1.0": [[0, 25]], "VULNERABILITY: Integer Overflow": [[49, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49760"}} {"text": "EyesOfNetwork 5.3 - File Upload Remote Code Execution", "spans": {"SYSTEM: EyesOfNetwork 5.3": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49432"}} {"text": "EyesOfNetwork 5.3 - LFI", "spans": {"SYSTEM: EyesOfNetwork 5.3": [[0, 17]], "VULNERABILITY: LFI": [[20, 23]]}, "info": {"source": "exploitdb", "exploit_id": "49404"}} {"text": "EyesOfNetwork 5.3 - RCE & PrivEsc", "spans": {"SYSTEM: EyesOfNetwork 5.3": [[0, 17]], "VULNERABILITY: RCE": [[20, 23]]}, "info": {"source": "exploitdb", "exploit_id": "49402"}} {"text": "FIBARO System Home Center 5.021 - Remote File Include", "spans": {"SYSTEM: FIBARO System Home Center 5.021": [[0, 31]], "VULNERABILITY: Remote File Include": [[34, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48240"}} {"text": "FileBrowser 2.17.2 - Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE)", "spans": {"SYSTEM: FileBrowser 2.17.2": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[58, 85]]}, "info": {"source": "exploitdb", "exploit_id": "50717"}} {"text": "FileMage Gateway 1.10.9 - Local File Inclusion", "spans": {"SYSTEM: FileMage Gateway 1.10.9": [[0, 23]], "VULNERABILITY: Local File Inclusion": [[26, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51708"}} {"text": "FileRun 2019.05.21 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: FileRun 2019.05.21": [[0, 18]], "VULNERABILITY: Reflected Cross-Site Scripting": [[22, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48607"}} {"text": "FLEX 1085 Web 1.6.0 - HTML Injection", "spans": {"SYSTEM: FLEX 1085 Web 1.6.0": [[0, 19]], "VULNERABILITY: HTML Injection": [[22, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50544"}} {"text": "Flexmonster Pivot Table & Charts 2.7.17 - 'Remote JSON' Reflected XSS", "spans": {"SYSTEM: Flexmonster Pivot Table & Charts 2.7.17": [[0, 39]], "VULNERABILITY: XSS": [[66, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49305"}} {"text": "Flexmonster Pivot Table & Charts 2.7.17 - 'Remote Report' Reflected XSS", "spans": {"SYSTEM: Flexmonster Pivot Table & Charts 2.7.17": [[0, 39]], "VULNERABILITY: XSS": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49302"}} {"text": "Flexmonster Pivot Table & Charts 2.7.17 - 'To OLAP' Reflected XSS", "spans": {"SYSTEM: Flexmonster Pivot Table & Charts 2.7.17": [[0, 39]], "VULNERABILITY: XSS": [[62, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49303"}} {"text": "Flexmonster Pivot Table & Charts 2.7.17 - 'To remote CSV' Reflected XSS", "spans": {"SYSTEM: Flexmonster Pivot Table & Charts 2.7.17": [[0, 39]], "VULNERABILITY: XSS": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49304"}} {"text": "Flowise 3.0.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Flowise 3.0.4": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52440"}} {"text": "Fluig 1.7.0 - Path Traversal", "spans": {"SYSTEM: Fluig 1.7.0": [[0, 11]], "VULNERABILITY: Path Traversal": [[14, 28]]}, "info": {"source": "exploitdb", "exploit_id": "49622"}} {"text": "Forcepoint WebSecurity 8.5 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: Forcepoint WebSecurity 8.5": [[0, 26]], "VULNERABILITY: Cross-Site Scripting": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48029"}} {"text": "FormaLMS 2.4.4 - Authentication Bypass", "spans": {"SYSTEM: FormaLMS 2.4.4": [[0, 14]], "VULNERABILITY: Authentication Bypass": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50513"}} {"text": "FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload (Metasploit)", "spans": {"SYSTEM: FortiLogger 4.4.2.2": [[0, 19]], "VULNERABILITY: Arbitrary File Upload": [[38, 59]], "TOOL: Metasploit": [[61, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49600"}} {"text": "Fortinet Fortimail 7.0.1 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Fortinet Fortimail 7.0.1": [[0, 24]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[27, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50759"}} {"text": "Fortinet FortiWeb v8.0.1 - Auth Bypass", "spans": {"SYSTEM: Fortinet FortiWeb v8.0.1": [[0, 24]], "VULNERABILITY: Auth Bypass": [[27, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52495"}} {"text": "FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1 - Authentication Bypass", "spans": {"SYSTEM: FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1": [[0, 46]], "VULNERABILITY: Authentication Bypass": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51092"}} {"text": "FortiWeb 8.0.2 - Remote Code Execution", "spans": {"SYSTEM: FortiWeb 8.0.2": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52502"}} {"text": "FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution", "spans": {"SYSTEM: FortiWeb Fabric Connector 7.6.x": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "52473"}} {"text": "FoxCMS 1.2.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: FoxCMS 1.2.5": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52267"}} {"text": "FreeBSD rtsold 15.x - Remote Code Execution via DNSSL", "spans": {"SYSTEM: FreeBSD rtsold 15.x": [[0, 19]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52463"}} {"text": "Freeter 1.2.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Freeter 1.2.1": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49833"}} {"text": "FuguHub 8.1 - Remote Code Execution", "spans": {"SYSTEM: FuguHub 8.1": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51550"}} {"text": "FusionInvoice 2023-1.0 - Stored XSS (Cross-Site Scripting)", "spans": {"SYSTEM: FusionInvoice 2023-1.0": [[0, 22]], "VULNERABILITY: Cross-Site Scripting": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51480"}} {"text": "Gandia Integra Total 4.4.2236.1 - SQL Injection", "spans": {"SYSTEM: Gandia Integra Total 4.4.2236.1": [[0, 31]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52388"}} {"text": "Garage Management System 1.0 (categoriesName) - Stored XSS", "spans": {"SYSTEM: Garage Management System 1.0 (categoriesName)": [[0, 45]], "VULNERABILITY: XSS": [[55, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52238"}} {"text": "Geonetwork 4.2.0 - XML External Entity (XXE)", "spans": {"SYSTEM: Geonetwork 4.2.0": [[0, 16]], "VULNERABILITY: XXE": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50982"}} {"text": "GeoVision GV-ASManager 6.1.0.0 - Information Disclosure", "spans": {"SYSTEM: GeoVision GV-ASManager 6.1.0.0": [[0, 30]], "VULNERABILITY: Information Disclosure": [[34, 56]]}, "info": {"source": "exploitdb", "exploit_id": "52144"}} {"text": "GeoVision GV-ASManager 6.1.0.0 - Broken Access Control", "spans": {"SYSTEM: GeoVision GV-ASManager 6.1.0.0": [[0, 30]], "VULNERABILITY: Broken Access Control": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52189"}} {"text": "GeoVision GV-ASManager 6.1.1.0 - CSRF", "spans": {"SYSTEM: GeoVision GV-ASManager 6.1.1.0": [[0, 30]], "VULNERABILITY: CSRF": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52187"}} {"text": "GFI Mail Archiver 15.1 - Telerik UI Component Arbitrary File Upload (Unauthenticated)", "spans": {"SYSTEM: GFI Mail Archiver 15.1": [[0, 22]], "VULNERABILITY: Arbitrary File Upload": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50181"}} {"text": "Ghost CMS 5.42.1 - Path Traversal", "spans": {"SYSTEM: Ghost CMS 5.42.1": [[0, 16]], "VULNERABILITY: Path Traversal": [[19, 33]]}, "info": {"source": "exploitdb", "exploit_id": "52408"}} {"text": "Ghost CMS 5.59.1 - Arbitrary File Read", "spans": {"SYSTEM: Ghost CMS 5.59.1": [[0, 16]], "VULNERABILITY: Arbitrary File Read": [[19, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52409"}} {"text": "Gitea 1.12.5 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Gitea 1.12.5": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49571"}} {"text": "Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit)", "spans": {"SYSTEM: Gitea 1.16.6": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]], "TOOL: Metasploit": [[44, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51009"}} {"text": "Gitea 1.22.0 - Stored XSS", "spans": {"SYSTEM: Gitea 1.22.0": [[0, 12]], "VULNERABILITY: XSS": [[22, 25]]}, "info": {"source": "exploitdb", "exploit_id": "52077"}} {"text": "Gitea 1.24.0 - HTML Injection", "spans": {"SYSTEM: Gitea 1.24.0": [[0, 12]], "VULNERABILITY: HTML Injection": [[15, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52087"}} {"text": "Gitea 1.7.5 - Remote Code Execution", "spans": {"SYSTEM: Gitea 1.7.5": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49383"}} {"text": "GoAhead Web Server 2.5 - 'goform/formTest' Multiple HTML Injection Vulnerabilities", "spans": {"SYSTEM: GoAhead Web Server 2.5": [[0, 22]], "VULNERABILITY: Multiple HTML Injection Vulnerabilities": [[43, 82]]}, "info": {"source": "exploitdb", "exploit_id": "51762"}} {"text": "Google Invisible RECAPTCHA 3 - Spoof Bypass", "spans": {"SYSTEM: Google Invisible RECAPTCHA 3": [[0, 28]], "VULNERABILITY: Spoof Bypass": [[31, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48027"}} {"text": "Grafana 11.6.0 - SSRF", "spans": {"SYSTEM: Grafana 11.6.0": [[0, 14]], "VULNERABILITY: SSRF": [[17, 21]]}, "info": {"source": "exploitdb", "exploit_id": "52491"}} {"text": "Grafana 8.3.0 - Directory Traversal and Arbitrary File Read", "spans": {"SYSTEM: Grafana 8.3.0": [[0, 13]], "VULNERABILITY: Directory Traversal": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50581"}} {"text": "Grocery crud 1.6.4 - 'order_by' SQL Injection", "spans": {"SYSTEM: Grocery crud 1.6.4": [[0, 18]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49985"}} {"text": "Gurock Testrail 7.2.0.3014 - 'files.md5' Improper Access Control", "spans": {"SYSTEM: Gurock Testrail 7.2.0.3014": [[0, 26]], "VULNERABILITY: Improper Access Control": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50320"}} {"text": "Hasura GraphQL 1.3.3 - Local File Read", "spans": {"SYSTEM: Hasura GraphQL 1.3.3": [[0, 20]], "VULNERABILITY: Local File Read": [[23, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49790"}} {"text": "Hasura GraphQL 1.3.3 - Remote Code Execution", "spans": {"SYSTEM: Hasura GraphQL 1.3.3": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49802"}} {"text": "Hasura GraphQL 1.3.3 - Service Side Request Forgery (SSRF)", "spans": {"SYSTEM: Hasura GraphQL 1.3.3": [[0, 20]], "VULNERABILITY: SSRF": [[53, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49791"}} {"text": "Hasura GraphQL 2.2.0 - Information Disclosure", "spans": {"SYSTEM: Hasura GraphQL 2.2.0": [[0, 20]], "VULNERABILITY: Information Disclosure": [[23, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50803"}} {"text": "Horde Groupware Webmail 5.2.22 - Stored XSS", "spans": {"SYSTEM: Horde Groupware Webmail 5.2.22": [[0, 30]], "VULNERABILITY: XSS": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49769"}} {"text": "HPE Edgeline Infrastructure Manager 1.0 - Multiple Remote Vulnerabilities", "spans": {"SYSTEM: HPE Edgeline Infrastructure Manager 1.0": [[0, 39]], "VULNERABILITY: Multiple Remote Vulnerabilities": [[42, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49361"}} {"text": "htmly 2.8.0 - 'description' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: htmly 2.8.0": [[0, 11]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[28, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49772"}} {"text": "Hunk Companion Plugin 1.9.0 - Unauthenticated Plugin Installation", "spans": {"SYSTEM: Hunk Companion Plugin 1.9.0": [[0, 27]], "VULNERABILITY: Unauthenticated Plugin Installation": [[30, 65]]}, "info": {"source": "exploitdb", "exploit_id": "52259"}} {"text": "i3 International Annexxus Cameras Ax-n 5.2.0 - Application Logic Flaw", "spans": {"SYSTEM: i3 International Annexxus Cameras Ax-n 5.2.0": [[0, 44]], "VULNERABILITY: Application Logic Flaw": [[47, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50473"}} {"text": "IBM Security Verify Access 10.0.0 - Open Redirect during OAuth Flow", "spans": {"SYSTEM: IBM Security Verify Access 10.0.0": [[0, 33]], "VULNERABILITY: Open Redirect": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52123"}} {"text": "IBMi Navigator 7.5 - HTTP Security Token Bypass", "spans": {"SYSTEM: IBMi Navigator 7.5": [[0, 18]], "VULNERABILITY: HTTP Security Token Bypass": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52210"}} {"text": "IBMi Navigator 7.5 - Server Side Request Forgery (SSRF)", "spans": {"SYSTEM: IBMi Navigator 7.5": [[0, 18]], "VULNERABILITY: Server Side Request Forgery": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52212"}} {"text": "iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: iboss Secure Web Gateway": [[0, 24]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[27, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52009"}} {"text": "ILIAS Learning Management System 4.3 - SSRF", "spans": {"SYSTEM: ILIAS Learning Management System 4.3": [[0, 36]], "VULNERABILITY: SSRF": [[39, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49148"}} {"text": "ImportExportTools NG 10.0.4 - HTML Injection", "spans": {"SYSTEM: ImportExportTools NG 10.0.4": [[0, 27]], "VULNERABILITY: HTML Injection": [[30, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50496"}} {"text": "In4Suit ERP 3.2.74.1370 - 'txtLoginId' SQL injection", "spans": {"SYSTEM: In4Suit ERP 3.2.74.1370": [[0, 23]], "VULNERABILITY: SQL injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49884"}} {"text": "IncomCMS 2.0 - Insecure File Upload", "spans": {"SYSTEM: IncomCMS 2.0": [[0, 12]], "VULNERABILITY: File Upload": [[24, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49351"}} {"text": "INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution", "spans": {"SYSTEM: INNEO Startup TOOLS 2018 M040 13.0.70.3804": [[0, 42]], "VULNERABILITY: Remote Code Execution": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48693"}} {"text": "Intelight X-1L Traffic controller Maxtime 1.9.6 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Intelight X-1L Traffic controller Maxtime 1.9.6": [[0, 47]], "VULNERABILITY: Remote Code Execution (RCE)": [[50, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52151"}} {"text": "Invision Community 4.5.4 - 'Field Name' Stored Cross-Site Scripting", "spans": {"SYSTEM: Invision Community 4.5.4": [[0, 24]], "VULNERABILITY: Stored Cross-Site Scripting": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49188"}} {"text": "Invision Community 4.7.20 - (calendar/view.php) SQL Injection", "spans": {"SYSTEM: Invision Community 4.7.20": [[0, 25]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52383"}} {"text": "IPeakCMS 3.5 - Boolean-based blind SQLi", "spans": {"SYSTEM: IPeakCMS 3.5": [[0, 12]], "VULNERABILITY: SQLi": [[35, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49372"}} {"text": "Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS)", "spans": {"SYSTEM: Isshue Shopping Cart 3.5": [[0, 24]], "VULNERABILITY: Cross Site Scripting": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50490"}} {"text": "Ivanti vADC 9.9 - Authentication Bypass", "spans": {"SYSTEM: Ivanti vADC 9.9": [[0, 15]], "VULNERABILITY: Authentication Bypass": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52062"}} {"text": "Jasmin Ransomware - Arbitrary File Download (Authenticated)", "spans": {"SYSTEM: Jasmin Ransomware": [[0, 17]], "VULNERABILITY: Arbitrary File Download": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52140"}} {"text": "Jenzabar 9.2.2 - 'query' Reflected XSS.", "spans": {"SYSTEM: Jenzabar 9.2.2": [[0, 14]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49529"}} {"text": "JetBrains TeamCity 2023.11.4 - Authentication Bypass", "spans": {"SYSTEM: JetBrains TeamCity 2023.11.4": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "52411"}} {"text": "Joplin 1.0.245 - Arbitrary Code Execution (PoC)", "spans": {"SYSTEM: Joplin 1.0.245": [[0, 14]], "VULNERABILITY: Arbitrary Code Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48837"}} {"text": "Joplin 1.2.6 - 'link' Cross Site Scripting", "spans": {"SYSTEM: Joplin 1.2.6": [[0, 12]], "VULNERABILITY: Cross Site Scripting": [[22, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49024"}} {"text": "Joplin Desktop 1.0.184 - Cross-Site Scripting", "spans": {"SYSTEM: Joplin Desktop 1.0.184": [[0, 22]], "VULNERABILITY: Cross-Site Scripting": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48147"}} {"text": "jQuery 1.0.3 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: jQuery 1.0.3": [[0, 12]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[15, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49767"}} {"text": "jQuery 1.2 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: jQuery 1.2": [[0, 10]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[13, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49766"}} {"text": "jQuery 3.3.1 - Prototype Pollution & XSS Exploit", "spans": {"SYSTEM: jQuery 3.3.1": [[0, 12]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52141"}} {"text": "Jumbo Website Manager - Remote Code Execution", "spans": {"SYSTEM: Jumbo Website Manager": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52504"}} {"text": "Kentico Xperience 13.0.178 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Kentico Xperience 13.0.178": [[0, 26]], "VULNERABILITY: Cross Site Scripting": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52290"}} {"text": "KONGA 0.14.9 - Privilege Escalation", "spans": {"SYSTEM: KONGA 0.14.9": [[0, 12]], "VULNERABILITY: Privilege Escalation": [[15, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50521"}} {"text": "KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: KubeSphere 3.4.0": [[0, 16]], "VULNERABILITY: Insecure Direct Object Reference": [[19, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52097"}} {"text": "Kubio AI Page Builder 2.5.1 - Local File Inclusion (LFI)", "spans": {"SYSTEM: Kubio AI Page Builder 2.5.1": [[0, 27]], "VULNERABILITY: Local File Inclusion": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52125"}} {"text": "Langflow 1.2.x - Remote Code Execution (RCE)", "spans": {"SYSTEM: Langflow 1.2.x": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52364"}} {"text": "Lantronix Provisioning Manager 7.10.3 - XML External Entity Injection (XXE)", "spans": {"SYSTEM: Lantronix Provisioning Manager 7.10.3": [[0, 37]], "VULNERABILITY: XML External Entity Injection": [[40, 69]]}, "info": {"source": "exploitdb", "exploit_id": "52417"}} {"text": "Latrix 0.6.0 - 'txtaccesscode' SQL Injection", "spans": {"SYSTEM: Latrix 0.6.0": [[0, 12]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49733"}} {"text": "LibreNMS 1.46 - 'search' SQL Injection", "spans": {"SYSTEM: LibreNMS 1.46": [[0, 13]], "VULNERABILITY: SQL Injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48453"}} {"text": "LibreNMS 1.46 - MAC Accounting Graph Authenticated SQL Injection", "spans": {"SYSTEM: LibreNMS 1.46": [[0, 13]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49246"}} {"text": "LifeRay 7.2.1 GA2 - Stored XSS", "spans": {"SYSTEM: LifeRay 7.2.1 GA2": [[0, 17]], "VULNERABILITY: XSS": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "49091"}} {"text": "LightCMS 1.3.4 - 'exclusive' Stored XSS", "spans": {"SYSTEM: LightCMS 1.3.4": [[0, 14]], "VULNERABILITY: XSS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49598"}} {"text": "Liman 0.7 - Cross-Site Request Forgery (Change Password)", "spans": {"SYSTEM: Liman 0.7": [[0, 9]], "VULNERABILITY: Cross-Site Request Forgery": [[12, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48869"}} {"text": "Lingdang CRM 8.6.4.7 - SQL Injection", "spans": {"SYSTEM: Lingdang CRM 8.6.4.7": [[0, 20]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52420"}} {"text": "Local Service Search Engine Management System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Local Service Search Engine Management System 1.0": [[0, 49]], "VULNERABILITY: Authentication Bypass": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49163"}} {"text": "Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Logitech Media Server 8.2.0": [[0, 27]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[38, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50413"}} {"text": "LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: LogonTracer 1.2.0": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49918"}} {"text": "LPAR2RRD 8.04 - Remote Code Execution (RCE)", "spans": {"SYSTEM: LPAR2RRD 8.04": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52391"}} {"text": "Lucee 5.4.2.17 - Authenticated Reflected XSS", "spans": {"SYSTEM: Lucee 5.4.2.17": [[0, 14]], "VULNERABILITY: XSS": [[41, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51668"}} {"text": "M/Monit 3.7.4 - Password Disclosure", "spans": {"SYSTEM: M/Monit 3.7.4": [[0, 13]], "VULNERABILITY: Password Disclosure": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49081"}} {"text": "M/Monit 3.7.4 - Privilege Escalation", "spans": {"SYSTEM: M/Monit 3.7.4": [[0, 13]], "VULNERABILITY: Privilege Escalation": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49080"}} {"text": "Magento ver. 2.4.6 - XSLT Server Side Injection", "spans": {"SYSTEM: Magento ver. 2.4.6": [[0, 18]], "VULNERABILITY: XSLT Server Side Injection": [[21, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51847"}} {"text": "MagnusSolution magnusbilling 7.3.0 - Command Injection", "spans": {"SYSTEM: MagnusSolution magnusbilling 7.3.0": [[0, 34]], "VULNERABILITY: Command Injection": [[37, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52170"}} {"text": "mailcow 2025-01a - Host Header Password Reset Poisoning", "spans": {"SYSTEM: mailcow 2025-01a": [[0, 16]], "VULNERABILITY: Host Header Password Reset Poisoning": [[19, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52485"}} {"text": "Mailhog 1.0.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Mailhog 1.0.1": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50971"}} {"text": "ManageEngin AMP 4.3.0 - File-path-traversal", "spans": {"SYSTEM: ManageEngin AMP 4.3.0": [[0, 21]], "VULNERABILITY: File-path-traversal": [[24, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51222"}} {"text": "ManageEngine ADSelfService Plus 6.1 - CSV Injection", "spans": {"SYSTEM: ManageEngine ADSelfService Plus 6.1": [[0, 35]], "VULNERABILITY: CSV Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49885"}} {"text": "MaNGOSWebV4 4.0.6 - Reflected XSS", "spans": {"SYSTEM: MaNGOSWebV4 4.0.6": [[0, 18]], "VULNERABILITY: XSS": [[31, 34]]}, "info": {"source": "exploitdb", "exploit_id": "52457"}} {"text": "Markdown Explorer 0.1.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Markdown Explorer 0.1.1": [[0, 23]], "VULNERABILITY: Persistent Cross-Site Scripting": [[26, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49826"}} {"text": "Markdownify 1.2.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Markdownify 1.2.0": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49835"}} {"text": "Markright 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Markright 1.0": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49834"}} {"text": "Marky 0.0.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Marky 0.0.1": [[0, 11]], "VULNERABILITY: Persistent Cross-Site Scripting": [[14, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49831"}} {"text": "Mezzanine CMS 6.1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Mezzanine CMS 6.1.0": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52385"}} {"text": "Microsoft SharePoint Enterprise Server 2016 - Spoofing", "spans": {"SYSTEM: Microsoft SharePoint Enterprise Server 2016": [[0, 43]], "VULNERABILITY: Spoofing": [[46, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51543"}} {"text": "Mida eFramework 2.9.0 - Remote Code Execution", "spans": {"SYSTEM: Mida eFramework 2.9.0": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48768"}} {"text": "MiniWeb HTTP Server 0.8.19 - Buffer Overflow (PoC)", "spans": {"SYSTEM: MiniWeb HTTP Server 0.8.19": [[0, 26]], "VULNERABILITY: Buffer Overflow": [[29, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49247"}} {"text": "Moeditor 0.2.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Moeditor 0.2.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49830"}} {"text": "mojoPortal forums 2.7.0.0 - 'Title' Persistent Cross-Site Scripting", "spans": {"SYSTEM: mojoPortal forums 2.7.0.0": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49184"}} {"text": "Monica 2.19.1 - 'last_name' Stored XSS", "spans": {"SYSTEM: Monica 2.19.1": [[0, 13]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49582"}} {"text": "Moodle 4.4.0 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Moodle 4.4.0": [[0, 12]], "VULNERABILITY: Authenticated Remote Code Execution": [[15, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52350"}} {"text": "motionEye 0.43.1b4 - RCE", "spans": {"SYSTEM: motionEye 0.43.1b4": [[0, 18]], "VULNERABILITY: RCE": [[21, 24]]}, "info": {"source": "exploitdb", "exploit_id": "52481"}} {"text": "MotoCMS Version 3.4.3 - Server-Side Template Injection (SSTI)", "spans": {"SYSTEM: MotoCMS Version 3.4.3": [[0, 21]], "VULNERABILITY: SSTI": [[56, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51499"}} {"text": "Mumara Classic 2.93 - 'license' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Mumara Classic 2.93": [[0, 19]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50518"}} {"text": "myfactory FMS 7.1-911 - 'Multiple' Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: myfactory FMS 7.1-911": [[0, 21]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[35, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50428"}} {"text": "Nagios Log Server 2.1.6 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Nagios Log Server 2.1.6": [[0, 23]], "VULNERABILITY: Persistent Cross-Site Scripting": [[26, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48772"}} {"text": "Nagios Log Server 2.1.7 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Nagios Log Server 2.1.7": [[0, 23]], "VULNERABILITY: Persistent Cross-Site Scripting": [[26, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49082"}} {"text": "Nagios Log Server 2024R1.3.1 - API Key Exposure", "spans": {"SYSTEM: Nagios Log Server 2024R1.3.1": [[0, 28]], "VULNERABILITY: API Key Exposure": [[31, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52177"}} {"text": "Nagios Log Server 2024R1.3.1 - Stored XSS", "spans": {"SYSTEM: Nagios Log Server 2024R1.3.1": [[0, 28]], "VULNERABILITY: XSS": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52117"}} {"text": "Nagios Xi 5.6.6 - Authenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: Nagios Xi 5.6.6": [[0, 15]], "VULNERABILITY: Authenticated Remote Code Execution": [[18, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52138"}} {"text": "Nagios XI Version 2024R1.01 - SQL Injection", "spans": {"SYSTEM: Nagios XI Version 2024R1.01": [[0, 27]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51925"}} {"text": "Netsia SEBA+ 0.16.1 - Add Root User (Metasploit)", "spans": {"SYSTEM: Netsia SEBA+ 0.16.1": [[0, 19]], "VULNERABILITY: Add Root User": [[22, 35]], "TOOL: Metasploit": [[37, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49435"}} {"text": "Newgen Correspondence Management System (corms) eGov 12.0 - IDOR", "spans": {"SYSTEM: Newgen Correspondence Management System (corms) eGov 12.0": [[0, 57]], "VULNERABILITY: IDOR": [[60, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49378"}} {"text": "NewsLister - Authenticated Persistent Cross-Site Scripting", "spans": {"SYSTEM: NewsLister": [[0, 10]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49160"}} {"text": "Next.js Middleware 15.2.2 - Authorization Bypass", "spans": {"SYSTEM: Next.js Middleware 15.2.2": [[0, 25]], "VULNERABILITY: Authorization Bypass": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52124"}} {"text": "NodeBB Forum 1.12.2-1.14.2 - Account Takeover", "spans": {"SYSTEM: NodeBB Forum 1.12.2-1.14.2": [[0, 26]], "VULNERABILITY: Account Takeover": [[29, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48875"}} {"text": "NodeBB Plugin Emoji 3.2.1 - Arbitrary File Write", "spans": {"SYSTEM: NodeBB Plugin Emoji 3.2.1": [[0, 25]], "VULNERABILITY: Arbitrary File Write": [[28, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49813"}} {"text": "NOKIA VitalSuite SPM 2020 - 'UserName' SQL Injection", "spans": {"SYSTEM: NOKIA VitalSuite SPM 2020": [[0, 25]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48528"}} {"text": "nopCommerce Store 4.30 - 'name' Stored Cross-Site Scripting", "spans": {"SYSTEM: nopCommerce Store 4.30": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49093"}} {"text": "NoteMark < 0.13.0 - Stored XSS", "spans": {"SYSTEM: NoteMark < 0.13.0": [[0, 17]], "VULNERABILITY: XSS": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "52078"}} {"text": "OCS Inventory NG 2.7 - Remote Code Execution", "spans": {"SYSTEM: OCS Inventory NG 2.7": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48634"}} {"text": "OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: OctoBot WebInterface 0.4.3": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50979"}} {"text": "OctoPrint 1.11.2 - File Upload", "spans": {"SYSTEM: OctoPrint 1.11.2": [[0, 16]], "VULNERABILITY: File Upload": [[19, 30]]}, "info": {"source": "exploitdb", "exploit_id": "52476"}} {"text": "Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection", "spans": {"SYSTEM: Odine Solutions GateKeeper 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50381"}} {"text": "Odoo 12.0 - Local File Inclusion", "spans": {"SYSTEM: Odoo 12.0": [[0, 9]], "VULNERABILITY: Local File Inclusion": [[12, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48609"}} {"text": "Online News Portal System 1.0 - 'Title' Stored Cross Site Scripting", "spans": {"SYSTEM: Online News Portal System 1.0": [[0, 29]], "VULNERABILITY: Stored Cross Site Scripting": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49162"}} {"text": "Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Online Voting System Project in PHP": [[0, 35]], "VULNERABILITY: Persistent Cross-Site Scripting": [[49, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49159"}} {"text": "Open Game Panel - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Open Game Panel": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50373"}} {"text": "OpenCTI 3.3.1 - Directory Traversal", "spans": {"SYSTEM: OpenCTI 3.3.1": [[0, 13]], "VULNERABILITY: Directory Traversal": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48595"}} {"text": "OpenEDX platform Ironwood 2.5 - Remote Code Execution", "spans": {"SYSTEM: OpenEDX platform Ironwood 2.5": [[0, 29]], "VULNERABILITY: Remote Code Execution": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48500"}} {"text": "Openlitespeed 1.7.9 - 'Notes' Stored Cross-Site Scripting", "spans": {"SYSTEM: Openlitespeed 1.7.9": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting": [[30, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49727"}} {"text": "Openlitespeed Web Server 1.7.8 - Command Injection (Authenticated) (1)", "spans": {"SYSTEM: Openlitespeed Web Server 1.7.8": [[0, 30]], "VULNERABILITY: Command Injection": [[33, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49483"}} {"text": "Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2)", "spans": {"SYSTEM: Openlitespeed WebServer 1.7.8": [[0, 29]], "VULNERABILITY: Command Injection": [[32, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49556"}} {"text": "openMAINT openMAINT 2.1-3.3-b - 'Multiple' Persistent Cross-Site Scripting", "spans": {"SYSTEM: openMAINT openMAINT 2.1-3.3-b": [[0, 29]], "VULNERABILITY: Persistent Cross-Site Scripting": [[43, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49649"}} {"text": "OpenPanel 0.3.4 - Directory Traversal", "spans": {"SYSTEM: OpenPanel 0.3.4": [[0, 15]], "VULNERABILITY: Directory Traversal": [[18, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52195"}} {"text": "OpenPanel 0.3.4 - Incorrect Access Control", "spans": {"SYSTEM: OpenPanel 0.3.4": [[0, 15]], "VULNERABILITY: Incorrect Access Control": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52196"}} {"text": "OpenPanel 0.3.4 - OS Command Injection", "spans": {"SYSTEM: OpenPanel 0.3.4": [[0, 15]], "VULNERABILITY: Command Injection": [[21, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52197"}} {"text": "OpenPanel Copy and View functions in the File Manager 0.3.4 - Directory Traversal", "spans": {"SYSTEM: OpenPanel Copy and View functions in the File Manager 0.3.4": [[0, 59]], "VULNERABILITY: Directory Traversal": [[62, 81]]}, "info": {"source": "exploitdb", "exploit_id": "52198"}} {"text": "OpenText Content Server 20.3 - 'multiple' Stored Cross-Site Scripting", "spans": {"SYSTEM: OpenText Content Server 20.3": [[0, 28]], "VULNERABILITY: Stored Cross-Site Scripting": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49578"}} {"text": "OPSWAT Metadefender Core - Privilege Escalation", "spans": {"SYSTEM: OPSWAT Metadefender Core": [[0, 24]], "VULNERABILITY: Privilege Escalation": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51113"}} {"text": "Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS", "spans": {"SYSTEM: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715": [[0, 63]], "VULNERABILITY: XSS": [[73, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49444"}} {"text": "Oracle Fatwire 6.3 - Multiple Vulnerabilities", "spans": {"SYSTEM: Oracle Fatwire 6.3": [[0, 18]], "VULNERABILITY: Multiple Vulnerabilities": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50167"}} {"text": "orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: orangescrum 1.8.0": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50554"}} {"text": "orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated)", "spans": {"SYSTEM: orangescrum 1.8.0": [[0, 17]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50553"}} {"text": "orangescrum 1.8.0 - Privilege escalation (Authenticated)", "spans": {"SYSTEM: orangescrum 1.8.0": [[0, 17]], "VULNERABILITY: Privilege escalation": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50551"}} {"text": "OSGi v3.7.2 (and below) Console - RCE", "spans": {"SYSTEM: OSGi v3.7.2 (and below) Console": [[0, 31]], "VULNERABILITY: RCE": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51879"}} {"text": "OSGi v3.8-3.18 Console - RCE", "spans": {"SYSTEM: OSGi v3.8-3.18 Console": [[0, 22]], "VULNERABILITY: RCE": [[25, 28]]}, "info": {"source": "exploitdb", "exploit_id": "51878"}} {"text": "Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated)", "spans": {"SYSTEM: Ozeki SMS Gateway 10.3.208": [[0, 26]], "VULNERABILITY: Arbitrary File Read": [[29, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51646"}} {"text": "Palo Alto Cortex XSOAR 6.5.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Palo Alto Cortex XSOAR 6.5.0": [[0, 28]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[31, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51343"}} {"text": "Palo Alto Networks Expedition 1.2.90.1 - Admin Account Takeover", "spans": {"SYSTEM: Palo Alto Networks Expedition 1.2.90.1": [[0, 38]], "VULNERABILITY: Admin Account Takeover": [[41, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52129"}} {"text": "PaperCut NG/MG 22.0.4 - Authentication Bypass", "spans": {"SYSTEM: PaperCut NG/MG 22.0.4": [[0, 21]], "VULNERABILITY: Authentication Bypass": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51391"}} {"text": "PaperCut NG/MG 22.0.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: PaperCut NG/MG 22.0.4": [[0, 21]], "VULNERABILITY: Remote Code Execution (RCE)": [[24, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51452"}} {"text": "Payara Micro Community 5.2021.6 - Directory Traversal", "spans": {"SYSTEM: Payara Micro Community 5.2021.6": [[0, 31]], "VULNERABILITY: Directory Traversal": [[34, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50371"}} {"text": "Pega Platform 8.1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Pega Platform 8.1.0": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51099"}} {"text": "perfexcrm 1.10 - 'State' Stored Cross-site scripting (XSS)", "spans": {"SYSTEM: perfexcrm 1.10": [[0, 14]], "VULNERABILITY: XSS": [[54, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50097"}} {"text": "perfSONAR v4.4.5 - Partial Blind CSRF", "spans": {"SYSTEM: perfSONAR v4.4.5": [[0, 16]], "VULNERABILITY: CSRF": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51186"}} {"text": "PESCMS TEAM 2.3.2 - Multiple Reflected XSS", "spans": {"SYSTEM: PESCMS TEAM 2.3.2": [[0, 17]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49072"}} {"text": "phpMyFAQ 3.1.7 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: phpMyFAQ 3.1.7": [[0, 15]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[18, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52445"}} {"text": "phpPgAdmin 7.13.0 - COPY FROM PROGRAM Command Execution (Authenticated)", "spans": {"SYSTEM: phpPgAdmin 7.13.0": [[0, 17]], "VULNERABILITY: COPY FROM PROGRAM Command Execution": [[20, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49736"}} {"text": "Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection", "spans": {"SYSTEM: Phpscript-sgh 0.1.0": [[0, 19]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49192"}} {"text": "Pie Register WordPress Plugin 3.7.1.4 - Authentication Bypass to RCE", "spans": {"SYSTEM: Pie Register WordPress Plugin 3.7.1.4": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52370"}} {"text": "Pimcore 11.4.2 - Stored cross site scripting", "spans": {"SYSTEM: Pimcore 11.4.2": [[0, 14]], "VULNERABILITY: Stored cross site scripting": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52194"}} {"text": "Pimcore customer-data-framework 4.2.0 - SQL injection", "spans": {"SYSTEM: Pimcore customer-data-framework 4.2.0": [[0, 37]], "VULNERABILITY: SQL injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52193"}} {"text": "Piranha CMS 12.0 - Stored XSS in Text Block", "spans": {"SYSTEM: Piranha CMS 12.0": [[0, 16]], "VULNERABILITY: XSS": [[26, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52471"}} {"text": "PivotX 3.0.0 RC3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: PivotX 3.0.0 RC3": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52361"}} {"text": "Pixelimity 1.0 - 'password' Cross-Site Request Forgery", "spans": {"SYSTEM: Pixelimity 1.0": [[0, 14]], "VULNERABILITY: Cross-Site Request Forgery": [[28, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49519"}} {"text": "Plane 0.23.1 - Server side request forgery (SSRF)", "spans": {"SYSTEM: Plane 0.23.1": [[0, 12]], "VULNERABILITY: SSRF": [[44, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52211"}} {"text": "Plastic SCM 10.0.16.5622 - WebAdmin Server Access", "spans": {"SYSTEM: Plastic SCM 10.0.16.5622": [[0, 24]], "VULNERABILITY: WebAdmin Server Access": [[27, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50426"}} {"text": "Plone CMS 5.2.3 - 'Title' Stored XSS", "spans": {"SYSTEM: Plone CMS 5.2.3": [[0, 15]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49668"}} {"text": "Postbird 0.8.4 - Javascript Injection", "spans": {"SYSTEM: Postbird 0.8.4": [[0, 14]], "VULNERABILITY: Javascript Injection": [[17, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49910"}} {"text": "ProcessMaker 3.5.4 - Local File inclusion", "spans": {"SYSTEM: ProcessMaker 3.5.4": [[0, 18]], "VULNERABILITY: Local File inclusion": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50229"}} {"text": "ProConf 6.0 - Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: ProConf 6.0": [[0, 11]], "VULNERABILITY: Insecure Direct Object Reference": [[15, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52236"}} {"text": "Progress Telerik Report Server 2024 Q1 (10.0.24.305) - Authentication Bypass", "spans": {"SYSTEM: Progress Telerik Report Server 2024 Q1 (10.0.24.305)": [[0, 52]], "VULNERABILITY: Authentication Bypass": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "52103"}} {"text": "projectworlds Online Admission System 1.0 - SQL Injection", "spans": {"SYSTEM: projectworlds Online Admission System 1.0": [[0, 41]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52398"}} {"text": "Provide Server v.14.4 XSS - CSRF & Remote Code Execution (RCE)", "spans": {"SYSTEM: Provide Server v.14.4 XSS": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51264"}} {"text": "Pterodactyl Panel 1.11.11 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Pterodactyl Panel 1.11.11": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52341"}} {"text": "qdPM < 9.1 - Remote Code Execution", "spans": {"SYSTEM: qdPM < 9.1": [[0, 10]], "VULNERABILITY: Remote Code Execution": [[13, 34]]}, "info": {"source": "exploitdb", "exploit_id": "48146"}} {"text": "React Server 19.2.0 - Remote Code Execution", "spans": {"SYSTEM: React Server 19.2.0": [[0, 19]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52506"}} {"text": "Real Web Pentesting Tutorial Step by Step - [Persian]", "spans": {"SYSTEM: Real Web Pentesting Tutorial Step by Step": [[0, 41]], "VULNERABILITY: [Persian]": [[44, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48108"}} {"text": "reNgine 2.2.0 - Command Injection (Authenticated)", "spans": {"SYSTEM: reNgine 2.2.0": [[0, 13]], "VULNERABILITY: Command Injection": [[16, 33]]}, "info": {"source": "exploitdb", "exploit_id": "52081"}} {"text": "RiteCMS 3.0.0 - Reflected Cross Site Scripting (XSS)", "spans": {"SYSTEM: RiteCMS 3.0.0": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[26, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52413"}} {"text": "RiteCMS 3.1.0 - Authenticated Remote Code Execution", "spans": {"SYSTEM: RiteCMS 3.1.0": [[0, 13]], "VULNERABILITY: Authenticated Remote Code Execution": [[16, 51]]}, "info": {"source": "exploitdb", "exploit_id": "52488"}} {"text": "RomM 4.4.0 - XSS_CSRF Chain", "spans": {"SYSTEM: RomM 4.4.0": [[0, 11]], "VULNERABILITY: CSRF": [[19, 23]]}, "info": {"source": "exploitdb", "exploit_id": "52505"}} {"text": "Roundcube 1.6.10 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Roundcube 1.6.10": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52324"}} {"text": "Royal Elementor Addons and Templates 1.3.78 - Unauthenticated Arbitrary File Upload", "spans": {"SYSTEM: Royal Elementor Addons and Templates 1.3.78": [[0, 43]], "VULNERABILITY: Arbitrary File Upload": [[62, 83]]}, "info": {"source": "exploitdb", "exploit_id": "52127"}} {"text": "RPi-Jukebox-RFID 2.8.0 - Remote Command Execution", "spans": {"SYSTEM: RPi-Jukebox-RFID 2.8.0": [[0, 22]], "VULNERABILITY: Remote Command Execution": [[25, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52468"}} {"text": "RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: RPi-Jukebox-RFID 2.8.0": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[25, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52470"}} {"text": "RSA IG&L Aveksa 7.1.1 - Remote Code Execution", "spans": {"SYSTEM: RSA IG&L Aveksa 7.1.1": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48639"}} {"text": "Rumble Mail Server 0.51.3135 - 'domain and path' Stored XSS", "spans": {"SYSTEM: Rumble Mail Server 0.51.3135": [[0, 28]], "VULNERABILITY: XSS": [[56, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49254"}} {"text": "Rumble Mail Server 0.51.3135 - 'servername' Stored XSS", "spans": {"SYSTEM: Rumble Mail Server 0.51.3135": [[0, 28]], "VULNERABILITY: XSS": [[51, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49253"}} {"text": "Rumble Mail Server 0.51.3135 - 'username' Stored XSS", "spans": {"SYSTEM: Rumble Mail Server 0.51.3135": [[0, 28]], "VULNERABILITY: XSS": [[49, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49255"}} {"text": "RWS WorldServer 11.7.3 - Session Token Enumeration", "spans": {"SYSTEM: RWS WorldServer 11.7.3": [[0, 22]], "VULNERABILITY: Session Token Enumeration": [[25, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51619"}} {"text": "Schlix CMS 2.2.6-6 - 'title' Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: Schlix CMS 2.2.6-6": [[0, 18]], "VULNERABILITY: Persistent Cross-Site Scripting": [[29, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49837"}} {"text": "Schlix CMS 2.2.6-6 - Arbitary File Upload (Authenticated)", "spans": {"SYSTEM: Schlix CMS 2.2.6-6": [[0, 18]], "VULNERABILITY: File Upload": [[30, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49897"}} {"text": "Schlix CMS 2.2.6-6 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Schlix CMS 2.2.6-6": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49838"}} {"text": "SCM Manager 1.60 - Cross-Site Scripting Stored (Authenticated)", "spans": {"SYSTEM: SCM Manager 1.60": [[0, 16]], "VULNERABILITY: Cross-Site Scripting": [[19, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51488"}} {"text": "Scratch Desktop 3.17 - Remote Code Execution", "spans": {"SYSTEM: Scratch Desktop 3.17": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50079"}} {"text": "Seacms 11.1 - 'checkuser' Stored XSS", "spans": {"SYSTEM: Seacms 11.1": [[0, 11]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49251"}} {"text": "Seacms 11.1 - 'file' Local File Inclusion", "spans": {"SYSTEM: Seacms 11.1": [[0, 11]], "VULNERABILITY: Local File Inclusion": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49250"}} {"text": "Seacms 11.1 - 'ip and weburl' Remote Command Execution", "spans": {"SYSTEM: Seacms 11.1": [[0, 11]], "VULNERABILITY: Remote Command Execution": [[30, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49249"}} {"text": "Secure Web Gateway 10.2.11 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Secure Web Gateway 10.2.11": [[0, 26]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[29, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51237"}} {"text": "Selea CarPlateServer (CPS) 4.0.1.6 - Remote Program Execution", "spans": {"SYSTEM: Selea CarPlateServer (CPS) 4.0.1.6": [[0, 34]], "VULNERABILITY: Remote Program Execution": [[37, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49452"}} {"text": "ServiceNow - Username Enumeration", "spans": {"SYSTEM: ServiceNow": [[0, 10]], "VULNERABILITY: Username Enumeration": [[13, 33]]}, "info": {"source": "exploitdb", "exploit_id": "50741"}} {"text": "ServiceNow Multiple Versions - Input Validation & Template Injection", "spans": {"SYSTEM: ServiceNow Multiple Versions": [[0, 28]], "VULNERABILITY: Input Validation & Template Injection": [[31, 68]]}, "info": {"source": "exploitdb", "exploit_id": "52410"}} {"text": "Servisnet Tessa - Add sysAdmin User (Unauthenticated) (Metasploit)", "spans": {"SYSTEM: Servisnet Tessa": [[0, 15]], "VULNERABILITY: Add sysAdmin User": [[18, 35]], "TOOL: Metasploit": [[55, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50714"}} {"text": "Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)", "spans": {"SYSTEM: Servisnet Tessa": [[0, 15]], "VULNERABILITY: MQTT Credentials Dump": [[18, 39]], "TOOL: Metasploit": [[59, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50713"}} {"text": "Servisnet Tessa - Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Servisnet Tessa": [[0, 15]], "VULNERABILITY: Privilege Escalation": [[18, 38]], "TOOL: Metasploit": [[40, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50712"}} {"text": "Setelsa Conacwin 3.7.1.2 - Local File Inclusion", "spans": {"SYSTEM: Setelsa Conacwin 3.7.1.2": [[0, 24]], "VULNERABILITY: Local File Inclusion": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49133"}} {"text": "Shoplazza 1.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Shoplazza 1.1": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51150"}} {"text": "Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)", "spans": {"SYSTEM: Sickbeard 0.1": [[0, 13]], "VULNERABILITY: Cross-Site Request Forgery": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48712"}} {"text": "Siklu EtherHaul Series EH-8010 - Arbitrary File Upload", "spans": {"SYSTEM: Siklu EtherHaul Series EH-8010": [[0, 30]], "VULNERABILITY: Arbitrary File Upload": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52467"}} {"text": "Siklu EtherHaul Series EH-8010 - Remote Command Execution", "spans": {"SYSTEM: Siklu EtherHaul Series EH-8010": [[0, 30]], "VULNERABILITY: Remote Command Execution": [[33, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52466"}} {"text": "SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: SilverStripe 5.3.8": [[0, 18]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52199"}} {"text": "Simple File List WordPress Plugin 4.2.2 - File Upload to RCE", "spans": {"SYSTEM: Simple File List WordPress Plugin 4.2.2": [[0, 39]], "VULNERABILITY: RCE": [[57, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52371"}} {"text": "Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Simple Traffic Offense System 1.0": [[0, 33]], "VULNERABILITY: Stored Cross Site Scripting": [[36, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50073"}} {"text": "SISQUALWFM 7.1.319.103 - Host Header Injection", "spans": {"SYSTEM: SISQUALWFM 7.1.319.103": [[0, 22]], "VULNERABILITY: Host Header Injection": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51796"}} {"text": "Sitecore 10.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Sitecore 10.4": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52344"}} {"text": "Sitefinity 15.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Sitefinity 15.0": [[0, 15]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[18, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52035"}} {"text": "Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI", "spans": {"SYSTEM: Skyvern 0.1.85": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52335"}} {"text": "SmartAgent 3.1.0 - Privilege Escalation", "spans": {"SYSTEM: SmartAgent 3.1.0": [[0, 16]], "VULNERABILITY: Privilege Escalation": [[19, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49415"}} {"text": "SmarterMail 16 - Arbitrary File Upload", "spans": {"SYSTEM: SmarterMail 16": [[0, 14]], "VULNERABILITY: Arbitrary File Upload": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48580"}} {"text": "SmartFoxServer 2X 2.17.0 - God Mode Console WebSocket XSS", "spans": {"SYSTEM: SmartFoxServer 2X 2.17.0": [[0, 24]], "VULNERABILITY: XSS": [[54, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49528"}} {"text": "SnipCommand 0.1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: SnipCommand 0.1.0": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49829"}} {"text": "SnipeIT 6.2.1 - Stored Cross Site Scripting", "spans": {"SYSTEM: SnipeIT 6.2.1": [[0, 13]], "VULNERABILITY: Stored Cross Site Scripting": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51883"}} {"text": "Social Warfare WordPress Plugin 3.5.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Social Warfare WordPress Plugin 3.5.2": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "52346"}} {"text": "Socket.io-file 2.0.31 - Arbitrary File Upload", "spans": {"SYSTEM: Socket.io-file 2.0.31": [[0, 21]], "VULNERABILITY: Arbitrary File Upload": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48713"}} {"text": "Solar-Log 500 2.8.2 - Incorrect Access Control", "spans": {"SYSTEM: Solar-Log 500 2.8.2": [[0, 19]], "VULNERABILITY: Incorrect Access Control": [[22, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49986"}} {"text": "Solar-Log 500 2.8.2 - Unprotected Storage of Credentials", "spans": {"SYSTEM: Solar-Log 500 2.8.2": [[0, 19]], "VULNERABILITY: Unprotected Storage of Credentials": [[22, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49987"}} {"text": "SolarWinds Platform 2024.1 SR1 - Race Condition", "spans": {"SYSTEM: SolarWinds Platform 2024.1 SR1": [[0, 30]], "VULNERABILITY: Race Condition": [[33, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52055"}} {"text": "Sonatype Nexus Repository 3.53.0-01 - Path Traversal", "spans": {"SYSTEM: Sonatype Nexus Repository 3.53.0-01": [[0, 35]], "VULNERABILITY: Path Traversal": [[38, 52]]}, "info": {"source": "exploitdb", "exploit_id": "52101"}} {"text": "Sonlogger 4.2.3.3 - SuperAdmin Account Creation / Information Disclosure", "spans": {"SYSTEM: Sonlogger 4.2.3.3": [[0, 17]], "VULNERABILITY: Information Disclosure": [[50, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49650"}} {"text": "SonLogger 4.2.3.3 - Unauthenticated Arbitrary File Upload (Metasploit)", "spans": {"SYSTEM: SonLogger 4.2.3.3": [[0, 17]], "VULNERABILITY: Arbitrary File Upload": [[36, 57]], "TOOL: Metasploit": [[59, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49651"}} {"text": "Soosyze CMS 2.0 - Brute Force Login", "spans": {"SYSTEM: Soosyze CMS 2.0": [[0, 15]], "VULNERABILITY: Brute Force Login": [[18, 35]]}, "info": {"source": "exploitdb", "exploit_id": "52416"}} {"text": "Sophos VPN Web Panel 2020 - Denial of Service (Poc)", "spans": {"SYSTEM: Sophos VPN Web Panel 2020": [[0, 25]], "VULNERABILITY: Denial of Service": [[28, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48683"}} {"text": "SpamTitan 7.07 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: SpamTitan 7.07": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48817"}} {"text": "Splunk 9.0.4 - Information Disclosure", "spans": {"SYSTEM: Splunk 9.0.4": [[0, 12]], "VULNERABILITY: Information Disclosure": [[15, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51792"}} {"text": "Splunk 9.0.5 - admin account take over", "spans": {"SYSTEM: Splunk 9.0.5": [[0, 12]], "VULNERABILITY: admin account take over": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51747"}} {"text": "Spotweb 1.4.9 - 'search' SQL Injection", "spans": {"SYSTEM: Spotweb 1.4.9": [[0, 13]], "VULNERABILITY: SQL Injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49297"}} {"text": "Spotweb 1.4.9 - DOM Based Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Spotweb 1.4.9": [[0, 13]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49891"}} {"text": "SQL Monitor 12.1.31.893 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: SQL Monitor 12.1.31.893": [[0, 23]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51218"}} {"text": "Stacks Mobile App Builder 5.2.3 - Authentication Bypass via Account Takeover", "spans": {"SYSTEM: Stacks Mobile App Builder 5.2.3": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52357"}} {"text": "StoryChief Wordpress Plugin 1.0.42 - Arbitrary File Upload", "spans": {"SYSTEM: StoryChief Wordpress Plugin 1.0.42": [[0, 34]], "VULNERABILITY: Arbitrary File Upload": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52422"}} {"text": "Strapi 3.0.0-beta - Set Password (Unauthenticated)", "spans": {"SYSTEM: Strapi 3.0.0-beta": [[0, 17]], "VULNERABILITY: Set Password": [[20, 32]]}, "info": {"source": "exploitdb", "exploit_id": "50237"}} {"text": "Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Strapi 3.0.0-beta.17.7": [[0, 22]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50238"}} {"text": "Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Strapi CMS 3.0.0-beta.17.4": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50239"}} {"text": "Student Result Management System 1.0 - Authentication Bypass SQL Injection", "spans": {"SYSTEM: Student Result Management System 1.0": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49152"}} {"text": "StudyMD 0.3.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: StudyMD 0.3.2": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49832"}} {"text": "SugarCRM 14.0.0 - SSRF/Code Injection", "spans": {"SYSTEM: SugarCRM 14.0.0": [[0, 15]], "VULNERABILITY: Code Injection": [[23, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52365"}} {"text": "Summar Employee Portal 3.98.0 - Authenticated SQL Injection", "spans": {"SYSTEM: Summar Employee Portal 3.98.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52462"}} {"text": "Suprema BioStar 2 v2.8.16 - SQL Injection", "spans": {"SYSTEM: Suprema BioStar 2 v2.8.16": [[0, 25]], "VULNERABILITY: SQL Injection": [[28, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51340"}} {"text": "SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration", "spans": {"SYSTEM: SureMDM On-premise < 6.31": [[0, 25]], "VULNERABILITY: CAPTCHA Bypass User Enumeration": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51804"}} {"text": "SureTriggers OttoKit Plugin 1.0.82 - Privilege Escalation", "spans": {"SYSTEM: SureTriggers OttoKit Plugin 1.0.82": [[0, 34]], "VULNERABILITY: Privilege Escalation": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52286"}} {"text": "Survey Sparrow Enterprise Survey Software 2022 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Survey Sparrow Enterprise Survey Software 2022": [[0, 46]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50937"}} {"text": "Symantec Messaging Gateway 10.7.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Symantec Messaging Gateway 10.7.4": [[0, 33]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[36, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51342"}} {"text": "Sysax MultiServer 6.90 - Reflected Cross Site Scripting", "spans": {"SYSTEM: Sysax MultiServer 6.90": [[0, 22]], "VULNERABILITY: Cross Site Scripting": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48582"}} {"text": "T-Soft E-Commerce 4 - 'UrunAdi' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: T-Soft E-Commerce 4": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[32, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50938"}} {"text": "T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: T-Soft E-Commerce 4": [[0, 19]], "VULNERABILITY: CSRF": [[77, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50302"}} {"text": "T-Soft E-Commerce 4 - SQLi (Authenticated)", "spans": {"SYSTEM: T-Soft E-Commerce 4": [[0, 19]], "VULNERABILITY: SQLi": [[22, 26]]}, "info": {"source": "exploitdb", "exploit_id": "50939"}} {"text": "Tagstoo 2.0.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Tagstoo 2.0.1": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49828"}} {"text": "Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Tea LaTex 1.0": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48805"}} {"text": "Teedy 1.11 - Account Takeover via Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Teedy 1.11": [[0, 10]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[34, 67]]}, "info": {"source": "exploitdb", "exploit_id": "52228"}} {"text": "Tendenci 12.3.1 - CSV/ Formula Injection", "spans": {"SYSTEM: Tendenci 12.3.1": [[0, 15]], "VULNERABILITY: CSV/ Formula Injection": [[18, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49145"}} {"text": "Testa Online Test Management System 3.4.7 - 'q' SQL Injection", "spans": {"SYSTEM: Testa Online Test Management System 3.4.7": [[0, 41]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49194"}} {"text": "TestBox CFML Test Framework 4.1.0 - Arbitrary File Write and Remote Code Execution", "spans": {"SYSTEM: TestBox CFML Test Framework 4.1.0": [[0, 33]], "VULNERABILITY: Remote Code Execution": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49077"}} {"text": "TestBox CFML Test Framework 4.1.0 - Directory Traversal", "spans": {"SYSTEM: TestBox CFML Test Framework 4.1.0": [[0, 33]], "VULNERABILITY: Directory Traversal": [[36, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49078"}} {"text": "Thinfinity VirtualUI 2.5.26.2 - Information Disclosure", "spans": {"SYSTEM: Thinfinity VirtualUI 2.5.26.2": [[0, 30]], "VULNERABILITY: Information Disclosure": [[33, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50771"}} {"text": "Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection", "spans": {"SYSTEM: Thinfinity VirtualUI 2.5.41.0": [[0, 29]], "VULNERABILITY: IFRAME Injection": [[33, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50770"}} {"text": "ThingsBoard 3.3.1 'description' - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ThingsBoard 3.3.1 'description'": [[0, 31]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[34, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51004"}} {"text": "ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ThingsBoard 3.3.1 'name'": [[0, 24]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[27, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51003"}} {"text": "Tileserver-gl 3.0.0 - 'key' Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Tileserver-gl 3.0.0": [[0, 19]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[28, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49771"}} {"text": "Touchbase.io 1.10 - Stored Cross Site Scripting", "spans": {"SYSTEM: Touchbase.io 1.10": [[0, 17]], "VULNERABILITY: Stored Cross Site Scripting": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49040"}} {"text": "Tourism Management System 2.0 - Arbitrary Shell Upload", "spans": {"SYSTEM: Tourism Management System 2.0": [[0, 29]], "VULNERABILITY: Arbitrary Shell Upload": [[32, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52433"}} {"text": "Trend Micro Web Security Virtual Appliance 6.5 SP2 Patch 4 Build 1901 - Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Trend Micro Web Security Virtual Appliance 6.5 SP2 Patch 4 Build 1901": [[0, 69]], "VULNERABILITY: Remote Code Execution": [[72, 93]], "TOOL: Metasploit": [[95, 105]]}, "info": {"source": "exploitdb", "exploit_id": "48667"}} {"text": "UJCMS 9.6.3 - User Enumeration via IDOR", "spans": {"SYSTEM: UJCMS 9.6.3": [[0, 11]], "VULNERABILITY: IDOR": [[35, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52264"}} {"text": "Ultimate Member WordPress Plugin 2.6.6 - Privilege Escalation", "spans": {"SYSTEM: Ultimate Member WordPress Plugin 2.6.6": [[0, 38]], "VULNERABILITY: Privilege Escalation": [[41, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52393"}} {"text": "UNA CMS 14.0.0-RC - PHP Object Injection", "spans": {"SYSTEM: UNA CMS 14.0.0-RC": [[0, 17]], "VULNERABILITY: PHP Object Injection": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52139"}} {"text": "Under Construction Page with CPanel 1.0 - SQL injection", "spans": {"SYSTEM: Under Construction Page with CPanel 1.0": [[0, 39]], "VULNERABILITY: SQL injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49150"}} {"text": "Usermin 2.100 - Username Enumeration", "spans": {"SYSTEM: Usermin 2.100": [[0, 13]], "VULNERABILITY: Username Enumeration": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52254"}} {"text": "Vesta Control Panel 0.9.8-26 - Authenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Vesta Control Panel 0.9.8-26": [[0, 28]], "VULNERABILITY: Authenticated Remote Code Execution": [[31, 66]], "TOOL: Metasploit": [[68, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48294"}} {"text": "VestaCP 0.9.8 - 'v_interface' Add IP Stored XSS", "spans": {"SYSTEM: VestaCP 0.9.8": [[0, 13]], "VULNERABILITY: XSS": [[44, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49662"}} {"text": "VestaCP 0.9.8 - 'v_sftp_licence' Command Injection", "spans": {"SYSTEM: VestaCP 0.9.8": [[0, 13]], "VULNERABILITY: Command Injection": [[33, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49674"}} {"text": "VestaCP 0.9.8 - File Upload CSRF", "spans": {"SYSTEM: VestaCP 0.9.8": [[0, 13]], "VULNERABILITY: CSRF": [[28, 32]]}, "info": {"source": "exploitdb", "exploit_id": "49659"}} {"text": "VestaCP 0.9.8-26 - 'backup' Information Disclosure", "spans": {"SYSTEM: VestaCP 0.9.8-26": [[0, 16]], "VULNERABILITY: Information Disclosure": [[28, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49220"}} {"text": "VestaCP 0.9.8-26 - 'LoginAs' Insufficient Session Validation", "spans": {"SYSTEM: VestaCP 0.9.8-26": [[0, 16]], "VULNERABILITY: Insufficient Session Validation": [[29, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49219"}} {"text": "Vianeos OctoPUS 5 - 'login_user' SQLi", "spans": {"SYSTEM: Vianeos OctoPUS 5": [[0, 17]], "VULNERABILITY: SQLi": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50078"}} {"text": "Virtual Reception v1.0 - Web Server Directory Traversal", "spans": {"SYSTEM: Virtual Reception v1.0": [[0, 22]], "VULNERABILITY: Directory Traversal": [[36, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51142"}} {"text": "Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated)", "spans": {"SYSTEM: Visual Tools DVR VX16 4.2.28.0": [[0, 30]], "VULNERABILITY: Command Injection": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50098"}} {"text": "VMware vCenter Server 6.7 - Authentication Bypass", "spans": {"SYSTEM: VMware vCenter Server 6.7": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48535"}} {"text": "VMware vCenter Server 7.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: VMware vCenter Server 7.0": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50056"}} {"text": "VMware vCenter Server 7.0 - Unauthenticated File Upload", "spans": {"SYSTEM: VMware vCenter Server 7.0": [[0, 25]], "VULNERABILITY: File Upload": [[44, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49602"}} {"text": "VMware vSphere Client 8.0.3.0 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: VMware vSphere Client 8.0.3.0": [[0, 29]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[32, 68]]}, "info": {"source": "exploitdb", "exploit_id": "52406"}} {"text": "VTENEXT 19 CE - Remote Code Execution", "spans": {"SYSTEM: VTENEXT 19 CE": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48804"}} {"text": "Watcharr 1.43.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Watcharr 1.43.0": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52130"}} {"text": "WBCE CMS 1.6.3 - Authenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: WBCE CMS 1.6.3": [[0, 14]], "VULNERABILITY: Authenticated Remote Code Execution": [[17, 52]]}, "info": {"source": "exploitdb", "exploit_id": "52132"}} {"text": "WBCE CMS 1.6.4 - Remote Code Execution", "spans": {"SYSTEM: WBCE CMS 1.6.4": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52489"}} {"text": "WebCTRL OEM 6.5 - 'locale' Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WebCTRL OEM 6.5": [[0, 15]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[27, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50463"}} {"text": "WebDamn User Registration & Login System with User Panel - SQLi Auth Bypass", "spans": {"SYSTEM: WebDamn User Registration & Login System with User Panel": [[0, 56]], "VULNERABILITY: SQLi": [[59, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49170"}} {"text": "WebFileSys 2.31.0 - Directory Path Traversal", "spans": {"SYSTEM: WebFileSys 2.31.0": [[0, 17]], "VULNERABILITY: Path Traversal": [[30, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52185"}} {"text": "WebPort 1.19.1 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: WebPort 1.19.1": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting": [[17, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48611"}} {"text": "Webrun 3.6.0.42 - 'P_0' SQL Injection", "spans": {"SYSTEM: Webrun 3.6.0.42": [[0, 15]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50542"}} {"text": "WhatsApp Desktop 0.3.9308 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WhatsApp Desktop 0.3.9308": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48295"}} {"text": "WhatsUp Gold 2022 (22.1.0 Build 39) - XSS", "spans": {"SYSTEM: WhatsUp Gold 2022 (22.1.0 Build 39)": [[0, 35]], "VULNERABILITY: XSS": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51781"}} {"text": "WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WhatsUpGold 21.0.3": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[21, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50366"}} {"text": "White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI)", "spans": {"SYSTEM: White Star Software Protop 4.4.2-2024-11-27": [[0, 43]], "VULNERABILITY: Local File Inclusion": [[46, 66]]}, "info": {"source": "exploitdb", "exploit_id": "52367"}} {"text": "Wing FTP Server 6.2.5 - Privilege Escalation", "spans": {"SYSTEM: Wing FTP Server 6.2.5": [[0, 21]], "VULNERABILITY: Privilege Escalation": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48154"}} {"text": "Wondercms 4.3.2 - XSS to RCE", "spans": {"SYSTEM: Wondercms 4.3.2": [[0, 15]], "VULNERABILITY: XSS": [[18, 21]]}, "info": {"source": "exploitdb", "exploit_id": "51805"}} {"text": "WooCommerce Customers Manager 29.4 - Post-Authenticated SQL Injection", "spans": {"SYSTEM: WooCommerce Customers Manager 29.4": [[0, 34]], "VULNERABILITY: SQL Injection": [[56, 69]]}, "info": {"source": "exploitdb", "exploit_id": "52248"}} {"text": "WordPress Madara - Local File Inclusion", "spans": {"SYSTEM: WordPress Madara": [[0, 17]], "VULNERABILITY: Local File Inclusion": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52487"}} {"text": "WordPress Backup Migration 1.3.7 - Remote Command Execution", "spans": {"SYSTEM: WordPress Backup Migration 1.3.7": [[0, 32]], "VULNERABILITY: Remote Command Execution": [[35, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52486"}} {"text": "WordPress Depicter Plugin 3.6.1 - SQL Injection", "spans": {"SYSTEM: WordPress Depicter Plugin 3.6.1": [[0, 31]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52285"}} {"text": "WordPress Digits Plugin 8.4.6.1 - Authentication Bypass via OTP Bruteforcing", "spans": {"SYSTEM: WordPress Digits Plugin 8.4.6.1": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52307"}} {"text": "WordPress Frontend Login and Registration Blocks Plugin 1.0.7 - Privilege Escalation", "spans": {"SYSTEM: WordPress Frontend Login and Registration Blocks Plugin 1.0.7": [[0, 61]], "VULNERABILITY: Privilege Escalation": [[64, 84]]}, "info": {"source": "exploitdb", "exploit_id": "52291"}} {"text": "WordPress Plugin 5.2.0 - Broken Access Control", "spans": {"SYSTEM: WordPress Plugin 5.2.0": [[0, 23]], "VULNERABILITY: Broken Access Control": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52511"}} {"text": "Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated)", "spans": {"SYSTEM: Wordpress Plugin Canto 1.3.0": [[0, 28]], "VULNERABILITY: SSRF": [[37, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49189"}} {"text": "WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Colorbox Lightbox v1.1.1": [[0, 41]], "VULNERABILITY: Persistent Cross-Site Scripting": [[44, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48919"}} {"text": "WordPress Plugin Total Upkeep 1.14.9 - Database and Files Backup Download", "spans": {"SYSTEM: WordPress Plugin Total Upkeep 1.14.9": [[0, 36]], "VULNERABILITY: Database and Files Backup Download": [[39, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49252"}} {"text": "WordPress Quiz Maker 6.7.0.56 - SQL Injection", "spans": {"SYSTEM: WordPress Quiz Maker 6.7.0.56": [[0, 29]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52465"}} {"text": "WordPress User Registration & Membership Plugin 4.1.1 - Unauthenticated Privilege Escalation", "spans": {"SYSTEM: WordPress User Registration & Membership Plugin 4.1.1": [[0, 53]], "VULNERABILITY: Privilege Escalation": [[72, 92]]}, "info": {"source": "exploitdb", "exploit_id": "52137"}} {"text": "WordPress User Registration & Membership Plugin 4.1.2 - Authentication Bypass", "spans": {"SYSTEM: WordPress User Registration & Membership Plugin 4.1.2": [[0, 53]], "VULNERABILITY: Authentication Bypass": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52302"}} {"text": "WP Publications WordPress Plugin 1.2 - Stored XSS", "spans": {"SYSTEM: WP Publications WordPress Plugin 1.2": [[0, 36]], "VULNERABILITY: XSS": [[46, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52368"}} {"text": "WPanel 4.3.1 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WPanel 4.3.1": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50255"}} {"text": "Wyomind Help Desk 1.3.6 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Wyomind Help Desk 1.3.6": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50113"}} {"text": "Xinet Elegant 6 Asset Lib Web UI 6.1.655 - SQL Injection", "spans": {"SYSTEM: Xinet Elegant 6 Asset Lib Web UI 6.1.655": [[0, 40]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "52192"}} {"text": "Xmind 2020 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Xmind 2020": [[0, 10]], "VULNERABILITY: Persistent Cross-Site Scripting": [[13, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49827"}} {"text": "xuucms 3 - 'keywords' SQL Injection", "spans": {"SYSTEM: xuucms 3": [[0, 8]], "VULNERABILITY: SQL Injection": [[22, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49073"}} {"text": "XWiki 14 - SQL Injection via getdeleteddocuments.vm", "spans": {"SYSTEM: XWiki 14": [[0, 8]], "VULNERABILITY: SQL Injection": [[11, 24]]}, "info": {"source": "exploitdb", "exploit_id": "52384"}} {"text": "Xwiki CMS 12.10.2 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Xwiki CMS 12.10.2": [[0, 17]], "VULNERABILITY: Cross Site Scripting": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49437"}} {"text": "XWiki Platform 15.10.10 - Metasploit Module for Remote Code Execution (RCE)", "spans": {"SYSTEM: XWiki Platform 15.10.10": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[48, 75]], "TOOL: Metasploit": [[26, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52429"}} {"text": "XWiki Platform 15.10.10 - Remote Code Execution", "spans": {"SYSTEM: XWiki Platform 15.10.10": [[0, 23]], "VULNERABILITY: Remote Code Execution": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52136"}} {"text": "YesWiki 4.5.1 - Unauthenticated Path Traversal", "spans": {"SYSTEM: YesWiki 4.5.1": [[0, 13]], "VULNERABILITY: Path Traversal": [[32, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52135"}} {"text": "YOURLS 1.8.2 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: YOURLS 1.8.2": [[0, 12]], "VULNERABILITY: CSRF": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52446"}} {"text": "ZesleCP 3.1.9 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: ZesleCP 3.1.9": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50233"}} {"text": "Zhiyuan OA - arbitrary file upload leading", "spans": {"SYSTEM: Zhiyuan OA": [[0, 10]], "VULNERABILITY: arbitrary file upload leading": [[13, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52490"}} {"text": "Zohocorp ManageEngine ADManager Plus 7210 - Elevation of Privilege", "spans": {"SYSTEM: Zohocorp ManageEngine ADManager Plus 7210": [[0, 41]], "VULNERABILITY: Elevation of Privilege": [[44, 66]]}, "info": {"source": "exploitdb", "exploit_id": "52148"}} {"text": "Zyxel ZyWALL 2 Plus Internet Security Appliance - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Zyxel ZyWALL 2 Plus Internet Security Appliance": [[0, 47]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[50, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50797"}} {"text": "unzip-stream 0.3.1 - Arbitrary File Write", "spans": {"SYSTEM: unzip-stream 0.3.1": [[0, 18]], "VULNERABILITY: Arbitrary File Write": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52276"}} {"text": "NodeJS 24.x - Path Traversal", "spans": {"SYSTEM: NodeJS 24.x": [[0, 11]], "VULNERABILITY: Path Traversal": [[14, 28]]}, "info": {"source": "exploitdb", "exploit_id": "52369"}} {"text": "Node.JS - 'node-serialize' Remote Code Execution (2)", "spans": {"SYSTEM: Node.JS": [[0, 7]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49552"}} {"text": "Node.JS - 'node-serialize' Remote Code Execution (3)", "spans": {"SYSTEM: Node.JS": [[0, 7]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50036"}} {"text": "Numbas < v7.3 - Remote Code Execution", "spans": {"SYSTEM: Numbas < v7.3": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51867"}} {"text": "Strapi CMS 3.0.0-beta.17.4 - Set Password (Unauthenticated) (Metasploit)", "spans": {"SYSTEM: Strapi CMS 3.0.0-beta.17.4": [[0, 26]], "VULNERABILITY: Set Password": [[29, 41]], "TOOL: Metasploit": [[61, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50716"}} {"text": "OpenSMTPD 6.4.0 < 6.6.1 - Local Privilege Escalation + Remote Code Execution", "spans": {"SYSTEM: OpenSMTPD 6.4.0 < 6.6.1": [[0, 23]], "VULNERABILITY: Remote Code Execution": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48051"}} {"text": "OpenSMTPD < 6.6.3p1 - Local Privilege Escalation + Remote Code Execution", "spans": {"SYSTEM: OpenSMTPD < 6.6.3p1": [[0, 19]], "VULNERABILITY: Remote Code Execution": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48140"}} {"text": "OTRS 6.0.1 - Remote Command Execution (2)", "spans": {"SYSTEM: OTRS 6.0.1": [[0, 10]], "VULNERABILITY: Remote Command Execution": [[13, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49794"}} {"text": "Thruk Monitoring Web Interface 3.06 - Path Traversal", "spans": {"SYSTEM: Thruk Monitoring Web Interface 3.06": [[0, 35]], "VULNERABILITY: Path Traversal": [[38, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51509"}} {"text": "Webmin Usermin 2.100 - Username Enumeration", "spans": {"SYSTEM: Webmin Usermin 2.100": [[0, 20]], "VULNERABILITY: Username Enumeration": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52114"}} {"text": "ImageMagick 7.1.0-49 - DoS", "spans": {"SYSTEM: ImageMagick 7.1.0-49": [[0, 20]], "VULNERABILITY: DoS": [[23, 26]]}, "info": {"source": "exploitdb", "exploit_id": "51256"}} {"text": "WordPress Plugin WPGraphQL 1.3.5 - Denial of Service", "spans": {"SYSTEM: WordPress Plugin WPGraphQL 1.3.5": [[0, 32]], "VULNERABILITY: Denial of Service": [[35, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49807"}} {"text": "ABB Cylon Aspect 3.08.02 (deployStart.php) - Unauthenticated Command Execution", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (deployStart.php)": [[0, 42]], "VULNERABILITY: Unauthenticated Command Execution": [[45, 78]]}, "info": {"source": "exploitdb", "exploit_id": "52251"}} {"text": "ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS)", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php)": [[0, 47]], "VULNERABILITY: Denial of Service": [[50, 67]]}, "info": {"source": "exploitdb", "exploit_id": "52218"}} {"text": "ABB Cylon Aspect 3.08.02 (ethernetUpdate.php) - Authenticated Path Traversal", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (ethernetUpdate.php)": [[0, 45]], "VULNERABILITY: Path Traversal": [[63, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52252"}} {"text": "ABB Cylon Aspect 3.08.02 (webServerUpdate.php) - Input Validation Config Poisoning", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.02 (webServerUpdate.php)": [[0, 46]], "VULNERABILITY: Input Validation Config Poisoning": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "52219"}} {"text": "ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php)": [[0, 57]], "VULNERABILITY: File Write DoS": [[61, 75]]}, "info": {"source": "exploitdb", "exploit_id": "52234"}} {"text": "ABB Cylon Aspect 4.00.00 (factorySaved.php) - Unauthenticated XSS", "spans": {"SYSTEM: ABB Cylon Aspect 4.00.00 (factorySaved.php)": [[0, 43]], "VULNERABILITY: XSS": [[62, 65]]}, "info": {"source": "exploitdb", "exploit_id": "52233"}} {"text": "ABB Cylon Aspect 4.00.00 (factorySetSerialNum.php) - Remote Code Execution", "spans": {"SYSTEM: ABB Cylon Aspect 4.00.00 (factorySetSerialNum.php)": [[0, 50]], "VULNERABILITY: Remote Code Execution": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "52232"}} {"text": "PHP 7.0 < 7.4 (Unix) - 'debug_backtrace' disable_functions Bypass", "spans": {"SYSTEM: PHP 7.0 < 7.4 (Unix)": [[0, 20]], "VULNERABILITY: disable_functions Bypass": [[41, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48072"}} {"text": "AC Repair and Services System v1.0 - Multiple SQL Injection", "spans": {"SYSTEM: AC Repair and Services System v1.0": [[0, 34]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51844"}} {"text": "Blood Bank & Donor Management System using v2.2 - Stored XSS", "spans": {"SYSTEM: Blood Bank & Donor Management System using v2.2": [[0, 47]], "VULNERABILITY: XSS": [[57, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51750"}} {"text": "code-projects Online Exam Mastering System 1.0 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: code-projects Online Exam Mastering System 1.0": [[0, 46]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[49, 85]]}, "info": {"source": "exploitdb", "exploit_id": "52272"}} {"text": "Enrollment System v1.0 - SQL Injection", "spans": {"SYSTEM: Enrollment System v1.0": [[0, 22]], "VULNERABILITY: SQL Injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51845"}} {"text": "Equipment Rental Script-1.0 - SQLi", "spans": {"SYSTEM: Equipment Rental Script-1.0": [[0, 27]], "VULNERABILITY: SQLi": [[30, 34]]}, "info": {"source": "exploitdb", "exploit_id": "51749"}} {"text": "FAQ Management System v1.0 - 'faq' SQL Injection", "spans": {"SYSTEM: FAQ Management System v1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51813"}} {"text": "Flashcard Quiz App v1.0 - 'card' SQL Injection", "spans": {"SYSTEM: Flashcard Quiz App v1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51812"}} {"text": "Petrol Pump Management Software v.1.0 - SQL Injection", "spans": {"SYSTEM: Petrol Pump Management Software v.1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51838"}} {"text": "Petrol Pump Management Software v.1.0 - Stored Cross Site Scripting via SVG file", "spans": {"SYSTEM: Petrol Pump Management Software v.1.0": [[0, 37]], "VULNERABILITY: Stored Cross Site Scripting": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51837"}} {"text": "Petrol Pump Management Software v1.0 - 'Address' Stored Cross Site Scripting", "spans": {"SYSTEM: Petrol Pump Management Software v1.0": [[0, 36]], "VULNERABILITY: Stored Cross Site Scripting": [[49, 76]]}, "info": {"source": "exploitdb", "exploit_id": "51836"}} {"text": "Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload", "spans": {"SYSTEM: Petrol Pump Management Software v1.0": [[0, 36]], "VULNERABILITY: Remote Code Execution": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51839"}} {"text": "PHP-FPM - Underflow Remote Code Execution (Metasploit)", "spans": {"SYSTEM: PHP-FPM": [[0, 7]], "VULNERABILITY: Remote Code Execution": [[20, 41]], "TOOL: Metasploit": [[43, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48182"}} {"text": "PHPMyAdmin 3.0 - Bruteforce Login Bypass", "spans": {"SYSTEM: PHPMyAdmin 3.0": [[0, 14]], "VULNERABILITY: Bruteforce Login Bypass": [[17, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52414"}} {"text": "PHPStudy - Backdoor Remote Code execution (Metasploit)", "spans": {"SYSTEM: PHPStudy": [[0, 8]], "VULNERABILITY: Backdoor Remote Code execution": [[11, 41]], "TOOL: Metasploit": [[43, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48192"}} {"text": "Pi-Hole - heisenbergCompensator Blocklist OS Command Execution (Metasploit)", "spans": {"SYSTEM: Pi-Hole": [[0, 7]], "VULNERABILITY: heisenbergCompensator Blocklist OS Command Execution": [[10, 62]], "TOOL: Metasploit": [[64, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48491"}} {"text": "PlaySMS - index.php Unauthenticated Template Injection Code Execution (Metasploit)", "spans": {"SYSTEM: PlaySMS": [[0, 7]], "VULNERABILITY: index.php Unauthenticated Template Injection Code Execution": [[10, 69]], "TOOL: Metasploit": [[71, 81]]}, "info": {"source": "exploitdb", "exploit_id": "48335"}} {"text": "Real Estate Management System v1.0 - Remote Code Execution via File Upload", "spans": {"SYSTEM: Real Estate Management System v1.0": [[0, 34]], "VULNERABILITY: Remote Code Execution": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51840"}} {"text": "Simple Inventory Management System v1.0 - 'email' SQL Injection", "spans": {"SYSTEM: Simple Inventory Management System v1.0": [[0, 39]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51808"}} {"text": "Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection", "spans": {"SYSTEM: Simple Student Attendance System v1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[82, 95]]}, "info": {"source": "exploitdb", "exploit_id": "51842"}} {"text": "Simple Student Attendance System v1.0 - Time Based Blind SQL Injection", "spans": {"SYSTEM: Simple Student Attendance System v1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51841"}} {"text": "WonderCMS 3.4.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: WonderCMS 3.4.2": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52271"}} {"text": "'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery", "spans": {"SYSTEM: 'customhs_js_content'": [[0, 21], [24, 45]], "VULNERABILITY: Cross-Site Request Forgery": [[46, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49712"}} {"text": "101 News 1.0 - Multiple-SQLi", "spans": {"SYSTEM: 101 News 1.0": [[0, 12]], "VULNERABILITY: SQLi": [[24, 28]]}, "info": {"source": "exploitdb", "exploit_id": "51759"}} {"text": "4images 1.8 - 'limitnumber' SQL Injection (Authenticated)", "spans": {"SYSTEM: 4images 1.8": [[0, 11]], "VULNERABILITY: SQL Injection": [[28, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50193"}} {"text": "4Images 1.8 - 'redirect' Reflected XSS", "spans": {"SYSTEM: 4Images 1.8": [[0, 11]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49945"}} {"text": "4images 1.9 - Remote Command Execution (RCE)", "spans": {"SYSTEM: 4images 1.9": [[0, 11]], "VULNERABILITY: Remote Command Execution": [[14, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51147"}} {"text": "4images v1.7.11 - 'Profile Image' Stored Cross-Site Scripting", "spans": {"SYSTEM: 4images v1.7.11": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting": [[34, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49339"}} {"text": "60CycleCMS - 'news.php' SQL Injection", "spans": {"SYSTEM: 60CycleCMS": [[0, 10]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48177"}} {"text": "Abantecart v1.3.2 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Abantecart v1.3.2": [[0, 17]], "VULNERABILITY: Authenticated Remote Code Execution": [[20, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51058"}} {"text": "ABB Cylon Aspect 3.07.01 - Hard-coded Default Credentials", "spans": {"SYSTEM: ABB Cylon Aspect 3.07.01": [[0, 24]], "VULNERABILITY: Hard-coded Default Credentials": [[27, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52112"}} {"text": "ABB Cylon Aspect 3.08.01 - Arbitrary File Delete", "spans": {"SYSTEM: ABB Cylon Aspect 3.08.01": [[0, 24]], "VULNERABILITY: Arbitrary File Delete": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52108"}} {"text": "Academy LMS 6.0 - Reflected XSS", "spans": {"SYSTEM: Academy LMS 6.0": [[0, 15]], "VULNERABILITY: XSS": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51654"}} {"text": "Academy LMS 6.1 - Arbitrary File Upload", "spans": {"SYSTEM: Academy LMS 6.1": [[0, 15]], "VULNERABILITY: Arbitrary File Upload": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51702"}} {"text": "Academy LMS 6.2 - SQL Injection", "spans": {"SYSTEM: Academy LMS 6.2": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51758"}} {"text": "Accounting Journal Management System 1.0 - 'id' SQLi (Authenticated)", "spans": {"SYSTEM: Accounting Journal Management System 1.0": [[0, 40]], "VULNERABILITY: SQLi": [[48, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50736"}} {"text": "Active Super Shop CMS v2.5 - HTML Injection Vulnerabilities", "spans": {"SYSTEM: Active Super Shop CMS v2.5": [[0, 26]], "VULNERABILITY: HTML Injection Vulnerabilities": [[29, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51613"}} {"text": "addressbook 9.0.0.1 - 'id' SQL Injection", "spans": {"SYSTEM: addressbook 9.0.0.1": [[0, 19]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48416"}} {"text": "Adiscon LogAnalyzer v.4.1.13 - Cross Site Scripting", "spans": {"SYSTEM: Adiscon LogAnalyzer v.4.1.13": [[0, 28]], "VULNERABILITY: Cross Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51643"}} {"text": "Adive Framework 2.0.8 - Cross-Site Request Forgery (Change Admin Password)", "spans": {"SYSTEM: Adive Framework 2.0.8": [[0, 21]], "VULNERABILITY: Cross-Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47966"}} {"text": "Adive Framework 2.0.8 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Adive Framework 2.0.8": [[0, 21]], "VULNERABILITY: Persistent Cross-Site Scripting": [[24, 55]]}, "info": {"source": "exploitdb", "exploit_id": "47946"}} {"text": "Adlisting Classified Ads 2.14.0 - WebPage Content Information Disclosure", "spans": {"SYSTEM: Adlisting Classified Ads 2.14.0": [[0, 31]], "VULNERABILITY: Information Disclosure": [[50, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51667"}} {"text": "Admidio v4.2.10 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Admidio v4.2.10": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51590"}} {"text": "admidio v4.2.5 - CSV Injection", "spans": {"SYSTEM: admidio v4.2.5": [[0, 14]], "VULNERABILITY: CSV Injection": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51402"}} {"text": "AdminLTE PiHole 5.18 - Broken Access Control", "spans": {"SYSTEM: AdminLTE PiHole 5.18": [[0, 20]], "VULNERABILITY: Broken Access Control": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51705"}} {"text": "Advanced Comment System 1.0 - 'ACS_path' Path Traversal", "spans": {"SYSTEM: Advanced Comment System 1.0": [[0, 27]], "VULNERABILITY: Path Traversal": [[41, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49343"}} {"text": "Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Advanced Guestbook 2.4.4": [[0, 24]], "VULNERABILITY: Persistent Cross-Site Scripting": [[37, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49875"}} {"text": "Advanced Page Visit Counter 1.0 - Admin+ Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Advanced Page Visit Counter 1.0": [[0, 31]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[41, 74]]}, "info": {"source": "exploitdb", "exploit_id": "51785"}} {"text": "Advanced Webhost Billing System 3.7.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Advanced Webhost Billing System 3.7.0": [[0, 37]], "VULNERABILITY: CSRF": [[68, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49369"}} {"text": "AEGON LIFE v1.0 Life Insurance Management System - SQL injection vulnerability.", "spans": {"SYSTEM: AEGON LIFE v1.0 Life Insurance Management System": [[0, 48]], "VULNERABILITY: SQL injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "52046"}} {"text": "AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting (XSS)", "spans": {"SYSTEM: AEGON LIFE v1.0 Life Insurance Management System": [[0, 48]], "VULNERABILITY: XSS": [[80, 83]]}, "info": {"source": "exploitdb", "exploit_id": "52042"}} {"text": "Aero CMS v0.0.1 - PHP Code Injection (auth)", "spans": {"SYSTEM: Aero CMS v0.0.1": [[0, 15]], "VULNERABILITY: Code Injection": [[22, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51085"}} {"text": "Aero CMS v0.0.1 - SQL Injection (no auth)", "spans": {"SYSTEM: Aero CMS v0.0.1": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51083"}} {"text": "Aero CMS v0.0.1 - SQLi", "spans": {"SYSTEM: Aero CMS v0.0.1": [[0, 15]], "VULNERABILITY: SQLi": [[18, 22]]}, "info": {"source": "exploitdb", "exploit_id": "51022"}} {"text": "Affiliate Me Version 5.0.1 - SQL Injection", "spans": {"SYSTEM: Affiliate Me Version 5.0.1": [[0, 26]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51468"}} {"text": "Affiliate Pro 1.7 - 'Multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: Affiliate Pro 1.7": [[0, 17]], "VULNERABILITY: Cross Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50678"}} {"text": "Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Agilebio Lab Collector Electronic Lab Notebook v4.234": [[0, 54]], "VULNERABILITY: Remote Code Execution (RCE)": [[57, 84]]}, "info": {"source": "exploitdb", "exploit_id": "51307"}} {"text": "Aimeos Laravel ecommerce platform 2021.10 LTS - 'sort' SQL injection", "spans": {"SYSTEM: Aimeos Laravel ecommerce platform 2021.10 LTS": [[0, 45]], "VULNERABILITY: SQL injection": [[55, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50538"}} {"text": "Air Cargo Management System v1.0 - SQLi", "spans": {"SYSTEM: Air Cargo Management System v1.0": [[0, 32]], "VULNERABILITY: SQLi": [[35, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50779"}} {"text": "Akaunting 3.1.8 - Server-Side Template Injection (SSTI)", "spans": {"SYSTEM: Akaunting 3.1.8": [[0, 15]], "VULNERABILITY: SSTI": [[50, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52030"}} {"text": "Akaunting < 3.1.3 - RCE", "spans": {"SYSTEM: Akaunting < 3.1.3": [[0, 17]], "VULNERABILITY: RCE": [[20, 23]]}, "info": {"source": "exploitdb", "exploit_id": "51870"}} {"text": "Alfresco 5.2.4 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Alfresco 5.2.4": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48162"}} {"text": "Alphaware E-Commerce System 1.0 - Unauthenicated Remote Code Execution (File Upload + SQL injection)", "spans": {"SYSTEM: Alphaware E-Commerce System 1.0": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49652"}} {"text": "AlphaWeb XE - File Upload Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: AlphaWeb XE": [[0, 11]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50297"}} {"text": "Alumni Management System 1.0 - _Course Form_ Stored XSS", "spans": {"SYSTEM: Alumni Management System 1.0": [[0, 28]], "VULNERABILITY: XSS": [[52, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49286"}} {"text": "Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS", "spans": {"SYSTEM: Alumni Management System 1.0": [[0, 28]], "VULNERABILITY: XSS": [[77, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49433"}} {"text": "Alumni Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Alumni Management System 1.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49287"}} {"text": "Alumni Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Alumni Management System 1.0": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48883"}} {"text": "Alumni Management System 1.0 - Unrestricted File Upload To RCE", "spans": {"SYSTEM: Alumni Management System 1.0": [[0, 28]], "VULNERABILITY: RCE": [[59, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49285"}} {"text": "AmazCart CMS 3.4 - Cross-Site-Scripting (XSS)", "spans": {"SYSTEM: AmazCart CMS 3.4": [[0, 16]], "VULNERABILITY: XSS": [[41, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51219"}} {"text": "AMSS++ 4.7 - Backdoor Admin Account", "spans": {"SYSTEM: AMSS++ 4.7": [[0, 10]], "VULNERABILITY: Backdoor Admin Account": [[13, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48114"}} {"text": "AMSS++ v 4.31 - 'id' SQL Injection", "spans": {"SYSTEM: AMSS++ v 4.31": [[0, 13]], "VULNERABILITY: SQL Injection": [[21, 34]]}, "info": {"source": "exploitdb", "exploit_id": "48109"}} {"text": "Anchor CMS 0.12.7 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: Anchor CMS 0.12.7": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48832"}} {"text": "Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Anchor CMS 0.12.7": [[0, 17]], "VULNERABILITY: Stored Cross Site Scripting": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52327"}} {"text": "Anuko Time Tracker - SQLi (Authenticated)", "spans": {"SYSTEM: Anuko Time Tracker": [[0, 18]], "VULNERABILITY: SQLi": [[21, 25]]}, "info": {"source": "exploitdb", "exploit_id": "50915"}} {"text": "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality", "spans": {"SYSTEM: Anuko Time Tracker 1.19.23.5311": [[0, 31]], "VULNERABILITY: No rate Limit on Password Reset functionality": [[34, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49173"}} {"text": "Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover", "spans": {"SYSTEM: Anuko Time Tracker 1.19.23.5311": [[0, 31]], "VULNERABILITY: Password Reset leading to Account Takeover": [[34, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49174"}} {"text": "Anuko Time Tracker 1.19.23.5325 - CSV/Formula Injection", "spans": {"SYSTEM: Anuko Time Tracker 1.19.23.5325": [[0, 31]], "VULNERABILITY: CSV/Formula Injection": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49027"}} {"text": "Apache mod_proxy_cluster 1.2.6 - Stored XSS", "spans": {"SYSTEM: Apache mod_proxy_cluster 1.2.6": [[0, 30]], "VULNERABILITY: XSS": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52010"}} {"text": "Apartment Visitor Management System (AVMS) 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Apartment Visitor Management System (AVMS) 1.0": [[0, 46]], "VULNERABILITY: SQL Injection": [[60, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50288"}} {"text": "Apartment Visitors Management System 1.0 - 'email' SQL Injection", "spans": {"SYSTEM: Apartment Visitors Management System 1.0": [[0, 40]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49448"}} {"text": "Apartment Visitors Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Apartment Visitors Management System 1.0": [[0, 40]], "VULNERABILITY: Authentication Bypass": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49335"}} {"text": "appRain CMF 4.0.5 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: appRain CMF 4.0.5": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52041"}} {"text": "AquilaCMS 1.409.20 - Remote Command Execution (RCE)", "spans": {"SYSTEM: AquilaCMS 1.409.20": [[0, 18]], "VULNERABILITY: Remote Command Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52164"}} {"text": "Art Gallery Management System Project in PHP v 1.0 - SQL injection", "spans": {"SYSTEM: Art Gallery Management System Project in PHP v 1.0": [[0, 50]], "VULNERABILITY: SQL injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51272"}} {"text": "Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Art Gallery Management System Project v1.0": [[0, 42]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[45, 81]]}, "info": {"source": "exploitdb", "exploit_id": "51214"}} {"text": "Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated", "spans": {"SYSTEM: Art Gallery Management System Project v1.0": [[0, 42]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51215"}} {"text": "Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated", "spans": {"SYSTEM: Art Gallery Management System Project v1.0": [[0, 42]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51216"}} {"text": "Artica Proxy 4.50 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Artica Proxy 4.50": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52146"}} {"text": "Artworks Gallery Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Artworks Gallery Management System 1.0": [[0, 38]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49319"}} {"text": "Arunna 1.0.0 - 'Multiple' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Arunna 1.0.0": [[0, 12]], "VULNERABILITY: CSRF": [[54, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50608"}} {"text": "Atom CMS 2.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Atom CMS 2.0": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50840"}} {"text": "Atom CMS v2.0 - SQL Injection (no auth)", "spans": {"SYSTEM: Atom CMS v2.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51086"}} {"text": "atrocore 1.5.25 User interaction - Unauthenticated File upload - RCE", "spans": {"SYSTEM: atrocore 1.5.25 User interaction - Unauthenticated File upload": [[0, 62]], "VULNERABILITY: RCE": [[65, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51271"}} {"text": "Attendance and Payroll System v1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Attendance and Payroll System v1.0": [[0, 34]], "VULNERABILITY: Remote Code Execution (RCE)": [[37, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50801"}} {"text": "Attendance and Payroll System v1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Attendance and Payroll System v1.0": [[0, 34]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50802"}} {"text": "ATutor 2.2.4 - 'id' SQL Injection", "spans": {"SYSTEM: ATutor 2.2.4": [[0, 12]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "48117"}} {"text": "Aures Booking & POS Terminal - Local Privilege Escalation", "spans": {"SYSTEM: Aures Booking & POS Terminal": [[0, 28]], "VULNERABILITY: Local Privilege Escalation": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51617"}} {"text": "Auto Dealer Management System 1.0 - Broken Access Control Exploit", "spans": {"SYSTEM: Auto Dealer Management System 1.0": [[0, 33]], "VULNERABILITY: Broken Access Control Exploit": [[36, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51281"}} {"text": "Auto Dealer Management System v1.0 - SQL Injection", "spans": {"SYSTEM: Auto Dealer Management System v1.0": [[0, 34]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51282"}} {"text": "Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php", "spans": {"SYSTEM: Auto Dealer Management System v1.0": [[0, 34]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51283"}} {"text": "Auto Dealer Management System v1.0 - SQL Injection on manage_user.php", "spans": {"SYSTEM: Auto Dealer Management System v1.0": [[0, 34]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51284"}} {"text": "Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Automad 2.0.0-alpha.4": [[0, 21]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[24, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52056"}} {"text": "Automatic-Systems SOC FL9600 FastLine - Directory Transversal", "spans": {"SYSTEM: Automatic-Systems SOC FL9600 FastLine": [[0, 37]], "VULNERABILITY: Directory Transversal": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51823"}} {"text": "Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin", "spans": {"SYSTEM: Automatic-Systems SOC FL9600 FastLine": [[0, 37]], "VULNERABILITY: The device contains hardcoded login and password for super admin": [[40, 104]]}, "info": {"source": "exploitdb", "exploit_id": "51824"}} {"text": "Availability Booking Calendar v1.0 - Multiple Cross-site scripting (XSS)", "spans": {"SYSTEM: Availability Booking Calendar v1.0": [[0, 34]], "VULNERABILITY: XSS": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51626"}} {"text": "Axigen < 10.5.7 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Axigen < 10.5.7": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51963"}} {"text": "Azon Dominator Affiliate Marketing Script - SQL Injection", "spans": {"SYSTEM: Azon Dominator Affiliate Marketing Script": [[0, 41]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "52059"}} {"text": "b2evolution 6.11.6 - 'plugin name' Stored XSS", "spans": {"SYSTEM: b2evolution 6.11.6": [[0, 18]], "VULNERABILITY: XSS": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49551"}} {"text": "b2evolution 6.11.6 - 'redirect_to' Open Redirect", "spans": {"SYSTEM: b2evolution 6.11.6": [[0, 18]], "VULNERABILITY: Open Redirect": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49554"}} {"text": "b2evolution 6.11.6 - 'tab3' Reflected XSS", "spans": {"SYSTEM: b2evolution 6.11.6": [[0, 18]], "VULNERABILITY: XSS": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49555"}} {"text": "b2evolution 7-2-2 - 'cf_name' SQL Injection", "spans": {"SYSTEM: b2evolution 7-2-2": [[0, 17]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49840"}} {"text": "b2evolution 7.2.2 - 'edit account details' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: b2evolution 7.2.2": [[0, 17]], "VULNERABILITY: CSRF": [[71, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50081"}} {"text": "Baby Care System 1.0 - 'Post title' Stored XSS", "spans": {"SYSTEM: Baby Care System 1.0": [[0, 20]], "VULNERABILITY: XSS": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49358"}} {"text": "Baby Care System 1.0 - 'roleid' SQL Injection", "spans": {"SYSTEM: Baby Care System 1.0": [[0, 20]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49331"}} {"text": "Backdrop CMS 1.20.0 - 'Multiple' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Backdrop CMS 1.20.0": [[0, 19]], "VULNERABILITY: CSRF": [[61, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50323"}} {"text": "Backdrop CMS 1.23.0 - Stored XSS", "spans": {"SYSTEM: Backdrop CMS 1.23.0": [[0, 19]], "VULNERABILITY: XSS": [[29, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51905"}} {"text": "Backdrop CMS 1.27.1 - Authenticated Remote Command Execution (RCE)", "spans": {"SYSTEM: Backdrop CMS 1.27.1": [[0, 19]], "VULNERABILITY: Remote Command Execution": [[36, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52021"}} {"text": "Backdrop Cms v1.25.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Backdrop Cms v1.25.1": [[0, 20]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[23, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51597"}} {"text": "Backup and Staging by WP Time Capsule 1.22.21 - Unauthenticated Arbitrary File Upload", "spans": {"SYSTEM: Backup and Staging by WP Time Capsule 1.22.21": [[0, 45]], "VULNERABILITY: Arbitrary File Upload": [[64, 85]]}, "info": {"source": "exploitdb", "exploit_id": "52131"}} {"text": "Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Balbooa Joomla Forms Builder 2.0.6": [[0, 34]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50447"}} {"text": "Bang Resto v1.0 - 'Multiple' SQL Injection", "spans": {"SYSTEM: Bang Resto v1.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51378"}} {"text": "Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Bang Resto v1.0": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[18, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51377"}} {"text": "Bangresto 1.0 - SQL Injection", "spans": {"SYSTEM: Bangresto 1.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51175"}} {"text": "Bank Locker Management System - SQL Injection", "spans": {"SYSTEM: Bank Locker Management System": [[0, 29]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51751"}} {"text": "Barangay Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Barangay Management System 1.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48660"}} {"text": "Barcodes generator 1.0 - 'name' Stored Cross Site Scripting", "spans": {"SYSTEM: Barcodes generator 1.0": [[0, 22]], "VULNERABILITY: Stored Cross Site Scripting": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49227"}} {"text": "Barebones CMS v2.0.2 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Barebones CMS v2.0.2": [[0, 20]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[23, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51502"}} {"text": "Basic Shopping Cart 1.0 - Authentication Bypass", "spans": {"SYSTEM: Basic Shopping Cart 1.0": [[0, 23]], "VULNERABILITY: Authentication Bypass": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49741"}} {"text": "Batflat CMS 1.3.6 - 'multiple' Stored XSS", "spans": {"SYSTEM: Batflat CMS 1.3.6": [[0, 17]], "VULNERABILITY: XSS": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49583"}} {"text": "Batflat CMS 1.3.6 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Batflat CMS 1.3.6": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49573"}} {"text": "Beauty Parlour Management System 1.0 - 'sername' SQL Injection", "spans": {"SYSTEM: Beauty Parlour Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[49, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49580"}} {"text": "Beauty Parlour Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Beauty Parlour Management System 1.0": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48605"}} {"text": "Beauty Salon Management System v1.0 - SQLi", "spans": {"SYSTEM: Beauty Salon Management System v1.0": [[0, 35]], "VULNERABILITY: SQLi": [[38, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51568"}} {"text": "Beauty-salon v1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Beauty-salon v1.0": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51098"}} {"text": "Beehive Forum - Account Takeover", "spans": {"SYSTEM: Beehive Forum": [[0, 13]], "VULNERABILITY: Account Takeover": [[16, 32]]}, "info": {"source": "exploitdb", "exploit_id": "50923"}} {"text": "berliCRM 1.0.24 - 'src_record' SQL Injection", "spans": {"SYSTEM: berliCRM 1.0.24": [[0, 15]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48872"}} {"text": "Best pos Management System v1.0 - Remote Code Execution (RCE) on File Upload", "spans": {"SYSTEM: Best pos Management System v1.0": [[0, 31]], "VULNERABILITY: Remote Code Execution (RCE)": [[34, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51280"}} {"text": "Best pos Management System v1.0 - SQL Injection", "spans": {"SYSTEM: Best pos Management System v1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51279"}} {"text": "Best POS Management System v1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Best POS Management System v1.0": [[0, 31]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[34, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51462"}} {"text": "Best Student Result Management System v1.0 - Multiple SQLi", "spans": {"SYSTEM: Best Student Result Management System v1.0": [[0, 42]], "VULNERABILITY: SQLi": [[54, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51972"}} {"text": "Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)", "spans": {"SYSTEM: Best Support System 3.0.4": [[0, 25]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49122"}} {"text": "bgERP v22.31 (Orlovets) - Cookie Session vulnerability & Cross-Site Scripting (XSS)", "spans": {"SYSTEM: bgERP v22.31 (Orlovets)": [[0, 23]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[57, 83]]}, "info": {"source": "exploitdb", "exploit_id": "51245"}} {"text": "BigTree CMS 4.4.10 - Remote Code Execution", "spans": {"SYSTEM: BigTree CMS 4.4.10": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48831"}} {"text": "Billing Management System 2.0 - 'email' SQL injection Auth Bypass", "spans": {"SYSTEM: Billing Management System 2.0": [[0, 29]], "VULNERABILITY: SQL injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49570"}} {"text": "Billing Management System 2.0 - Union based SQL injection (Authenticated)", "spans": {"SYSTEM: Billing Management System 2.0": [[0, 29]], "VULNERABILITY: SQL injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49874"}} {"text": "Billing System Project 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Billing System Project 1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50102"}} {"text": "Bitrix24 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Bitrix24": [[0, 8]], "VULNERABILITY: Remote Code Execution (RCE)": [[11, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50898"}} {"text": "BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS)", "spans": {"SYSTEM: BlackCat CMS 1.3.6": [[0, 18]], "VULNERABILITY: Cross Site Scripting": [[36, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49565"}} {"text": "BlackCat CMS 1.3.6 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: BlackCat CMS 1.3.6": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[32, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49779"}} {"text": "BlackCat CMS 1.3.6 - Cross-Site Request Forgery", "spans": {"SYSTEM: BlackCat CMS 1.3.6": [[0, 18]], "VULNERABILITY: Cross-Site Request Forgery": [[21, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48820"}} {"text": "Blackcat Cms v1.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Blackcat Cms v1.4": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51605"}} {"text": "Blackcat Cms v1.4 - Stored XSS", "spans": {"SYSTEM: Blackcat Cms v1.4": [[0, 17]], "VULNERABILITY: XSS": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51604"}} {"text": "Blood Bank 1.0 - 'bid' SQLi", "spans": {"SYSTEM: Blood Bank 1.0": [[0, 14]], "VULNERABILITY: SQLi": [[23, 27]]}, "info": {"source": "exploitdb", "exploit_id": "51912"}} {"text": "Blood Bank System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Blood Bank System 1.0": [[0, 21]], "VULNERABILITY: Authentication Bypass": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50362"}} {"text": "Blood Bank v1.0 - Multiple SQL Injection", "spans": {"SYSTEM: Blood Bank v1.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51833"}} {"text": "Blood Bank v1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Blood Bank v1.0": [[0, 15]], "VULNERABILITY: Stored Cross Site Scripting": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51955"}} {"text": "Blood Donor Management System v1.0 - Stored XSS", "spans": {"SYSTEM: Blood Donor Management System v1.0": [[0, 34]], "VULNERABILITY: XSS": [[44, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51697"}} {"text": "BloodX 1.0 - Authentication Bypass", "spans": {"SYSTEM: BloodX 1.0": [[0, 10]], "VULNERABILITY: Authentication Bypass": [[13, 34]]}, "info": {"source": "exploitdb", "exploit_id": "47842"}} {"text": "BloodX CMS 1.0 - Authentication Bypass", "spans": {"SYSTEM: BloodX CMS 1.0": [[0, 14]], "VULNERABILITY: Authentication Bypass": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48786"}} {"text": "BloofoxCMS 0.5.2.1 - 'text' Stored Cross Site Scripting", "spans": {"SYSTEM: BloofoxCMS 0.5.2.1": [[0, 18]], "VULNERABILITY: Stored Cross Site Scripting": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49492"}} {"text": "bloofoxCMS 0.5.2.1 - CSRF (Add user)", "spans": {"SYSTEM: bloofoxCMS 0.5.2.1": [[0, 18]], "VULNERABILITY: CSRF": [[21, 25]]}, "info": {"source": "exploitdb", "exploit_id": "49507"}} {"text": "Bludit 3.9.2 - Authentication Bruteforce Mitigation Bypass", "spans": {"SYSTEM: Bludit 3.9.2": [[0, 13]], "VULNERABILITY: Authentication Bruteforce Mitigation Bypass": [[16, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48746"}} {"text": "Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Bludit 3-14-1 Plugin 'UploadPlugin'": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51160"}} {"text": "Bludit 3.13.1 - 'username' Cross Site Scripting (XSS)", "spans": {"SYSTEM: Bludit 3.13.1": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50529"}} {"text": "Bludit 3.9.12 - Directory Traversal", "spans": {"SYSTEM: Bludit 3.9.12": [[0, 13]], "VULNERABILITY: Directory Traversal": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48568"}} {"text": "Bludit 3.9.2 - Auth Bruteforce Bypass", "spans": {"SYSTEM: Bludit 3.9.2": [[0, 12]], "VULNERABILITY: Auth Bruteforce Bypass": [[15, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48942"}} {"text": "Bludit 3.9.2 - Authentication Bruteforce Bypass (Metasploit)", "spans": {"SYSTEM: Bludit 3.9.2": [[0, 12]], "VULNERABILITY: Authentication Bruteforce Bypass": [[15, 47]], "TOOL: Metasploit": [[49, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49037"}} {"text": "Bludit 4.0.0-rc-2 - Account takeover", "spans": {"SYSTEM: Bludit 4.0.0-rc-2": [[0, 17]], "VULNERABILITY: Account takeover": [[20, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51360"}} {"text": "Bludit < 3.13.1 Backup Plugin - Arbitrary File Download (Authenticated)", "spans": {"SYSTEM: Bludit < 3.13.1 Backup Plugin": [[0, 29]], "VULNERABILITY: Arbitrary File Download": [[32, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51541"}} {"text": "Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Bludit CMS v3.14.1": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[21, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51476"}} {"text": "Boelter Blue System Management 1.3 - SQL Injection", "spans": {"SYSTEM: Boelter Blue System Management 1.3": [[0, 34]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52052"}} {"text": "BoidCMS v2.0.0 - authenticated file upload vulnerability", "spans": {"SYSTEM: BoidCMS v2.0.0": [[0, 14]], "VULNERABILITY: authenticated file upload vulnerability": [[17, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51741"}} {"text": "Bolt CMS 3.7.0 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Bolt CMS 3.7.0": [[0, 14]], "VULNERABILITY: Authenticated Remote Code Execution": [[17, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48296"}} {"text": "BoltWire 6.03 - Local File Inclusion", "spans": {"SYSTEM: BoltWire 6.03": [[0, 13]], "VULNERABILITY: Local File Inclusion": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48411"}} {"text": "Book Store Management System 1.0.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Book Store Management System 1.0.0": [[0, 34]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[37, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51123"}} {"text": "Booked Scheduler 2.7.5 - Remote Command Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Booked Scheduler 2.7.5": [[0, 22]], "VULNERABILITY: Remote Command Execution": [[25, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50594"}} {"text": "Booked Scheduler 2.7.7 - Authenticated Directory Traversal", "spans": {"SYSTEM: Booked Scheduler 2.7.7": [[0, 22]], "VULNERABILITY: Directory Traversal": [[39, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48428"}} {"text": "Boom CMS v8.0.7 - Cross Site Scripting", "spans": {"SYSTEM: Boom CMS v8.0.7": [[0, 15]], "VULNERABILITY: Cross Site Scripting": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51612"}} {"text": "Boonex Dolphin 7.4.2 - 'width' Stored XSS", "spans": {"SYSTEM: Boonex Dolphin 7.4.2": [[0, 20]], "VULNERABILITY: XSS": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49670"}} {"text": "Boss Mini 1.4.0 - local file inclusion", "spans": {"SYSTEM: Boss Mini 1.4.0": [[0, 15]], "VULNERABILITY: local file inclusion": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51848"}} {"text": "BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: BoxBilling<=4.22.1.5": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51108"}} {"text": "BrainyCP V1.0 - Remote Code Execution", "spans": {"SYSTEM: BrainyCP V1.0": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51357"}} {"text": "Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Budget and Expense Tracker System 1.0": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[41, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50308"}} {"text": "Budget and Expense Tracker System 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Budget and Expense Tracker System 1.0": [[0, 37]], "VULNERABILITY: Arbitrary File Upload": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50326"}} {"text": "Budget and Expense Tracker System 1.0 - Authenticated Bypass", "spans": {"SYSTEM: Budget and Expense Tracker System 1.0": [[0, 37]], "VULNERABILITY: Authenticated Bypass": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50307"}} {"text": "Budget Management System 1.0 - 'Budget title' Stored XSS", "spans": {"SYSTEM: Budget Management System 1.0": [[0, 28]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49723"}} {"text": "BuildaGate5library v5 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: BuildaGate5library v5": [[0, 21]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[24, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51581"}} {"text": "Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Bus Pass Management System 1.0": [[0, 30]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[34, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51242"}} {"text": "Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Bus Pass Management System 1.0": [[0, 30]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[45, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50272"}} {"text": "Bus Pass Management System 1.0 - 'Search' SQL injection", "spans": {"SYSTEM: Bus Pass Management System 1.0": [[0, 30]], "VULNERABILITY: SQL injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50543"}} {"text": "Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)", "spans": {"SYSTEM: Bus Pass Management System 1.0": [[0, 30]], "VULNERABILITY: IDOR": [[77, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50263"}} {"text": "Bus Pass Management System 1.0 - 'viewid' SQL Injection", "spans": {"SYSTEM: Bus Pass Management System 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50235"}} {"text": "Bus Pass Management System 1.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Bus Pass Management System 1.0": [[0, 30]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51054"}} {"text": "Bus Reservation System 1.1 - Multiple-SQLi", "spans": {"SYSTEM: Bus Reservation System 1.1": [[0, 26]], "VULNERABILITY: SQLi": [[38, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51712"}} {"text": "Business Live Chat Software 1.0 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Business Live Chat Software 1.0": [[0, 31]], "VULNERABILITY: Cross-Site Request Forgery": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48141"}} {"text": "BWL Advanced FAQ Manager 2.0.3 - Authenticated SQL Injection", "spans": {"SYSTEM: BWL Advanced FAQ Manager 2.0.3": [[0, 30]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "52024"}} {"text": "Cab Management System 1.0 - 'id' SQLi (Authenticated)", "spans": {"SYSTEM: Cab Management System 1.0": [[0, 25]], "VULNERABILITY: SQLi": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50767"}} {"text": "Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Cab Management System 1.0": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50769"}} {"text": "Cacti 1.2.12 - 'filter' SQL Injection", "spans": {"SYSTEM: Cacti 1.2.12": [[0, 12]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49810"}} {"text": "Cacti 1.2.24 - Authenticated command injection when using SNMP options", "spans": {"SYSTEM: Cacti 1.2.24": [[0, 12]], "VULNERABILITY: Authenticated command injection when using SNMP options": [[15, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51740"}} {"text": "Cacti 1.2.26 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Cacti 1.2.26": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52225"}} {"text": "Cacti 1.2.8 - Remote Code Execution", "spans": {"SYSTEM: Cacti 1.2.8": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48128"}} {"text": "Cacti v1.2.22 - Remote Command Execution (RCE)", "spans": {"SYSTEM: Cacti v1.2.22": [[0, 13]], "VULNERABILITY: Remote Command Execution": [[16, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51166"}} {"text": "Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Cacti v1.2.8": [[0, 12]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[15, 52]], "TOOL: Metasploit": [[54, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48159"}} {"text": "Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Calendar Event Multi View 1.4.07": [[0, 33]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[80, 106]]}, "info": {"source": "exploitdb", "exploit_id": "51241"}} {"text": "Campcodes Online Matrimonial Website System v3.3 - Code Execution via malicious SVG file upload", "spans": {"SYSTEM: Campcodes Online Matrimonial Website System v3.3": [[0, 48]], "VULNERABILITY: Code Execution via malicious SVG file upload": [[51, 95]]}, "info": {"source": "exploitdb", "exploit_id": "51656"}} {"text": "CandidATS 2.1.0 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: CandidATS 2.1.0": [[0, 15]], "VULNERABILITY: Cross-Site Request Forgery": [[18, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48113"}} {"text": "Canteen-Management v1.0 - SQL Injection", "spans": {"SYSTEM: Canteen-Management v1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51063"}} {"text": "Canteen-Management v1.0 - XSS-Reflected", "spans": {"SYSTEM: Canteen-Management v1.0": [[0, 23]], "VULNERABILITY: XSS": [[26, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51062"}} {"text": "Car Park Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Car Park Management System 1.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48435"}} {"text": "Car Rental Management System 1.0 - 'car_id' Sql Injection", "spans": {"SYSTEM: Car Rental Management System 1.0": [[0, 32]], "VULNERABILITY: Sql Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49056"}} {"text": "Car Rental Management System 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Car Rental Management System 1.0": [[0, 32]], "VULNERABILITY: Arbitrary File Upload": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48931"}} {"text": "Car Rental Management System 1.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Car Rental Management System 1.0": [[0, 32]], "VULNERABILITY: Remote Code Execution": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49055"}} {"text": "Car Rental Management System 1.0 - SQL injection + Arbitrary File Upload", "spans": {"SYSTEM: Car Rental Management System 1.0": [[0, 32]], "VULNERABILITY: SQL injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49025"}} {"text": "Car Rental Management System 1.0 - SQL Injection / Local File include", "spans": {"SYSTEM: Car Rental Management System 1.0": [[0, 32]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49177"}} {"text": "Car Rental Project 1.0 - Remote Code Execution", "spans": {"SYSTEM: Car Rental Project 1.0": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52243"}} {"text": "Car Rental Project 2.0 - Arbitrary File Upload to Remote Code Execution", "spans": {"SYSTEM: Car Rental Project 2.0": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49520"}} {"text": "Car Rental Script 1.8 - Stored Cross-site scripting (XSS)", "spans": {"SYSTEM: Car Rental Script 1.8": [[0, 21]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51567"}} {"text": "Carbon Forum 5.9.0 - Stored XSS", "spans": {"SYSTEM: Carbon Forum 5.9.0": [[0, 18]], "VULNERABILITY: XSS": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52043"}} {"text": "Care2x Integrated Hospital Info System 2.7 - 'Multiple' SQL Injection", "spans": {"SYSTEM: Care2x Integrated Hospital Info System 2.7": [[0, 42]], "VULNERABILITY: SQL Injection": [[56, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50165"}} {"text": "Care2x Open Source Hospital Information Management 2.7 Alpha - 'Multiple' Stored XSS", "spans": {"SYSTEM: Care2x Open Source Hospital Information Management 2.7 Alpha": [[0, 60]], "VULNERABILITY: XSS": [[81, 84]]}, "info": {"source": "exploitdb", "exploit_id": "50197"}} {"text": "CASAP Automated Enrollment System 1.0 - 'First Name' Stored XSS", "spans": {"SYSTEM: CASAP Automated Enrollment System 1.0": [[0, 37]], "VULNERABILITY: XSS": [[60, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49469"}} {"text": "CASAP Automated Enrollment System 1.0 - 'route' Stored XSS", "spans": {"SYSTEM: CASAP Automated Enrollment System 1.0": [[0, 37]], "VULNERABILITY: XSS": [[55, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49470"}} {"text": "CASAP Automated Enrollment System 1.0 - Authentication Bypass", "spans": {"SYSTEM: CASAP Automated Enrollment System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49463"}} {"text": "CE Phoenix v1.0.8.20 - Remote Code Execution", "spans": {"SYSTEM: CE Phoenix v1.0.8.20": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51957"}} {"text": "CE Phoenix Version 1.0.8.20 - Stored XSS", "spans": {"SYSTEM: CE Phoenix Version 1.0.8.20": [[0, 27]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52015"}} {"text": "Cemetry Mapping and Information System 1.0 - 'user_email' Sql Injection (Authentication Bypass)", "spans": {"SYSTEM: Cemetry Mapping and Information System 1.0": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[73, 94]]}, "info": {"source": "exploitdb", "exploit_id": "49475"}} {"text": "Cemetry Mapping and Information System 1.0 - Multiple SQL Injections", "spans": {"SYSTEM: Cemetry Mapping and Information System 1.0": [[0, 42]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49413"}} {"text": "Cemetry Mapping and Information System 1.0 - Multiple Stored Cross-Site Scripting", "spans": {"SYSTEM: Cemetry Mapping and Information System 1.0": [[0, 42]], "VULNERABILITY: Stored Cross-Site Scripting": [[54, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49405"}} {"text": "Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution", "spans": {"SYSTEM: Centreo 19.10.8": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48256"}} {"text": "Centreon 19.04 - Authenticated Remote Code Execution (Metasploit)", "spans": {"SYSTEM: Centreon 19.04": [[0, 14]], "VULNERABILITY: Authenticated Remote Code Execution": [[17, 52]], "TOOL: Metasploit": [[54, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47948"}} {"text": "Centreon 19.10.5 - 'centreontrapd' Remote Command Execution", "spans": {"SYSTEM: Centreon 19.10.5": [[0, 16]], "VULNERABILITY: Remote Command Execution": [[35, 59]]}, "info": {"source": "exploitdb", "exploit_id": "47978"}} {"text": "Centreon 19.10.5 - 'id' SQL Injection", "spans": {"SYSTEM: Centreon 19.10.5": [[0, 16]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48345"}} {"text": "Centreon 19.10.5 - 'Pollers' Remote Command Execution", "spans": {"SYSTEM: Centreon 19.10.5": [[0, 16]], "VULNERABILITY: Remote Command Execution": [[29, 53]]}, "info": {"source": "exploitdb", "exploit_id": "47977"}} {"text": "Centreon 19.10.5 - 'Pollers' Remote Command Execution (Metasploit)", "spans": {"SYSTEM: Centreon 19.10.5": [[0, 16]], "VULNERABILITY: Remote Command Execution": [[29, 53]], "TOOL: Metasploit": [[55, 65]]}, "info": {"source": "exploitdb", "exploit_id": "47994"}} {"text": "Centreon 19.10.5 - Database Credentials Disclosure", "spans": {"SYSTEM: Centreon 19.10.5": [[0, 16]], "VULNERABILITY: Database Credentials Disclosure": [[19, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47968"}} {"text": "Centreon 19.10.5 - Remote Command Execution", "spans": {"SYSTEM: Centreon 19.10.5": [[0, 16]], "VULNERABILITY: Remote Command Execution": [[19, 43]]}, "info": {"source": "exploitdb", "exploit_id": "47969"}} {"text": "Centron 19.04 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Centron 19.04": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52156"}} {"text": "Chamilo LMS 1.11.14 - Account Takeover", "spans": {"SYSTEM: Chamilo LMS 1.11.14": [[0, 19]], "VULNERABILITY: Account Takeover": [[22, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50694"}} {"text": "Chamilo LMS 1.11.14 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Chamilo LMS 1.11.14": [[0, 19]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49867"}} {"text": "Chamilo LMS 1.11.24 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Chamilo LMS 1.11.24": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52083"}} {"text": "Charity Management System CMS 1.0 - Multiple Vulnerabilities", "spans": {"SYSTEM: Charity Management System CMS 1.0": [[0, 33]], "VULNERABILITY: Multiple Vulnerabilities": [[36, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50217"}} {"text": "ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting", "spans": {"SYSTEM: ChemInv 1.0": [[0, 11]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48401"}} {"text": "Chevereto 3.13.4 Core - Remote Code Execution", "spans": {"SYSTEM: Chevereto 3.13.4 Core": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "47903"}} {"text": "Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Chikitsa Patient Management System 2.0.2": [[0, 40]], "VULNERABILITY: Remote Code Execution (RCE)": [[52, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50572"}} {"text": "Chikitsa Patient Management System 2.0.2 - 'plugin' Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Chikitsa Patient Management System 2.0.2": [[0, 40]], "VULNERABILITY: Remote Code Execution (RCE)": [[52, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50571"}} {"text": "ChiKoi v1.0 - SQL Injection", "spans": {"SYSTEM: ChiKoi v1.0": [[0, 11]], "VULNERABILITY: SQL Injection": [[14, 27]]}, "info": {"source": "exploitdb", "exploit_id": "51202"}} {"text": "Chitor-CMS v1.1.2 - Pre-Auth SQL Injection", "spans": {"SYSTEM: Chitor-CMS v1.1.2": [[0, 17]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51383"}} {"text": "Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Church Management System 1.0": [[0, 28]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[42, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50091"}} {"text": "Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)", "spans": {"SYSTEM: Church Management System 1.0": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50092"}} {"text": "Church Management System 1.0 - 'search' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Church Management System 1.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50303"}} {"text": "Church Management System 1.0 - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: Church Management System 1.0": [[0, 28]], "VULNERABILITY: Arbitrary File Upload": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50090"}} {"text": "Church Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Church Management System 1.0": [[0, 28]], "VULNERABILITY: Remote Code Execution (RCE)": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50306"}} {"text": "Church Management System 1.0 - SQL Injection (Authentication Bypass) + Arbitrary File Upload + RCE", "spans": {"SYSTEM: Church Management System 1.0": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50116"}} {"text": "ChurchCRM 4.4.5 - SQLi", "spans": {"SYSTEM: ChurchCRM 4.4.5": [[0, 15]], "VULNERABILITY: SQLi": [[18, 22]]}, "info": {"source": "exploitdb", "exploit_id": "50965"}} {"text": "ChurchCRM 4.5.1 - Authenticated SQL Injection", "spans": {"SYSTEM: ChurchCRM 4.5.1": [[0, 15]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51319"}} {"text": "ChurchCRM 5.9.1 - SQL Injection", "spans": {"SYSTEM: ChurchCRM 5.9.1": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52152"}} {"text": "ChurchCRM v4.5.3-121fcc1 - SQL Injection", "spans": {"SYSTEM: ChurchCRM v4.5.3-121fcc1": [[0, 24]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51296"}} {"text": "ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated)", "spans": {"SYSTEM: ChurchCRM v4.5.4": [[0, 16]], "VULNERABILITY: XSS": [[29, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51477"}} {"text": "Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Chyrp 2.5.2": [[0, 11]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[14, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52013"}} {"text": "CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)", "spans": {"SYSTEM: CiviCRM 5.59.alpha1": [[0, 19]], "VULNERABILITY: Cross-Site Scripting": [[34, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51478"}} {"text": "CKEditor 3 - Server-Side Request Forgery (SSRF)", "spans": {"SYSTEM: CKEditor 3": [[0, 10]], "VULNERABILITY: Server-Side Request Forgery (SSRF)": [[13, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50021"}} {"text": "CKEditor 5 35.4.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: CKEditor 5 35.4.0": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51260"}} {"text": "Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Clansphere CMS 2011.4": [[0, 21]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[24, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51070"}} {"text": "Class Scheduling System 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Class Scheduling System 1.0": [[0, 27]], "VULNERABILITY: XSS": [[46, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49323"}} {"text": "Clcknshop 1.0.0 - SQL Injection", "spans": {"SYSTEM: Clcknshop 1.0.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51729"}} {"text": "ClicShopping v3.402 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ClicShopping v3.402": [[0, 19]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51135"}} {"text": "Client Details System 1.0 - SQL Injection", "spans": {"SYSTEM: Client Details System 1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[28, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51880"}} {"text": "Client Management System 1.0 - 'searchdata' SQL injection", "spans": {"SYSTEM: Client Management System 1.0": [[0, 28]], "VULNERABILITY: SQL injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48956"}} {"text": "Client Management System 1.1 - 'cname' Stored Cross-site scripting (XSS)", "spans": {"SYSTEM: Client Management System 1.1": [[0, 28]], "VULNERABILITY: XSS": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50177"}} {"text": "Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Client Management System 1.1": [[0, 28]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[42, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50007"}} {"text": "Clinic Management System 1.0 - Authenticated Arbitrary File Upload", "spans": {"SYSTEM: Clinic Management System 1.0": [[0, 28]], "VULNERABILITY: Arbitrary File Upload": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48547"}} {"text": "Clinic Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Clinic Management System 1.0": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48538"}} {"text": "Clinic Management System 1.0 - SQL injection to Remote Code Execution", "spans": {"SYSTEM: Clinic Management System 1.0": [[0, 28]], "VULNERABILITY: Remote Code Execution": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50439"}} {"text": "Clinic Management System 1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Clinic Management System 1.0": [[0, 28]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[31, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48544"}} {"text": "Clinic Queuing System 1.0 - RCE", "spans": {"SYSTEM: Clinic Queuing System 1.0": [[0, 25]], "VULNERABILITY: RCE": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52008"}} {"text": "Clinic's Patient Management System 1.0 - Unauthenticated RCE", "spans": {"SYSTEM: Clinic's Patient Management System 1.0": [[0, 38]], "VULNERABILITY: RCE": [[57, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51779"}} {"text": "CloudClassroom PHP Project 1.0 - SQL Injection", "spans": {"SYSTEM: CloudClassroom PHP Project 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52314"}} {"text": "Cmaps v8.0 - SQL injection", "spans": {"SYSTEM: Cmaps v8.0": [[0, 10]], "VULNERABILITY: SQL injection": [[13, 26]]}, "info": {"source": "exploitdb", "exploit_id": "51422"}} {"text": "CMS Made Simple 2.1.6 - 'cntnt01detailtemplate' Server-Side Template Injection", "spans": {"SYSTEM: CMS Made Simple 2.1.6": [[0, 21]], "VULNERABILITY: Server-Side Template Injection": [[48, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48944"}} {"text": "CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: CMS Made Simple 2.2.14": [[0, 22]], "VULNERABILITY: Arbitrary File Upload": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48779"}} {"text": "CMS Made Simple 2.2.14 - Authenticated Arbitrary File Upload", "spans": {"SYSTEM: CMS Made Simple 2.2.14": [[0, 22]], "VULNERABILITY: Arbitrary File Upload": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48742"}} {"text": "CMS Made Simple 2.2.14 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: CMS Made Simple 2.2.14": [[0, 22]], "VULNERABILITY: Persistent Cross-Site Scripting": [[25, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48851"}} {"text": "CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: CMS Made Simple 2.2.15": [[0, 22]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49793"}} {"text": "CMS Made Simple 2.2.15 - RCE (Authenticated)", "spans": {"SYSTEM: CMS Made Simple 2.2.15": [[0, 22]], "VULNERABILITY: RCE": [[25, 28]]}, "info": {"source": "exploitdb", "exploit_id": "49345"}} {"text": "CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated)", "spans": {"SYSTEM: CMS Made Simple 2.2.15": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting via SVG File Upload (Authenticated)": [[25, 88]]}, "info": {"source": "exploitdb", "exploit_id": "49199"}} {"text": "CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: CMSimple 5.15": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52040"}} {"text": "CMSimple 5.2 - 'External' Stored XSS", "spans": {"SYSTEM: CMSimple 5.2": [[0, 12]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "49751"}} {"text": "CMSimple 5.4 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: CMSimple 5.4": [[0, 12]], "VULNERABILITY: Cross Site Scripting": [[15, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50612"}} {"text": "CMSimple 5.4 - Local file inclusion (LFI) to Remote code execution (RCE) (Authenticated)", "spans": {"SYSTEM: CMSimple 5.4": [[0, 12]], "VULNERABILITY: RCE": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50547"}} {"text": "Cmsimple 5.4 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Cmsimple 5.4": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50356"}} {"text": "CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: CMSimple_XH 1.7.4": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50367"}} {"text": "CmsMadeSimple v2.2.17 - Remote Code Execution (RCE)", "spans": {"SYSTEM: CmsMadeSimple v2.2.17": [[0, 21]], "VULNERABILITY: Remote Code Execution (RCE)": [[24, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51600"}} {"text": "CmsMadeSimple v2.2.17 - session hijacking via Server-Side Template Injection (SSTI)", "spans": {"SYSTEM: CmsMadeSimple v2.2.17": [[0, 21]], "VULNERABILITY: SSTI": [[78, 82]]}, "info": {"source": "exploitdb", "exploit_id": "51599"}} {"text": "CmsMadeSimple v2.2.17 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: CmsMadeSimple v2.2.17": [[0, 21]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[24, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51601"}} {"text": "CMSUno 1.6 - Cross-Site Request Forgery (Change Admin Password)", "spans": {"SYSTEM: CMSUno 1.6": [[0, 10]], "VULNERABILITY: Cross-Site Request Forgery": [[13, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48679"}} {"text": "CMSUno 1.6.2 - 'lang' Remote Code Execution (Authenticated)", "spans": {"SYSTEM: CMSUno 1.6.2": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48996"}} {"text": "CMSUno 1.6.2 - 'user' Remote Code Execution (Authenticated)", "spans": {"SYSTEM: CMSUno 1.6.2": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49031"}} {"text": "CMSuno 1.7 - 'tgo' Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: CMSuno 1.7": [[0, 10]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[19, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50179"}} {"text": "Coastercms 5.8.18 - Stored XSS", "spans": {"SYSTEM: Coastercms 5.8.18": [[0, 17]], "VULNERABILITY: XSS": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "49181"}} {"text": "Cockpit CMS 0.6.1 - Remote Code Execution", "spans": {"SYSTEM: Cockpit CMS 0.6.1": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49390"}} {"text": "CodeAstro Online Railway Reservation System 1.0 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: CodeAstro Online Railway Reservation System 1.0": [[0, 47]], "VULNERABILITY: Cross Site Scripting": [[50, 70]]}, "info": {"source": "exploitdb", "exploit_id": "52159"}} {"text": "CodeCanyon RISE CRM 3.7.0 - SQL Injection", "spans": {"SYSTEM: CodeCanyon RISE CRM 3.7.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[28, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52100"}} {"text": "Codoforum 4.8.3 - 'input_txt' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Codoforum 4.8.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[30, 61]]}, "info": {"source": "exploitdb", "exploit_id": "47886"}} {"text": "Codoforum 4.8.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Codoforum 4.8.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47876"}} {"text": "CodoForum v5.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: CodoForum v5.1": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50978"}} {"text": "Collabtive 3.1 - 'address' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Collabtive 3.1": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49468"}} {"text": "College Management System 1.0 - 'course_code' SQL Injection (Authenticated)", "spans": {"SYSTEM: College Management System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50933"}} {"text": "College-Management-System-Php 1.0 - Authentication Bypass", "spans": {"SYSTEM: College-Management-System-Php 1.0": [[0, 33]], "VULNERABILITY: Authentication Bypass": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48593"}} {"text": "Color Prediction Game v1.0 - SQL Injection", "spans": {"SYSTEM: Color Prediction Game v1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51689"}} {"text": "Comment System 1.0 - 'multiple' Stored Cross-Site Scripting", "spans": {"SYSTEM: Comment System 1.0": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49575"}} {"text": "comments-like-dislike < 1.2.0 - Authenticated (Subscriber+) Plugin Setting Reset", "spans": {"SYSTEM: comments-like-dislike < 1.2.0": [[0, 29]], "VULNERABILITY: Authenticated (Subscriber+) Plugin Setting Reset": [[32, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51809"}} {"text": "Company Visitor Management System (CVMS) 1.0 - Authentication Bypass", "spans": {"SYSTEM: Company Visitor Management System (CVMS) 1.0": [[0, 44]], "VULNERABILITY: Authentication Bypass": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48884"}} {"text": "Company's Recruitment Management System 1.0 - 'description' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Company's Recruitment Management System 1.0": [[0, 43]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[61, 94]]}, "info": {"source": "exploitdb", "exploit_id": "50424"}} {"text": "Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Company's Recruitment Management System 1.0": [[0, 43]], "VULNERABILITY: CSRF": [[89, 93]]}, "info": {"source": "exploitdb", "exploit_id": "50425"}} {"text": "Company's Recruitment Management System 1.0 - 'Multiple' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Company's Recruitment Management System 1.0": [[0, 43]], "VULNERABILITY: SQL Injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50404"}} {"text": "Company's Recruitment Management System 1.0. - 'title' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Company's Recruitment Management System 1.0.": [[0, 44]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[55, 88]]}, "info": {"source": "exploitdb", "exploit_id": "50421"}} {"text": "Companymaps v8.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Companymaps v8.0": [[0, 16]], "VULNERABILITY: Stored Cross Site Scripting": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51417"}} {"text": "Complaint Management System 1.0 - 'cid' SQL Injection", "spans": {"SYSTEM: Complaint Management System 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48758"}} {"text": "Complaint Management System 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Complaint Management System 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48468"}} {"text": "Complaint Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Complaint Management System 1.0": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48452"}} {"text": "Complaint Management System 4.0 - 'cid' SQL injection", "spans": {"SYSTEM: Complaint Management System 4.0": [[0, 31]], "VULNERABILITY: SQL injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "47847"}} {"text": "Complaint Management System 4.0 - Remote Code Execution", "spans": {"SYSTEM: Complaint Management System 4.0": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "47884"}} {"text": "Complaint Management System 4.2 - Authentication Bypass", "spans": {"SYSTEM: Complaint Management System 4.2": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48371"}} {"text": "Complaint Management System 4.2 - Cross-Site Request Forgery (Delete User)", "spans": {"SYSTEM: Complaint Management System 4.2": [[0, 31]], "VULNERABILITY: Cross-Site Request Forgery": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48372"}} {"text": "Complaint Management System 4.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Complaint Management System 4.2": [[0, 31]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48370"}} {"text": "Complaints Report Management System 1.0 - 'username' SQL Injection / Remote Code Execution", "spans": {"SYSTEM: Complaints Report Management System 1.0": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[69, 90]]}, "info": {"source": "exploitdb", "exploit_id": "48985"}} {"text": "Composr 10.0.36 - Remote Code Execution", "spans": {"SYSTEM: Composr 10.0.36": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49753"}} {"text": "Composr CMS 10.0.30 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Composr CMS 10.0.30": [[0, 19]], "VULNERABILITY: Persistent Cross-Site Scripting": [[22, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48496"}} {"text": "Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting", "spans": {"SYSTEM: Composr CMS 10.0.34": [[0, 19]], "VULNERABILITY: Cross Site Scripting": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49190"}} {"text": "Composr CMS 10.0.36 - Cross Site Scripting", "spans": {"SYSTEM: Composr CMS 10.0.36": [[0, 19]], "VULNERABILITY: Cross Site Scripting": [[22, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49749"}} {"text": "Composr-CMS Version <=10.0.39 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Composr-CMS Version <=10.0.39": [[0, 29]], "VULNERABILITY: Authenticated Remote Code Execution": [[32, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51060"}} {"text": "Computer Laboratory Management System v1.0 - Multiple-SQLi", "spans": {"SYSTEM: Computer Laboratory Management System v1.0": [[0, 42]], "VULNERABILITY: SQLi": [[54, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51965"}} {"text": "Concrete5 8.5.4 - 'name' Stored XSS", "spans": {"SYSTEM: Concrete5 8.5.4": [[0, 15]], "VULNERABILITY: XSS": [[32, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49721"}} {"text": "Concrete5 CME v9.1.3 - Xpath injection", "spans": {"SYSTEM: Concrete5 CME v9.1.3": [[0, 20]], "VULNERABILITY: Xpath injection": [[23, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51144"}} {"text": "Contao 4.13.2 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Contao 4.13.2": [[0, 13]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50945"}} {"text": "Content Management System 1.0 - 'email' SQL Injection", "spans": {"SYSTEM: Content Management System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49272"}} {"text": "Content Management System 1.0 - 'First Name' Stored XSS", "spans": {"SYSTEM: Content Management System 1.0": [[0, 29]], "VULNERABILITY: XSS": [[52, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49271"}} {"text": "Content Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Content Management System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49273"}} {"text": "Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Control Web Panel 7 (CWP7) v0.9.8.1147": [[0, 38]], "VULNERABILITY: Remote Code Execution (RCE)": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51250"}} {"text": "Coppermine Gallery 1.6.25 - RCE", "spans": {"SYSTEM: Coppermine Gallery 1.6.25": [[0, 25]], "VULNERABILITY: RCE": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51738"}} {"text": "Cotonti Siena 0.9.19 - 'maintitle' Stored Cross-Site Scripting", "spans": {"SYSTEM: Cotonti Siena 0.9.19": [[0, 20]], "VULNERABILITY: Stored Cross-Site Scripting": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50016"}} {"text": "CouchCMS 2.2.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: CouchCMS 2.2.1": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49636"}} {"text": "CouchCMS 2.2.1 - Server-Side Request Forgery", "spans": {"SYSTEM: CouchCMS 2.2.1": [[0, 14]], "VULNERABILITY: Server-Side Request Forgery": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49675"}} {"text": "Courier Management System 1.0 - 'First Name' Stored XSS", "spans": {"SYSTEM: Courier Management System 1.0": [[0, 29]], "VULNERABILITY: XSS": [[52, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49241"}} {"text": "Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection", "spans": {"SYSTEM: Courier Management System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[62, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49242"}} {"text": "Courier Management System 1.0 - 'ref_no' SQL Injection", "spans": {"SYSTEM: Courier Management System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49243"}} {"text": "Covid-19 Contact Tracing System 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Covid-19 Contact Tracing System 1.0": [[0, 35]], "VULNERABILITY: Remote Code Execution": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49604"}} {"text": "COVID19 Testing Management System 1.0 - 'Admin name' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: COVID19 Testing Management System 1.0": [[0, 37]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[53, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49887"}} {"text": "COVID19 Testing Management System 1.0 - 'Multiple' SQL Injections", "spans": {"SYSTEM: COVID19 Testing Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50215"}} {"text": "COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection", "spans": {"SYSTEM: COVID19 Testing Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50190"}} {"text": "COVID19 Testing Management System 1.0 - 'State' Stored Cross-Site-Scripting (XSS)", "spans": {"SYSTEM: COVID19 Testing Management System 1.0": [[0, 37]], "VULNERABILITY: XSS": [[77, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49993"}} {"text": "COVID19 Testing Management System 1.0 - SQL Injection (Auth Bypass)", "spans": {"SYSTEM: COVID19 Testing Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49886"}} {"text": "Craft CMS 4.4.14 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Craft CMS 4.4.14": [[0, 16]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[19, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51918"}} {"text": "CraftCMS 3 vCard Plugin 1.0.0 - Remote Code Execution", "spans": {"SYSTEM: CraftCMS 3 vCard Plugin 1.0.0": [[0, 29]], "VULNERABILITY: Remote Code Execution": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48492"}} {"text": "Credit Lite 1.5.4 - SQL Injection", "spans": {"SYSTEM: Credit Lite 1.5.4": [[0, 17]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51701"}} {"text": "Crime records Management System 1.0 - 'Multiple' SQL Injection (Authenticated)", "spans": {"SYSTEM: Crime records Management System 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[49, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50213"}} {"text": "Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Croogo 3.0.2": [[0, 12]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50603"}} {"text": "Croogo 3.0.2 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Croogo 3.0.2": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50570"}} {"text": "Croogo 3.0.2 - Unrestricted File Upload", "spans": {"SYSTEM: Croogo 3.0.2": [[0, 12]], "VULNERABILITY: Unrestricted File Upload": [[15, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50602"}} {"text": "CRUD Operation 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: CRUD Operation 1.0": [[0, 18]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49393"}} {"text": "Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated)", "spans": {"SYSTEM: Crypto Currency Tracker (CCT) 9.5": [[0, 33]], "VULNERABILITY: Admin Account Creation": [[36, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51688"}} {"text": "CS-Cart 1.3.3 - 'classes_dir' LFI", "spans": {"SYSTEM: CS-Cart 1.3.3": [[0, 13]], "VULNERABILITY: LFI": [[30, 33]]}, "info": {"source": "exploitdb", "exploit_id": "48890"}} {"text": "CS-Cart 1.3.3 - authenticated RCE", "spans": {"SYSTEM: CS-Cart 1.3.3": [[0, 13]], "VULNERABILITY: RCE": [[30, 33]]}, "info": {"source": "exploitdb", "exploit_id": "48891"}} {"text": "CSE Bookstore 1.0 - 'quantity' Persistent Cross-site Scripting", "spans": {"SYSTEM: CSE Bookstore 1.0": [[0, 17]], "VULNERABILITY: Persistent Cross-site Scripting": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48973"}} {"text": "CSE Bookstore 1.0 - Authentication Bypass", "spans": {"SYSTEM: CSE Bookstore 1.0": [[0, 17]], "VULNERABILITY: Authentication Bypass": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48960"}} {"text": "CSE Bookstore 1.0 - Multiple SQL Injection", "spans": {"SYSTEM: CSE Bookstore 1.0": [[0, 17]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49314"}} {"text": "CSZ CMS 1.2.7 - 'title' HTML Injection", "spans": {"SYSTEM: CSZ CMS 1.2.7": [[0, 13]], "VULNERABILITY: HTML Injection": [[24, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48357"}} {"text": "CSZ CMS 1.2.7 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: CSZ CMS 1.2.7": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48354"}} {"text": "CSZ CMS 1.2.9 - 'Multiple' Arbitrary File Deletion", "spans": {"SYSTEM: CSZ CMS 1.2.9": [[0, 13]], "VULNERABILITY: Arbitrary File Deletion": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50148"}} {"text": "CSZ CMS 1.2.9 - 'Multiple' Blind SQLi(Authenticated)", "spans": {"SYSTEM: CSZ CMS 1.2.9": [[0, 13]], "VULNERABILITY: SQLi": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50846"}} {"text": "CSZ CMS 1.2.9 - Multiple Cross-Site Scripting", "spans": {"SYSTEM: CSZ CMS 1.2.9": [[0, 13]], "VULNERABILITY: Cross-Site Scripting": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49364"}} {"text": "CSZ CMS 1.3.0 - 'Multiple' Blind SQLi", "spans": {"SYSTEM: CSZ CMS 1.3.0": [[0, 13]], "VULNERABILITY: SQLi": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50899"}} {"text": "CSZ CMS 1.3.0 - Stored Cross-Site Scripting ('Photo URL' and 'YouTube URL' )", "spans": {"SYSTEM: CSZ CMS 1.3.0": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51703"}} {"text": "CSZ CMS 1.3.0 - Stored Cross-Site Scripting (Plugin 'Gallery')", "spans": {"SYSTEM: CSZ CMS 1.3.0": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51704"}} {"text": "CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution", "spans": {"SYSTEM: CSZ CMS Version 1.3.0": [[0, 21]], "VULNERABILITY: Remote Command Execution": [[38, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51863"}} {"text": "CSZCMS v1.3.0 - SQL Injection (Authenticated)", "spans": {"SYSTEM: CSZCMS v1.3.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51916"}} {"text": "Cups Easy 1.0 - Cross Site Request Forgery (Password Reset)", "spans": {"SYSTEM: Cups Easy 1.0": [[0, 13]], "VULNERABILITY: Cross Site Request Forgery": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "47973"}} {"text": "Curfew e-Pass Management System 1.0 - FromDate SQL Injection", "spans": {"SYSTEM: Curfew e-Pass Management System 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51778"}} {"text": "Curfew e-Pass Management System 1.0 - Stored XSS", "spans": {"SYSTEM: Curfew e-Pass Management System 1.0": [[0, 35]], "VULNERABILITY: XSS": [[45, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49391"}} {"text": "Customer Relationship Management (CRM) System 1.0 - 'Category' Persistent Cross site Scripting", "spans": {"SYSTEM: Customer Relationship Management (CRM) System 1.0": [[0, 49]], "VULNERABILITY: Persistent Cross site Scripting": [[63, 94]]}, "info": {"source": "exploitdb", "exploit_id": "49868"}} {"text": "Customer Relationship Management System (CRM) 1.0 - Remote Code Execution", "spans": {"SYSTEM: Customer Relationship Management System (CRM) 1.0": [[0, 49]], "VULNERABILITY: Remote Code Execution": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50046"}} {"text": "Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass", "spans": {"SYSTEM: Customer Relationship Management System (CRM) 1.0": [[0, 49]], "VULNERABILITY: Authentication Bypass": [[66, 87]]}, "info": {"source": "exploitdb", "exploit_id": "50158"}} {"text": "Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel", "spans": {"SYSTEM: Customer Support System 1.0": [[0, 27]], "VULNERABILITY: XSS": [[52, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49028"}} {"text": "Customer Support System 1.0 - _First Name_ & _Last Name_ Stored XSS", "spans": {"SYSTEM: Customer Support System 1.0": [[0, 27]], "VULNERABILITY: XSS": [[64, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49275"}} {"text": "Customer Support System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Customer Support System 1.0": [[0, 27]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49276"}} {"text": "Customer Support System 1.0 - 'username' Authentication Bypass", "spans": {"SYSTEM: Customer Support System 1.0": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49030"}} {"text": "Customer Support System 1.0 - Cross-Site Request Forgery", "spans": {"SYSTEM: Customer Support System 1.0": [[0, 27]], "VULNERABILITY: Cross-Site Request Forgery": [[30, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49029"}} {"text": "Customer Support System 1.0 - Stored XSS", "spans": {"SYSTEM: Customer Support System 1.0": [[0, 27]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52057"}} {"text": "CuteEditor for PHP 6.6 - Directory Traversal", "spans": {"SYSTEM: CuteEditor for PHP 6.6": [[0, 22]], "VULNERABILITY: Directory Traversal": [[25, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50994"}} {"text": "CuteNews 2.1.2 - Arbitrary File Deletion", "spans": {"SYSTEM: CuteNews 2.1.2": [[0, 14]], "VULNERABILITY: Arbitrary File Deletion": [[17, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48447"}} {"text": "CuteNews 2.1.2 - Authenticated Arbitrary File Upload", "spans": {"SYSTEM: CuteNews 2.1.2": [[0, 14]], "VULNERABILITY: Arbitrary File Upload": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48458"}} {"text": "CuteNews 2.1.2 - Remote Code Execution", "spans": {"SYSTEM: CuteNews 2.1.2": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48800"}} {"text": "CVE-2023-50071 - Multiple SQL Injection", "spans": {"SYSTEM: CVE-2023-50071": [[0, 14]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51862"}} {"text": "Cyber Cafe Management System Project (CCMS) 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Cyber Cafe Management System Project (CCMS) 1.0": [[0, 48]], "VULNERABILITY: Persistent Cross-Site Scripting": [[51, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49204"}} {"text": "Cyber Cafe Management System Project (CCMS) 1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Cyber Cafe Management System Project (CCMS) 1.0": [[0, 47]], "VULNERABILITY: Authentication Bypass": [[64, 85]]}, "info": {"source": "exploitdb", "exploit_id": "50355"}} {"text": "Daily Expense Manager 1.0 - 'term' SQLi", "spans": {"SYSTEM: Daily Expense Manager 1.0": [[0, 25]], "VULNERABILITY: SQLi": [[35, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51973"}} {"text": "Daily Expenses Management System 1.0 - 'item' SQL Injection", "spans": {"SYSTEM: Daily Expenses Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48737"}} {"text": "Daily Expenses Management System 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Daily Expenses Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48730"}} {"text": "Daily Habit Tracker 1.0 - Broken Access Control", "spans": {"SYSTEM: Daily Habit Tracker 1.0": [[0, 23]], "VULNERABILITY: Broken Access Control": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51954"}} {"text": "Daily Habit Tracker 1.0 - SQL Injection", "spans": {"SYSTEM: Daily Habit Tracker 1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51953"}} {"text": "Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Daily Habit Tracker 1.0": [[0, 23]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51952"}} {"text": "Daily Tracker System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Daily Tracker System 1.0": [[0, 24]], "VULNERABILITY: Authentication Bypass": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48787"}} {"text": "Dairy Farm Shop Management System 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Dairy Farm Shop Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47846"}} {"text": "Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Dairy Farm Shop Management System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50365"}} {"text": "DataCube3 v1.0 - Unrestricted file upload 'RCE'", "spans": {"SYSTEM: DataCube3 v1.0": [[0, 14]], "VULNERABILITY: RCE": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51868"}} {"text": "dawa-pharma 1.0-2022 - Multiple-SQLi", "spans": {"SYSTEM: dawa-pharma 1.0-2022": [[0, 20]], "VULNERABILITY: SQLi": [[32, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51818"}} {"text": "DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: DedeCMS 7.5 SP2": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48326"}} {"text": "DedeCMS v.5.8 - _keyword_ Cross-Site Scripting", "spans": {"SYSTEM: DedeCMS v.5.8": [[0, 13]], "VULNERABILITY: Cross-Site Scripting": [[26, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48974"}} {"text": "Dental Clinic Appointment Reservation System 1.0 - 'date' UNION based SQL Injection (Authenticated)", "spans": {"SYSTEM: Dental Clinic Appointment Reservation System 1.0": [[0, 48]], "VULNERABILITY: SQL Injection": [[70, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49861"}} {"text": "Dental Clinic Appointment Reservation System 1.0 - 'Firstname' Persistent Cross Site Scripting (Authenticated)", "spans": {"SYSTEM: Dental Clinic Appointment Reservation System 1.0": [[0, 48]], "VULNERABILITY: Cross Site Scripting": [[74, 94]]}, "info": {"source": "exploitdb", "exploit_id": "49870"}} {"text": "Dental Clinic Appointment Reservation System 1.0 - Authentication Bypass (SQLi)", "spans": {"SYSTEM: Dental Clinic Appointment Reservation System 1.0": [[0, 48]], "VULNERABILITY: Authentication Bypass": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49860"}} {"text": "Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Dental Clinic Appointment Reservation System 1.0": [[0, 48]], "VULNERABILITY: Cross Site Request Forgery": [[51, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49871"}} {"text": "Device Manager Express 7.8.20002.47752 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Device Manager Express 7.8.20002.47752": [[0, 38]], "VULNERABILITY: Remote Code Execution (RCE)": [[41, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51145"}} {"text": "Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Diafan CMS 6.0": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[17, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51529"}} {"text": "Digi AnywhereUSB 14 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: Digi AnywhereUSB 14": [[0, 19]], "VULNERABILITY: Cross-Site Scripting": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "47914"}} {"text": "Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass)", "spans": {"SYSTEM: Digital Crime Report Management System 1.0": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[60, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49761"}} {"text": "Directory Management System 1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Directory Management System 1.0": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50370"}} {"text": "Django 3.0 - Cross-Site Request Forgery Token Bypass", "spans": {"SYSTEM: Django 3.0": [[0, 10]], "VULNERABILITY: Cross-Site Request Forgery": [[13, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48303"}} {"text": "Doctors Patients Management System 1.0 - SQL Injection (Authentication Bypass)", "spans": {"SYSTEM: Doctors Patients Management System 1.0": [[0, 38]], "VULNERABILITY: Authentication Bypass": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50074"}} {"text": "Dolibarr 11.0.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Dolibarr 11.0.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48504"}} {"text": "Dolibarr 12.0.3 - SQLi to RCE", "spans": {"SYSTEM: Dolibarr 12.0.3": [[0, 15]], "VULNERABILITY: SQLi": [[18, 22]]}, "info": {"source": "exploitdb", "exploit_id": "49240"}} {"text": "Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE)", "spans": {"SYSTEM: Dolibarr ERP 11.0.4": [[0, 19]], "VULNERABILITY: RCE": [[69, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49711"}} {"text": "Dolibarr ERP 14.0.1 - Privilege Escalation", "spans": {"SYSTEM: Dolibarr ERP 14.0.1": [[0, 19]], "VULNERABILITY: Privilege Escalation": [[22, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50248"}} {"text": "Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Dolibarr ERP-CRM 12.0.3": [[0, 23]], "VULNERABILITY: Remote Code Execution": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49269"}} {"text": "Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation", "spans": {"SYSTEM: Dolibarr ERP-CRM 14.0.2": [[0, 23]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50432"}} {"text": "Dolibarr Version 17.0.1 - Stored XSS", "spans": {"SYSTEM: Dolibarr Version 17.0.1": [[0, 23]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51683"}} {"text": "Dompdf 1.2.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Dompdf 1.2.1": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51270"}} {"text": "Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities", "spans": {"SYSTEM: Dooblou WiFi File Explorer 1.13.3": [[0, 33]], "VULNERABILITY: Multiple Vulnerabilities": [[36, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51615"}} {"text": "dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: dotclear 2.25.3": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51353"}} {"text": "Dotclear 2.29 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Dotclear 2.29": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52037"}} {"text": "Drupal 10.1.2 - web-cache-poisoning-External-service-interaction", "spans": {"SYSTEM: Drupal 10.1.2": [[0, 13]], "VULNERABILITY: web-cache-poisoning-External-service-interaction": [[16, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51723"}} {"text": "Drupal 11.x-dev - Full Path Disclosure", "spans": {"SYSTEM: Drupal 11.x-dev": [[0, 15]], "VULNERABILITY: Full Path Disclosure": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52266"}} {"text": "Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Drupal avatar_uploader v7.x-1.0-beta8": [[0, 37]], "VULNERABILITY: Cross Site Scripting": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50841"}} {"text": "Drupal Module MiniorangeSAML 8.x-2.22 - Privilege escalation", "spans": {"SYSTEM: Drupal Module MiniorangeSAML 8.x-2.22": [[0, 37]], "VULNERABILITY: Privilege escalation": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50361"}} {"text": "DynPG 4.9.1 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: DynPG 4.9.1": [[0, 11]], "VULNERABILITY: Persistent Cross-Site Scripting": [[14, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48865"}} {"text": "E-Commerce System 1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: E-Commerce System 1.0": [[0, 21]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[24, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48471"}} {"text": "E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: E-INSUARANCE v1.0": [[0, 17]], "VULNERABILITY: Stored Cross Site Scripting": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51944"}} {"text": "e-learning Php Script 0.1.0 - 'search' SQL Injection", "spans": {"SYSTEM: e-learning Php Script 0.1.0": [[0, 27]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48629"}} {"text": "E-Learning System 1.0 - Authentication Bypass", "spans": {"SYSTEM: E-Learning System 1.0": [[0, 21]], "VULNERABILITY: Authentication Bypass": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49434"}} {"text": "e107 CMS 2.3.0 - CSRF", "spans": {"SYSTEM: e107 CMS 2.3.0": [[0, 14]], "VULNERABILITY: CSRF": [[17, 21]]}, "info": {"source": "exploitdb", "exploit_id": "49614"}} {"text": "e107 CMS 2.3.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: e107 CMS 2.3.0": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50315"}} {"text": "e107 CMS v3.2.1 - Multiple Vulnerabilities", "spans": {"SYSTEM: e107 CMS v3.2.1": [[0, 15]], "VULNERABILITY: Multiple Vulnerabilities": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50910"}} {"text": "e107 v2.3.2 - Reflected XSS", "spans": {"SYSTEM: e107 v2.3.2": [[0, 11]], "VULNERABILITY: XSS": [[24, 27]]}, "info": {"source": "exploitdb", "exploit_id": "51449"}} {"text": "Easy Appointments 1.4.2 - Information Disclosure", "spans": {"SYSTEM: Easy Appointments 1.4.2": [[0, 23]], "VULNERABILITY: Information Disclosure": [[26, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50871"}} {"text": "Easy2Pilot 7 - Cross-Site Request Forgery (Add User)", "spans": {"SYSTEM: Easy2Pilot 7": [[0, 12]], "VULNERABILITY: Cross-Site Request Forgery": [[15, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48099"}} {"text": "EasyPHP Webserver 14.1 - Multiple Vulnerabilities (RCE and Path Traversal)", "spans": {"SYSTEM: EasyPHP Webserver 14.1": [[0, 22]], "VULNERABILITY: Path Traversal": [[59, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51430"}} {"text": "ECK Hotel 1.0 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: ECK Hotel 1.0": [[0, 13]], "VULNERABILITY: Cross-Site Request Forgery": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48258"}} {"text": "Ecommerce Systempay 1.0 - Production KEY Brute Force", "spans": {"SYSTEM: Ecommerce Systempay 1.0": [[0, 23]], "VULNERABILITY: Production KEY Brute Force": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48017"}} {"text": "Ecommerse v1.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Ecommerse v1.0": [[0, 14]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[17, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51140"}} {"text": "ECSIMAGING PACS 6.21.5 - Remote code execution", "spans": {"SYSTEM: ECSIMAGING PACS 6.21.5": [[0, 22]], "VULNERABILITY: Remote code execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49388"}} {"text": "ECSIMAGING PACS 6.21.5 - SQL injection", "spans": {"SYSTEM: ECSIMAGING PACS 6.21.5": [[0, 22]], "VULNERABILITY: SQL injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49392"}} {"text": "EgavilanMedia PHPCRUD 1.0 - 'First Name' SQL Injection", "spans": {"SYSTEM: EgavilanMedia PHPCRUD 1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49878"}} {"text": "EgavilanMedia PHPCRUD 1.0 - 'Full Name' Stored Cross Site Scripting", "spans": {"SYSTEM: EgavilanMedia PHPCRUD 1.0": [[0, 25]], "VULNERABILITY: Stored Cross Site Scripting": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49484"}} {"text": "EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass", "spans": {"SYSTEM: EgavilanMedia User Registration & Login System with Admin Panel Exploit": [[0, 71]], "VULNERABILITY: SQLi": [[74, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49058"}} {"text": "eGroupWare 1.14 - 'spellchecker.php' Remote Command Execution", "spans": {"SYSTEM: eGroupWare 1.14": [[0, 15]], "VULNERABILITY: Remote Command Execution": [[37, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48720"}} {"text": "Elaine's Realtime CRM Automation 6.18.17 - Reflected XSS", "spans": {"SYSTEM: Elaine's Realtime CRM Automation 6.18.17": [[0, 40]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "52106"}} {"text": "elaniin CMS - Authentication Bypass", "spans": {"SYSTEM: elaniin CMS": [[0, 11]], "VULNERABILITY: Authentication Bypass": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48705"}} {"text": "elaniin CMS 1.0 - Authentication Bypass", "spans": {"SYSTEM: elaniin CMS 1.0": [[0, 15]], "VULNERABILITY: Authentication Bypass": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "47858"}} {"text": "Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Device Config Disclosure", "spans": {"SYSTEM: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0": [[0, 53]], "VULNERABILITY: Device Config Disclosure": [[56, 80]]}, "info": {"source": "exploitdb", "exploit_id": "52005"}} {"text": "eLection 2.0 - 'id' SQL Injection", "spans": {"SYSTEM: eLection 2.0": [[0, 12]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "48122"}} {"text": "Elementor Website Builder < 3.12.2 - Admin+ SQLi", "spans": {"SYSTEM: Elementor Website Builder < 3.12.2": [[0, 34]], "VULNERABILITY: SQLi": [[44, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51956"}} {"text": "elFinder Web file manager Version - 2.1.53 Remote Command Execution", "spans": {"SYSTEM: elFinder Web file manager Version": [[0, 33]], "VULNERABILITY: Remote Command Execution": [[43, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51864"}} {"text": "ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting", "spans": {"SYSTEM: ElkarBackup 1.3.3": [[0, 17]], "VULNERABILITY: and 'Policy[Description]' Stored Cross-site Scripting": [[35, 88]]}, "info": {"source": "exploitdb", "exploit_id": "49121"}} {"text": "ElkarBackup 1.3.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: ElkarBackup 1.3.3": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48756"}} {"text": "ElkArte Forum 1.1.9 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: ElkArte Forum 1.1.9": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52026"}} {"text": "Emagic Data Center Management Suite v6.0 - OS Command Injection", "spans": {"SYSTEM: Emagic Data Center Management Suite v6.0": [[0, 40]], "VULNERABILITY: Command Injection": [[46, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51673"}} {"text": "Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Employee and Visitor Gate Pass Logging System 1.0": [[0, 49]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[59, 92]]}, "info": {"source": "exploitdb", "exploit_id": "50507"}} {"text": "Employee Daily Task Management System 1.0 - 'Name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Employee Daily Task Management System 1.0": [[0, 41]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[51, 84]]}, "info": {"source": "exploitdb", "exploit_id": "50506"}} {"text": "Employee Management System 1.0 - 'admin_id' SQLi", "spans": {"SYSTEM: Employee Management System 1.0": [[0, 30]], "VULNERABILITY: SQLi": [[44, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51911"}} {"text": "Employee Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Employee Management System 1.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48882"}} {"text": "Employee Management System 1.0 - Cross Site Scripting (Stored)", "spans": {"SYSTEM: Employee Management System 1.0": [[0, 30]], "VULNERABILITY: Cross Site Scripting": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48881"}} {"text": "Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection", "spans": {"SYSTEM: Employee Management System 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[62, 75]]}, "info": {"source": "exploitdb", "exploit_id": "51950"}} {"text": "Employee Management System 1.0 - _txtusername_ and _txtpassword_ SQL Injection (Admin Login)", "spans": {"SYSTEM: Employee Management System 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[65, 78]]}, "info": {"source": "exploitdb", "exploit_id": "51951"}} {"text": "Employee Management System v1 - 'email' SQL Injection", "spans": {"SYSTEM: Employee Management System v1": [[0, 29]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51803"}} {"text": "Employee Performance Evaluation System 1.0 - 'Task and Description' Persistent Cross Site Scripting", "spans": {"SYSTEM: Employee Performance Evaluation System 1.0": [[0, 42]], "VULNERABILITY: Cross Site Scripting": [[79, 99]]}, "info": {"source": "exploitdb", "exploit_id": "49215"}} {"text": "Employee Performance Evaluation System v1.0 - File Inclusion and RCE", "spans": {"SYSTEM: Employee Performance Evaluation System v1.0": [[0, 43]], "VULNERABILITY: File Inclusion": [[46, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51049"}} {"text": "Employee Record Management System 1.2 - 'empid' SQL injection (Unauthenticated)", "spans": {"SYSTEM: Employee Record Management System 1.2": [[0, 37]], "VULNERABILITY: SQL injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50467"}} {"text": "Employee Record Management System 1.2 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Employee Record Management System 1.2": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[40, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50112"}} {"text": "Employee Record System 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Employee Record System 1.0": [[0, 26]], "VULNERABILITY: XSS": [[45, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49280"}} {"text": "Employee Record System 1.0 - Unrestricted File Upload to Remote Code Execution", "spans": {"SYSTEM: Employee Record System 1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49389"}} {"text": "Employee Task Management System v1.0 - Broken Authentication", "spans": {"SYSTEM: Employee Task Management System v1.0": [[0, 36]], "VULNERABILITY: Broken Authentication": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51285"}} {"text": "Employee Task Management System v1.0 - SQL Injection on (task-details.php?task_id=?)", "spans": {"SYSTEM: Employee Task Management System v1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51286"}} {"text": "Employee Task Management System v1.0 - SQL Injection on edit-task.php", "spans": {"SYSTEM: Employee Task Management System v1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51287"}} {"text": "Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: Employees Daily Task Management System 1.0": [[0, 42]], "VULNERABILITY: Cross Site Scripting": [[56, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50583"}} {"text": "Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass", "spans": {"SYSTEM: Employees Daily Task Management System 1.0": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50582"}} {"text": "Engineers Online Portal 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Engineers Online Portal 1.0": [[0, 27]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50453"}} {"text": "Engineers Online Portal 1.0 - 'multiple' Authentication Bypass", "spans": {"SYSTEM: Engineers Online Portal 1.0": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50452"}} {"text": "Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Engineers Online Portal 1.0": [[0, 27]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[41, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50451"}} {"text": "Engineers Online Portal 1.0 - File Upload Remote Code Execution (RCE)", "spans": {"SYSTEM: Engineers Online Portal 1.0": [[0, 27]], "VULNERABILITY: Remote Code Execution (RCE)": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50444"}} {"text": "Enrollment System Project v1.0 - SQL Injection Authentication Bypass (SQLI)", "spans": {"SYSTEM: Enrollment System Project v1.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51501"}} {"text": "Equipment Inventory System 1.0 - 'multiple' Stored XSS", "spans": {"SYSTEM: Equipment Inventory System 1.0": [[0, 30]], "VULNERABILITY: XSS": [[51, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49722"}} {"text": "ERPGo SaaS 3.9 - CSV Injection", "spans": {"SYSTEM: ERPGo SaaS 3.9": [[0, 14]], "VULNERABILITY: CSV Injection": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51220"}} {"text": "Eve-ng 5.0.1-13 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Eve-ng 5.0.1-13": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[18, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51153"}} {"text": "Event Registration System with QR Code 1.0 - Authentication Bypass", "spans": {"SYSTEM: Event Registration System with QR Code 1.0": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50159"}} {"text": "Evolution CMS 3.1.6 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Evolution CMS 3.1.6": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50296"}} {"text": "Exagate Sysguard 6001 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Exagate Sysguard 6001": [[0, 21]], "VULNERABILITY: Cross-Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48234"}} {"text": "Exam Form Submission System 1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Exam Form Submission System 1.0": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50360"}} {"text": "Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated)", "spans": {"SYSTEM: Exam Hall Management System 1.0": [[0, 31]], "VULNERABILITY: Unrestricted File Upload": [[34, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50103"}} {"text": "Exam Hall Management System 1.0 - Unrestricted File Upload + RCE (Unauthenticated)", "spans": {"SYSTEM: Exam Hall Management System 1.0": [[0, 31]], "VULNERABILITY: Unrestricted File Upload + RCE": [[34, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50111"}} {"text": "Exam Reviewer Management System 1.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Exam Reviewer Management System 1.0": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50726"}} {"text": "Exam Reviewer Management System 1.0 - ‘id’ SQL Injection", "spans": {"SYSTEM: Exam Reviewer Management System 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50725"}} {"text": "Expense Tracker 1.0 - 'Expense Name' Stored Cross-Site Scripting", "spans": {"SYSTEM: Expense Tracker 1.0": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting": [[37, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49373"}} {"text": "Explore CMS 1.0 - SQL Injection", "spans": {"SYSTEM: Explore CMS 1.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "50920"}} {"text": "Exponent CMS 2.6 - Multiple Vulnerabilities", "spans": {"SYSTEM: Exponent CMS 2.6": [[0, 16]], "VULNERABILITY: Multiple Vulnerabilities": [[19, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50611"}} {"text": "Extensive VC Addons for WPBakery page builder 1.9.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Extensive VC Addons for WPBakery page builder 1.9.0": [[0, 51]], "VULNERABILITY: Remote Code Execution (RCE)": [[54, 81]]}, "info": {"source": "exploitdb", "exploit_id": "52085"}} {"text": "eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE)", "spans": {"SYSTEM: eXtplorer<= 2.1.14": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[45, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51067"}} {"text": "EyesOfNetwork 5.3 - Remote Code Execution", "spans": {"SYSTEM: EyesOfNetwork 5.3": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48025"}} {"text": "EyouCMS 1.4.6 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: EyouCMS 1.4.6": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48530"}} {"text": "Faculty Evaluation System 1.0 - Stored XSS", "spans": {"SYSTEM: Faculty Evaluation System 1.0": [[0, 29]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49320"}} {"text": "Faculty Evaluation System 1.0 - Unauthenticated File Upload", "spans": {"SYSTEM: Faculty Evaluation System 1.0": [[0, 29]], "VULNERABILITY: File Upload": [[48, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51495"}} {"text": "Faculty Evaluation System v1.0 - SQL Injection", "spans": {"SYSTEM: Faculty Evaluation System v1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51573"}} {"text": "Fast PHP Chat 1.3 - 'my_item_search' SQL Injection", "spans": {"SYSTEM: Fast PHP Chat 1.3": [[0, 17]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49777"}} {"text": "Faulty Evaluation System 1.0 - 'multiple' Stored Cross-Site Scripting", "spans": {"SYSTEM: Faulty Evaluation System 1.0": [[0, 28]], "VULNERABILITY: Stored Cross-Site Scripting": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49569"}} {"text": "Feehi CMS 2.1.1 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Feehi CMS 2.1.1": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51018"}} {"text": "Feehi CMS 2.1.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Feehi CMS 2.1.1": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[18, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51002"}} {"text": "Feng Office 3.11.1.2 - SQL Injection", "spans": {"SYSTEM: Feng Office 3.11.1.2": [[0, 20]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52154"}} {"text": "FHEM 6.0 - Local File Inclusion", "spans": {"SYSTEM: FHEM 6.0": [[0, 8]], "VULNERABILITY: Local File Inclusion": [[11, 31]]}, "info": {"source": "exploitdb", "exploit_id": "48621"}} {"text": "File Management System 1.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: File Management System 1.1": [[0, 26]], "VULNERABILITY: Persistent Cross-Site Scripting": [[29, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48635"}} {"text": "File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: File Manager Advanced Shortcode 2.3.2": [[0, 37]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[40, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51505"}} {"text": "File Thingie 2.5.7 - Remote Code Execution (RCE)", "spans": {"SYSTEM: File Thingie 2.5.7": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51436"}} {"text": "FileCloud 21.2 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: FileCloud 21.2": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50774"}} {"text": "Filerun 2021.03.26 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Filerun 2021.03.26": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50313"}} {"text": "Fishing Reservation System 7.5 - 'uid' SQL Injection", "spans": {"SYSTEM: Fishing Reservation System 7.5": [[0, 30]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48417"}} {"text": "Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Flatboard 3.2": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52054"}} {"text": "flatCore 1.5 - Cross Site Request Forgery (CSRF)", "spans": {"SYSTEM: flatCore 1.5": [[0, 12]], "VULNERABILITY: CSRF": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52166"}} {"text": "flatCore 1.5.5 - Arbitrary File Upload", "spans": {"SYSTEM: flatCore 1.5.5": [[0, 14]], "VULNERABILITY: Arbitrary File Upload": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52165"}} {"text": "FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: FlatCore CMS 2.0.7": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50262"}} {"text": "FlatCore CMS 2.1.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: FlatCore CMS 2.1.1": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[21, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51068"}} {"text": "flatnux 2021-03.25 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: flatnux 2021-03.25": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51295"}} {"text": "Flatpress Add Blog 1.0.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Flatpress Add Blog 1.0.3": [[0, 24]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48826"}} {"text": "FlatPress v1.3 - Remote Command Execution", "spans": {"SYSTEM: FlatPress v1.3": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51997"}} {"text": "FlexNet Publisher 11.12.1 - Cross-Site Request Forgery (Add Local Admin)", "spans": {"SYSTEM: FlexNet Publisher 11.12.1": [[0, 25]], "VULNERABILITY: Cross-Site Request Forgery": [[28, 54]]}, "info": {"source": "exploitdb", "exploit_id": "47986"}} {"text": "FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: FluxBB 1.5.11": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52090"}} {"text": "FoF Pretty Mail 1.1.2 - Local File Inclusion (LFI)", "spans": {"SYSTEM: FoF Pretty Mail 1.1.2": [[0, 21]], "VULNERABILITY: Local File Inclusion": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51947"}} {"text": "FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI)", "spans": {"SYSTEM: FoF Pretty Mail 1.1.2": [[0, 21]], "VULNERABILITY: SSTI": [[56, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51948"}} {"text": "FOGProject 1.5.9 - File Upload RCE (Authenticated)", "spans": {"SYSTEM: FOGProject 1.5.9": [[0, 16]], "VULNERABILITY: RCE": [[31, 34]]}, "info": {"source": "exploitdb", "exploit_id": "49811"}} {"text": "Fork CMS 5.8.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Fork CMS 5.8.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48348"}} {"text": "Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting", "spans": {"SYSTEM: Forma LMS 2.3": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting": [[36, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49197"}} {"text": "forma.lms 5.6.40 - Cross-Site Request Forgery (Change Admin Email)", "spans": {"SYSTEM: forma.lms 5.6.40": [[0, 16]], "VULNERABILITY: Cross-Site Request Forgery": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48494"}} {"text": "forma.lms The E-Learning Suite 2.3.0.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: forma.lms The E-Learning Suite 2.3.0.2": [[0, 38]], "VULNERABILITY: Persistent Cross-Site Scripting": [[41, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48478"}} {"text": "Free School Management Software 1.0 - 'multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Free School Management Software 1.0": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50586"}} {"text": "Free School Management Software 1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Free School Management Software 1.0": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50587"}} {"text": "FreePBX 16 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: FreePBX 16": [[0, 10]], "VULNERABILITY: Remote Code Execution (RCE)": [[14, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52031"}} {"text": "Froxlor 0.10.29.1 - SQL Injection (Authenticated)", "spans": {"SYSTEM: Froxlor 0.10.29.1": [[0, 17]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "50502"}} {"text": "Froxlor 2.0.3 Stable - Remote Code Execution (RCE)", "spans": {"SYSTEM: Froxlor 2.0.3 Stable": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51263"}} {"text": "Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Froxlor Froxlor Server Management Panel 0.10.16": [[0, 47]], "VULNERABILITY: Persistent Cross-Site Scripting": [[50, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49063"}} {"text": "FUDForum 3.1.0 - 'author' Reflected XSS", "spans": {"SYSTEM: FUDForum 3.1.0": [[0, 14]], "VULNERABILITY: XSS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49943"}} {"text": "FUDForum 3.1.0 - 'srch' Reflected XSS", "spans": {"SYSTEM: FUDForum 3.1.0": [[0, 14]], "VULNERABILITY: XSS": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49942"}} {"text": "Fuel CMS 1.4.1 - Remote Code Execution (2)", "spans": {"SYSTEM: Fuel CMS 1.4.1": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49487"}} {"text": "Fuel CMS 1.4.1 - Remote Code Execution (3)", "spans": {"SYSTEM: Fuel CMS 1.4.1": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50477"}} {"text": "Fuel CMS 1.4.13 - 'col' Blind SQL Injection (Authenticated)", "spans": {"SYSTEM: Fuel CMS 1.4.13": [[0, 15]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50523"}} {"text": "Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated)", "spans": {"SYSTEM: Fuel CMS 1.4.7": [[0, 14]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48741"}} {"text": "Fuel CMS 1.4.8 - 'fuel_replace_id' SQL Injection (Authenticated)", "spans": {"SYSTEM: Fuel CMS 1.4.8": [[0, 14]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48778"}} {"text": "Fuel CMS 1.5.0 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Fuel CMS 1.5.0": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50884"}} {"text": "Fundraising Script 1.0 - SQLi", "spans": {"SYSTEM: Fundraising Script 1.0": [[0, 22]], "VULNERABILITY: SQLi": [[25, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51753"}} {"text": "FusionPBX 4.5.29 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: FusionPBX 4.5.29": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50505"}} {"text": "Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Gadget Works Online Ordering System 1.0": [[0, 39]], "VULNERABILITY: Persistent Cross-Site Scripting": [[53, 84]]}, "info": {"source": "exploitdb", "exploit_id": "49904"}} {"text": "Garbage Collection Management System 1.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Garbage Collection Management System 1.0": [[0, 40]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50085"}} {"text": "Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload", "spans": {"SYSTEM: Garbage Collection Management System 1.0": [[0, 40]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50123"}} {"text": "GDidees CMS 3.9.1 - Local File Disclosure", "spans": {"SYSTEM: GDidees CMS 3.9.1": [[0, 17]], "VULNERABILITY: Local File Disclosure": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51381"}} {"text": "GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: GetSimple CMS 3.3.16": [[0, 20]], "VULNERABILITY: Persistent Cross-Site Scripting": [[23, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49726"}} {"text": "GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: GetSimple CMS 3.3.16": [[0, 20]], "VULNERABILITY: Persistent Cross-Site Scripting": [[23, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48850"}} {"text": "GetSimple CMS 3.3.4 - Information Disclosure", "spans": {"SYSTEM: GetSimple CMS 3.3.4": [[0, 19]], "VULNERABILITY: Information Disclosure": [[22, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49928"}} {"text": "GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery", "spans": {"SYSTEM: GetSimple CMS Custom JS 0.1": [[0, 27]], "VULNERABILITY: Cross-Site Request Forgery": [[30, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49816"}} {"text": "GetSimple CMS My SMTP Contact Plugin 1.1.1 - Cross-Site Request Forgery", "spans": {"SYSTEM: GetSimple CMS My SMTP Contact Plugin 1.1.1": [[0, 42]], "VULNERABILITY: Cross-Site Request Forgery": [[45, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49774"}} {"text": "GetSimple CMS My SMTP Contact Plugin 1.1.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: GetSimple CMS My SMTP Contact Plugin 1.1.2": [[0, 42]], "VULNERABILITY: Persistent Cross-Site Scripting": [[45, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49798"}} {"text": "GetSimple CMS Plugin Multi User 1.8.2 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: GetSimple CMS Plugin Multi User 1.8.2": [[0, 37]], "VULNERABILITY: Cross-Site Request Forgery": [[40, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48745"}} {"text": "GetSimple CMS v3.3.16 - Remote Code Execution (RCE)", "spans": {"SYSTEM: GetSimple CMS v3.3.16": [[0, 21]], "VULNERABILITY: Remote Code Execution (RCE)": [[24, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51475"}} {"text": "GetSimpleCMS 3.3.16 - Remote Code Execution (RCE)", "spans": {"SYSTEM: GetSimpleCMS 3.3.16": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52168"}} {"text": "Gibbon LMS < v26.0.00 - Authenticated RCE", "spans": {"SYSTEM: Gibbon LMS < v26.0.00": [[0, 21]], "VULNERABILITY: RCE": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51903"}} {"text": "Gibbon LMS v26.0.00 - SSTI vulnerability", "spans": {"SYSTEM: Gibbon LMS v26.0.00": [[0, 19]], "VULNERABILITY: SSTI": [[22, 26]]}, "info": {"source": "exploitdb", "exploit_id": "51962"}} {"text": "Gila CMS 1.10.9 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Gila CMS 1.10.9": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51569"}} {"text": "Gila CMS 1.11.8 - 'query' SQL Injection", "spans": {"SYSTEM: Gila CMS 1.11.8": [[0, 15]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48590"}} {"text": "Gila CMS 2.0.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Gila CMS 2.0.0": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49412"}} {"text": "Global - Multi School Management System Express v1.0- SQL Injection", "spans": {"SYSTEM: Global": [[0, 6]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51690"}} {"text": "GLPI Cartography Plugin v6.0.0 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: GLPI Cartography Plugin v6.0.0": [[0, 31]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[34, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51234"}} {"text": "GLPI 4.0.2 - Unauthenticated Local File Inclusion on Manageentities plugin", "spans": {"SYSTEM: GLPI 4.0.2": [[0, 10]], "VULNERABILITY: Local File Inclusion": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51229"}} {"text": "GLPI 9.4.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: GLPI 9.4.5": [[0, 10]], "VULNERABILITY: Remote Code Execution (RCE)": [[13, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49992"}} {"text": "GLPI 9.5.3 - 'fromtype' Unsafe Reflection", "spans": {"SYSTEM: GLPI 9.5.3": [[0, 10]], "VULNERABILITY: Unsafe Reflection": [[24, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49628"}} {"text": "GLPI 9.5.7 - Username Enumeration", "spans": {"SYSTEM: GLPI 9.5.7": [[0, 10]], "VULNERABILITY: Username Enumeration": [[13, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51418"}} {"text": "GLPI Activity v3.1.0 - Authenticated Local File Inclusion on Activity plugin", "spans": {"SYSTEM: GLPI Activity v3.1.0": [[0, 21]], "VULNERABILITY: Local File Inclusion": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51232"}} {"text": "GLPI Glpiinventory v1.0.1 - Unauthenticated Local File Inclusion", "spans": {"SYSTEM: GLPI Glpiinventory v1.0.1": [[0, 25]], "VULNERABILITY: Local File Inclusion": [[44, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51230"}} {"text": "GLPI GZIP(Py3) 9.4.5 - RCE", "spans": {"SYSTEM: GLPI GZIP(Py3) 9.4.5": [[0, 20]], "VULNERABILITY: RCE": [[23, 26]]}, "info": {"source": "exploitdb", "exploit_id": "51726"}} {"text": "GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration)", "spans": {"SYSTEM: GLPI v10.0.2": [[0, 12]], "VULNERABILITY: SQL Injection": [[15, 28]]}, "info": {"source": "exploitdb", "exploit_id": "51233"}} {"text": "Gnuboard5 5.3.2.8 - SQL Injection", "spans": {"SYSTEM: Gnuboard5 5.3.2.8": [[0, 17]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "52167"}} {"text": "GOautodial 4.0 - Authenticated Shell Upload", "spans": {"SYSTEM: GOautodial 4.0": [[0, 14]], "VULNERABILITY: Authenticated Shell Upload": [[17, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48923"}} {"text": "GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: GOautodial 4.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48690"}} {"text": "Grav CMS 1.6.30 Admin Plugin 1.9.18 - 'Page Title' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Grav CMS 1.6.30 Admin Plugin 1.9.18": [[0, 35]], "VULNERABILITY: Persistent Cross-Site Scripting": [[51, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49264"}} {"text": "Grav CMS 1.7.10 - Server-Side Template Injection (SSTI) (Authenticated)", "spans": {"SYSTEM: Grav CMS 1.7.10": [[0, 15]], "VULNERABILITY: SSTI": [[50, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49961"}} {"text": "Grav CMS 1.7.48 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Grav CMS 1.7.48": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52402"}} {"text": "GravCMS 1.10.7 - Arbitrary YAML Write/Update (Unauthenticated) (2)", "spans": {"SYSTEM: GravCMS 1.10.7": [[0, 14]], "VULNERABILITY: Arbitrary YAML Write/Update": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49973"}} {"text": "GravCMS 1.10.7 - Unauthenticated Arbitrary File Write (Metasploit)", "spans": {"SYSTEM: GravCMS 1.10.7": [[0, 14]], "VULNERABILITY: Arbitrary File Write": [[33, 53]], "TOOL: Metasploit": [[55, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49788"}} {"text": "grocy 2.7.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: grocy 2.7.1": [[0, 11]], "VULNERABILITY: Persistent Cross-Site Scripting": [[14, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48792"}} {"text": "Grocy <=4.0.2 - CSRF", "spans": {"SYSTEM: Grocy <=4.0.2": [[0, 13]], "VULNERABILITY: CSRF": [[16, 20]]}, "info": {"source": "exploitdb", "exploit_id": "51760"}} {"text": "Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: Grokability Snipe-IT 8.0.4": [[0, 26]], "VULNERABILITY: Insecure Direct Object Reference": [[29, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52282"}} {"text": "Groomify v1.0 - SQL Injection", "spans": {"SYSTEM: Groomify v1.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51526"}} {"text": "GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection", "spans": {"SYSTEM: GUnet OpenEclass 1.7.3 E-learning platform": [[0, 42]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48163"}} {"text": "GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection", "spans": {"SYSTEM: GUnet OpenEclass E-learning platform 1.7.3": [[0, 42]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48106"}} {"text": "GUnet OpenEclass E-learning platform 3.15 - 'certbadge.php' Unrestricted File Upload", "spans": {"SYSTEM: GUnet OpenEclass E-learning platform 3.15": [[0, 41]], "VULNERABILITY: Unrestricted File Upload": [[60, 84]]}, "info": {"source": "exploitdb", "exploit_id": "51975"}} {"text": "GuppY CMS v6.00.10 - Remote Code Execution", "spans": {"SYSTEM: GuppY CMS v6.00.10": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51052"}} {"text": "Gym Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Gym Management System 1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48936"}} {"text": "Gym Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Gym Management System 1.0": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48940"}} {"text": "Gym Management System 1.0 - Stored Cross Site Scripting", "spans": {"SYSTEM: Gym Management System 1.0": [[0, 25]], "VULNERABILITY: Stored Cross Site Scripting": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48941"}} {"text": "Gym Management System 1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Gym Management System 1.0": [[0, 25]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[28, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48506"}} {"text": "GYM MS - GYM Management System - Cross Site Scripting (Stored)", "spans": {"SYSTEM: GYM MS - GYM Management System": [[0, 30]], "VULNERABILITY: Cross Site Scripting": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51777"}} {"text": "GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: GZ Forum Script 1.8": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[22, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51559"}} {"text": "Helmet Store Showroom v1.0 - SQL Injection", "spans": {"SYSTEM: Helmet Store Showroom v1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51132"}} {"text": "Helpdeskz v2.0.2 - Stored XSS", "spans": {"SYSTEM: Helpdeskz v2.0.2": [[0, 16]], "VULNERABILITY: XSS": [[26, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52068"}} {"text": "Hestia Control Panel 1.3.2 - Arbitrary File Write", "spans": {"SYSTEM: Hestia Control Panel 1.3.2": [[0, 26]], "VULNERABILITY: Arbitrary File Write": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49667"}} {"text": "Hide My WP < 6.2.9 - Unauthenticated SQLi", "spans": {"SYSTEM: Hide My WP < 6.2.9": [[0, 18]], "VULNERABILITY: SQLi": [[37, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51871"}} {"text": "hits script 1.0 - 'item_name' SQL Injection", "spans": {"SYSTEM: hits script 1.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48399"}} {"text": "Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection", "spans": {"SYSTEM: Home Owners Collection Management System 1.0": [[0, 44]], "VULNERABILITY: SQL Injection": [[58, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50732"}} {"text": "Home Owners Collection Management System 1.0 - Account Takeover (Unauthenticated)", "spans": {"SYSTEM: Home Owners Collection Management System 1.0": [[0, 44]], "VULNERABILITY: Account Takeover": [[47, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50730"}} {"text": "Home Owners Collection Management System 1.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Home Owners Collection Management System 1.0": [[0, 44]], "VULNERABILITY: Remote Code Execution (RCE)": [[47, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50731"}} {"text": "Horde Groupware Webmail Edition 5.2.22 - PHAR Loading", "spans": {"SYSTEM: Horde Groupware Webmail Edition 5.2.22": [[0, 38]], "VULNERABILITY: PHAR Loading": [[41, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48210"}} {"text": "Horde Groupware Webmail Edition 5.2.22 - PHP File Inclusion", "spans": {"SYSTEM: Horde Groupware Webmail Edition 5.2.22": [[0, 38]], "VULNERABILITY: File Inclusion": [[45, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48209"}} {"text": "Horde Groupware Webmail Edition 5.2.22 - Remote Code Execution", "spans": {"SYSTEM: Horde Groupware Webmail Edition 5.2.22": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48215"}} {"text": "Hospital Management Startup 1.0 - 'Multiple' SQLi", "spans": {"SYSTEM: Hospital Management Startup 1.0": [[0, 31]], "VULNERABILITY: SQLi": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50729"}} {"text": "Hospital Management System 4.0 - 'multiple' SQL Injection", "spans": {"SYSTEM: Hospital Management System 4.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50718"}} {"text": "Hospital Management System 4.0 - 'searchdata' SQL Injection", "spans": {"SYSTEM: Hospital Management System 4.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "47840"}} {"text": "Hospital Management System 4.0 - Authentication Bypass", "spans": {"SYSTEM: Hospital Management System 4.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "47836"}} {"text": "Hospital Management System 4.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Hospital Management System 4.0": [[0, 30]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47841"}} {"text": "Hospital Management System v1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Hospital Management System v1.0": [[0, 31]], "VULNERABILITY: Stored Cross Site Scripting": [[34, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51945"}} {"text": "Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Hospitals Patient Records Management System 1.0": [[0, 47]], "VULNERABILITY: Stored Cross Site Scripting": [[60, 87]]}, "info": {"source": "exploitdb", "exploit_id": "50658"}} {"text": "Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated)", "spans": {"SYSTEM: Hospitals Patient Records Management System 1.0": [[0, 47]], "VULNERABILITY: SQL Injection": [[55, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50630"}} {"text": "Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Hospitals Patient Records Management System 1.0": [[0, 47]], "VULNERABILITY: Stored Cross Site Scripting": [[62, 89]]}, "info": {"source": "exploitdb", "exploit_id": "50657"}} {"text": "Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Hospitals Patient Records Management System 1.0": [[0, 47]], "VULNERABILITY: Stored Cross Site Scripting": [[63, 90]]}, "info": {"source": "exploitdb", "exploit_id": "50656"}} {"text": "Hospitals Patient Records Management System 1.0 - Account TakeOver", "spans": {"SYSTEM: Hospitals Patient Records Management System 1.0": [[0, 47]], "VULNERABILITY: Account TakeOver": [[50, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50631"}} {"text": "Hostel Management System 2.0 - 'id' SQL Injection", "spans": {"SYSTEM: Hostel Management System 2.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47854"}} {"text": "Hostel Management System 2.0 - 'id' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Hostel Management System 2.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48542"}} {"text": "Hostel Management System 2.1 - Cross Site Scripting (Multiple Fields)", "spans": {"SYSTEM: Hostel Management System 2.1": [[0, 28]], "VULNERABILITY: Cross Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48905"}} {"text": "Hostel Management System 2.1 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Hostel Management System 2.1": [[0, 28]], "VULNERABILITY: Cross Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50628"}} {"text": "Hotel And Lodge Management System 1.0 - 'Customer Details' Stored XSS", "spans": {"SYSTEM: Hotel And Lodge Management System 1.0": [[0, 37]], "VULNERABILITY: XSS": [[66, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49700"}} {"text": "Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Hotel and Lodge Management System 1.0": [[0, 37]], "VULNERABILITY: Remote Code Execution": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49625"}} {"text": "Hotel Druid 3.0.3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Hotel Druid 3.0.3": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50754"}} {"text": "Hotel Management System 1.0 - Cross-Site Scripting (XSS) Arbitrary File Upload Remote Code Execution (RCE)", "spans": {"SYSTEM: Hotel Management System 1.0": [[0, 27]], "VULNERABILITY: Remote Code Execution (RCE)": [[79, 106]]}, "info": {"source": "exploitdb", "exploit_id": "50173"}} {"text": "Hotel Management System 1.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Hotel Management System 1.0": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48888"}} {"text": "Hotel Reservation System 1.0 - SQLi (Unauthenticated)", "spans": {"SYSTEM: Hotel Reservation System 1.0": [[0, 28]], "VULNERABILITY: SQLi": [[31, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50715"}} {"text": "House Rental 1.0 - 'keywords' SQL Injection", "spans": {"SYSTEM: House Rental 1.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49117"}} {"text": "HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: HRSALE 1.1.8": [[0, 12]], "VULNERABILITY: Cross-Site Request Forgery": [[15, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48205"}} {"text": "Hrsale 2.0.0 - Local File Inclusion", "spans": {"SYSTEM: Hrsale 2.0.0": [[0, 12]], "VULNERABILITY: Local File Inclusion": [[15, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48920"}} {"text": "htmlLawed 1.2.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: htmlLawed 1.2.5": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52023"}} {"text": "HTMLy Version v2.9.6 - Stored XSS", "spans": {"SYSTEM: HTMLy Version v2.9.6": [[0, 20]], "VULNERABILITY: XSS": [[30, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51979"}} {"text": "Human Resource Information System 0.1 - 'First Name' Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: Human Resource Information System 0.1": [[0, 38]], "VULNERABILITY: Persistent Cross-Site Scripting": [[55, 86]]}, "info": {"source": "exploitdb", "exploit_id": "49854"}} {"text": "Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Human Resource Information System 0.1": [[0, 37]], "VULNERABILITY: Remote Code Execution": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49847"}} {"text": "Human Resource Management System 1.0 - 'employeeid' SQL Injection", "spans": {"SYSTEM: Human Resource Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[52, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51877"}} {"text": "Human Resource Management System 1.0 - SQL Injection (unauthenticated)", "spans": {"SYSTEM: Human Resource Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51125"}} {"text": "Human Resource Management System v1.0 - Multiple SQLi", "spans": {"SYSTEM: Human Resource Management System v1.0": [[0, 37]], "VULNERABILITY: SQLi": [[49, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51971"}} {"text": "Human Resources Management System v1.0 - Multiple SQLi", "spans": {"SYSTEM: Human Resources Management System v1.0": [[0, 38]], "VULNERABILITY: SQLi": [[50, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51047"}} {"text": "Hyip Rio 2.1 - Arbitrary File Upload", "spans": {"SYSTEM: Hyip Rio 2.1": [[0, 12]], "VULNERABILITY: Arbitrary File Upload": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51698"}} {"text": "i-doit Open Source CMDB 1.14.1 - Arbitrary File Deletion", "spans": {"SYSTEM: i-doit Open Source CMDB 1.14.1": [[0, 30]], "VULNERABILITY: Arbitrary File Deletion": [[33, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48427"}} {"text": "i-Panel Administration System 2.0 - Reflected Cross-site Scripting (XSS)", "spans": {"SYSTEM: i-Panel Administration System 2.0": [[0, 33]], "VULNERABILITY: XSS": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50418"}} {"text": "iBooking v1.0.8 - Arbitrary File Upload", "spans": {"SYSTEM: iBooking v1.0.8": [[0, 15]], "VULNERABILITY: Arbitrary File Upload": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51119"}} {"text": "Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User)", "spans": {"SYSTEM: Ice HRM 26.2.0": [[0, 14]], "VULNERABILITY: Cross-Site Request Forgery": [[17, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48082"}} {"text": "ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: ICE Hrm 29.0.0.OS": [[0, 17]], "VULNERABILITY: CSRF": [[67, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50031"}} {"text": "ICE Hrm 29.0.0.OS - 'xml upload' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ICE Hrm 29.0.0.OS": [[0, 17]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[33, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50032"}} {"text": "ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Deletion", "spans": {"SYSTEM: ICEHRM 31.0.0.0S": [[0, 16]], "VULNERABILITY: CSRF": [[47, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50855"}} {"text": "ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover", "spans": {"SYSTEM: ICEHRM 31.0.0.0S": [[0, 16]], "VULNERABILITY: CSRF": [[47, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50831"}} {"text": "IceWarp WebMail 11.4.4.1 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: IceWarp WebMail 11.4.4.1": [[0, 24]], "VULNERABILITY: Cross-Site Scripting": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "47988"}} {"text": "Icinga Web 2.10 - Arbitrary File Disclosure", "spans": {"SYSTEM: Icinga Web 2.10": [[0, 15]], "VULNERABILITY: Arbitrary File Disclosure": [[18, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51329"}} {"text": "Icinga Web 2.10 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Icinga Web 2.10": [[0, 15]], "VULNERABILITY: Authenticated Remote Code Execution": [[18, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51586"}} {"text": "IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated)", "spans": {"SYSTEM: IFSC Code Finder Project 1.0": [[0, 28]], "VULNERABILITY: SQL injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50391"}} {"text": "iMLog < 1.307 - Persistent Cross Site Scripting (XSS)", "spans": {"SYSTEM: iMLog < 1.307": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52025"}} {"text": "ImpressCMS 1.4.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: ImpressCMS 1.4.2": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50839"}} {"text": "ImpressCMS 1.4.2 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: ImpressCMS 1.4.2": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50298"}} {"text": "ImpressCMS v1.4.3 - Authenticated SQL Injection", "spans": {"SYSTEM: ImpressCMS v1.4.3": [[0, 17]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51056"}} {"text": "ImpressCMS v1.4.4 - Unrestricted File Upload", "spans": {"SYSTEM: ImpressCMS v1.4.4": [[0, 17]], "VULNERABILITY: Unrestricted File Upload": [[20, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50890"}} {"text": "Infor Storefront B2B 1.0 - 'usr_name' SQL Injection", "spans": {"SYSTEM: Infor Storefront B2B 1.0": [[0, 24]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48674"}} {"text": "InoERP 0.7.2 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: InoERP 0.7.2": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48946"}} {"text": "Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Insurance Management System PHP and MySQL 1.0": [[0, 45]], "VULNERABILITY: XSS": [[64, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51920"}} {"text": "Intern Record System v1.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Intern Record System v1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[28, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51274"}} {"text": "Internship Portal Management System 1.0 - Remote Code Execution(Unauthenticated)", "spans": {"SYSTEM: Internship Portal Management System 1.0": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49823"}} {"text": "Interview Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Interview Management System 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49279"}} {"text": "Interview Management System 1.0 - Stored XSS in Add New Question", "spans": {"SYSTEM: Interview Management System 1.0": [[0, 31]], "VULNERABILITY: XSS": [[41, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49278"}} {"text": "Inventio Lite 4 - SQL Injection", "spans": {"SYSTEM: Inventio Lite 4": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "52263"}} {"text": "Invoice System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Invoice System 1.0": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[32, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50121"}} {"text": "itech TrainSmart r1044 - SQL injection", "spans": {"SYSTEM: itech TrainSmart r1044": [[0, 22]], "VULNERABILITY: SQL injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51253"}} {"text": "Jasmin Ransomware - SQL Injection Login Bypass", "spans": {"SYSTEM: Jasmin Ransomware": [[0, 17]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "52091"}} {"text": "Jedox 2020.2.5 - Disclosure of Database Credentials via Improper Access Controls", "spans": {"SYSTEM: Jedox 2020.2.5": [[0, 14]], "VULNERABILITY: Disclosure of Database Credentials via Improper Access Controls": [[17, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51428"}} {"text": "Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path", "spans": {"SYSTEM: Jedox 2020.2.5": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51426"}} {"text": "Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts", "spans": {"SYSTEM: Jedox 2020.2.5": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51427"}} {"text": "Jedox 2020.2.5 - Stored Cross-Site Scripting in Log-Module", "spans": {"SYSTEM: Jedox 2020.2.5": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51425"}} {"text": "Jedox 2022.4.2 - Code Execution via RPC Interfaces", "spans": {"SYSTEM: Jedox 2022.4.2": [[0, 14]], "VULNERABILITY: Code Execution via RPC Interfaces": [[17, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51423"}} {"text": "Jedox 2022.4.2 - Disclosure of Database Credentials via Connection Checks", "spans": {"SYSTEM: Jedox 2022.4.2": [[0, 14]], "VULNERABILITY: Disclosure of Database Credentials via Connection Checks": [[17, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51429"}} {"text": "Jedox 2022.4.2 - Remote Code Execution via Directory Traversal", "spans": {"SYSTEM: Jedox 2022.4.2": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51424"}} {"text": "Jetpack 11.4 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Jetpack 11.4": [[0, 12]], "VULNERABILITY: Cross Site Scripting": [[15, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51104"}} {"text": "JFrog Artifactory < 7.25.4 - Blind SQL Injection", "spans": {"SYSTEM: JFrog Artifactory < 7.25.4": [[0, 26]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51806"}} {"text": "jizhi CMS 1.6.7 - Arbitrary File Download", "spans": {"SYSTEM: jizhi CMS 1.6.7": [[0, 15]], "VULNERABILITY: Arbitrary File Download": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48361"}} {"text": "JLex GuestBook 1.6.4 - Reflected XSS", "spans": {"SYSTEM: JLex GuestBook 1.6.4": [[0, 20]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51647"}} {"text": "Job Portal 1.0 - File Upload Restriction Bypass", "spans": {"SYSTEM: Job Portal 1.0": [[0, 14]], "VULNERABILITY: File Upload": [[17, 28]]}, "info": {"source": "exploitdb", "exploit_id": "51440"}} {"text": "Job Portal 1.0 - Remote Code Execution", "spans": {"SYSTEM: Job Portal 1.0": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "47881"}} {"text": "Jobpilot v2.61 - SQL Injection", "spans": {"SYSTEM: Jobpilot v2.61": [[0, 14]], "VULNERABILITY: SQL Injection": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51527"}} {"text": "Joomla HikaShop 4.7.4 - Reflected XSS", "spans": {"SYSTEM: Joomla HikaShop 4.7.4": [[0, 21]], "VULNERABILITY: XSS": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51629"}} {"text": "Joomla iProperty Real Estate 4.1.1 - Reflected XSS", "spans": {"SYSTEM: Joomla iProperty Real Estate 4.1.1": [[0, 34]], "VULNERABILITY: XSS": [[47, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51640"}} {"text": "Joomla JCK Editor 6.4.4 - 'parent' SQL Injection (2)", "spans": {"SYSTEM: Joomla JCK Editor 6.4.4": [[0, 23]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49627"}} {"text": "Joomla JLex Review 6.0.1 - Reflected XSS", "spans": {"SYSTEM: Joomla JLex Review 6.0.1": [[0, 24]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51645"}} {"text": "Joomla JS Jobs plugin 1.4.2 - SQL injection", "spans": {"SYSTEM: Joomla JS Jobs plugin 1.4.2": [[0, 27]], "VULNERABILITY: SQL injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52373"}} {"text": "Joomla Plugin SexyPolling 2.1.7 - SQLi", "spans": {"SYSTEM: Joomla Plugin SexyPolling 2.1.7": [[0, 31]], "VULNERABILITY: SQLi": [[34, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50927"}} {"text": "Joomla Plugin Simple Image Gallery Extended (SIGE) 3.5.3 - Multiple Vulnerabilities", "spans": {"SYSTEM: Joomla Plugin Simple Image Gallery Extended (SIGE) 3.5.3": [[0, 56]], "VULNERABILITY: Multiple Vulnerabilities": [[59, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49064"}} {"text": "Joomla Solidres 2.13.3 - Reflected XSS", "spans": {"SYSTEM: Joomla Solidres 2.13.3": [[0, 22]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51638"}} {"text": "Joomla VirtueMart Shopping Cart 4.0.12 - Reflected XSS", "spans": {"SYSTEM: Joomla VirtueMart Shopping Cart 4.0.12": [[0, 38]], "VULNERABILITY: XSS": [[51, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51631"}} {"text": "Joomla! 3.9.0 < 3.9.7 - CSV Injection", "spans": {"SYSTEM: Joomla! 3.9.0 < 3.9.7": [[0, 21]], "VULNERABILITY: CSV Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48198"}} {"text": "Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload", "spans": {"SYSTEM: Joomla! Component ACYMAILING 3.9.0": [[0, 34]], "VULNERABILITY: Arbitrary File Upload": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48230"}} {"text": "Joomla! Component com_newsfeeds 1.0 - 'feedid' SQL Injection", "spans": {"SYSTEM: Joomla! Component com_newsfeeds 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48202"}} {"text": "Joomla! Component GMapFP 3.30 - Arbitrary File Upload", "spans": {"SYSTEM: Joomla! Component GMapFP 3.30": [[0, 29]], "VULNERABILITY: Arbitrary File Upload": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48248"}} {"text": "Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload", "spans": {"SYSTEM: Joomla! Component GMapFP 3.5": [[0, 28]], "VULNERABILITY: Arbitrary File Upload": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49129"}} {"text": "Joomla! com_booking component 2.4.9 - Information Leak (Account enumeration)", "spans": {"SYSTEM: Joomla! com_booking component 2.4.9": [[0, 35]], "VULNERABILITY: Information Leak": [[38, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51595"}} {"text": "Joomla! com_fabrik 3.9.11 - Directory Traversal", "spans": {"SYSTEM: Joomla! com_fabrik 3.9.11": [[0, 25]], "VULNERABILITY: Directory Traversal": [[28, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48263"}} {"text": "Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection", "spans": {"SYSTEM: Joomla! com_hdwplayer 4.2": [[0, 25]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48242"}} {"text": "Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection", "spans": {"SYSTEM: Joomla! J2 JOBS 1.3.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48648"}} {"text": "Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection", "spans": {"SYSTEM: Joomla! J2 Store 3.3.11": [[0, 23]], "VULNERABILITY: SQL Injection": [[59, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48572"}} {"text": "Joomla! paGO Commerce 2.5.9.0 - SQL Injection (Authenticated)", "spans": {"SYSTEM: Joomla! paGO Commerce 2.5.9.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48811"}} {"text": "Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated)", "spans": {"SYSTEM: Joomla! Plugin XCloner Backup 3.5.3": [[0, 35]], "VULNERABILITY: Local File Inclusion": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48518"}} {"text": "Joomla! v4.2.8 - Unauthenticated information disclosure", "spans": {"SYSTEM: Joomla! v4.2.8": [[0, 14]], "VULNERABILITY: Unauthenticated information disclosure": [[17, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51334"}} {"text": "Jorani v1.0.3-(c)2014-2023 - XSS Reflected & Information Disclosure", "spans": {"SYSTEM: Jorani v1.0.3-(c)2014-2023": [[0, 26]], "VULNERABILITY: Information Disclosure": [[45, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51715"}} {"text": "Judging Management System v1.0 - Authentication Bypass", "spans": {"SYSTEM: Judging Management System v1.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51165"}} {"text": "Judging Management System v1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Judging Management System v1.0": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51164"}} {"text": "Juniper-SRX-Firewalls&EX-switches - (PreAuth-RCE) (PoC)", "spans": {"SYSTEM: Juniper-SRX-Firewalls&EX-switches": [[0, 33]], "VULNERABILITY: RCE": [[45, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51776"}} {"text": "JUX Real Estate 3.4.0 - SQL Injection", "spans": {"SYSTEM: JUX Real Estate 3.4.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52089"}} {"text": "Karakuzu ERP Management Web 5.7.0 - 'k_adi_duz' SQL Injection", "spans": {"SYSTEM: Karakuzu ERP Management Web 5.7.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "47844"}} {"text": "Kentico CMS 9.0-12.0.49 - Persistent Cross Site Scripting", "spans": {"SYSTEM: Kentico CMS 9.0-12.0.49": [[0, 23]], "VULNERABILITY: Cross Site Scripting": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48864"}} {"text": "Kimai 1.14 - CSV Injection", "spans": {"SYSTEM: Kimai 1.14": [[0, 10]], "VULNERABILITY: CSV Injection": [[13, 26]]}, "info": {"source": "exploitdb", "exploit_id": "49805"}} {"text": "Kimai-1.30.10 - SameSite Cookie-Vulnerability session hijacking", "spans": {"SYSTEM: Kimai-1.30.10": [[0, 13]], "VULNERABILITY: SameSite Cookie-Vulnerability session hijacking": [[16, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51278"}} {"text": "Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Kirby CMS 3.5.3.1": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[27, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49808"}} {"text": "KiviCare Clinic & Patient Management System (EHR) 3.6.4 - Unauthenticated SQL Injection", "spans": {"SYSTEM: KiviCare Clinic & Patient Management System (EHR) 3.6.4": [[0, 55]], "VULNERABILITY: SQL Injection": [[74, 87]]}, "info": {"source": "exploitdb", "exploit_id": "52265"}} {"text": "kk Star Ratings < 5.4.6 - Rating Tampering via Race Condition", "spans": {"SYSTEM: kk Star Ratings < 5.4.6": [[0, 23]], "VULNERABILITY: Rating Tampering via Race Condition": [[26, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51859"}} {"text": "KLiK Social Media Website 1.0 - 'Multiple' SQLi", "spans": {"SYSTEM: KLiK Social Media Website 1.0": [[0, 29]], "VULNERABILITY: SQLi": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50851"}} {"text": "Klog Server 2.4.1 - Command Injection (Authenticated)", "spans": {"SYSTEM: Klog Server 2.4.1": [[0, 17]], "VULNERABILITY: Command Injection": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49511"}} {"text": "Klog Server 2.4.1 - Command Injection (Unauthenticated)", "spans": {"SYSTEM: Klog Server 2.4.1": [[0, 17]], "VULNERABILITY: Command Injection": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49366"}} {"text": "Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit)", "spans": {"SYSTEM: Klog Server 2.4.1": [[0, 17]], "VULNERABILITY: Command Injection": [[36, 53]], "TOOL: Metasploit": [[55, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49474"}} {"text": "Kmaleon 1.1.0.205 - 'tipocomb' SQL Injection (Authenticated)", "spans": {"SYSTEM: Kmaleon 1.1.0.205": [[0, 17]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50499"}} {"text": "KodExplorer 4.49 - CSRF to Arbitrary File Upload", "spans": {"SYSTEM: KodExplorer 4.49": [[0, 16]], "VULNERABILITY: Arbitrary File Upload": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51388"}} {"text": "KodExplorer 4.52 - Open Redirect", "spans": {"SYSTEM: KodExplorer 4.52": [[0, 16]], "VULNERABILITY: Open Redirect": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "52245"}} {"text": "KodExplorer v4.51.03 - Pwned-Admin File-Inclusion - Remote Code Execution (RCE)", "spans": {"SYSTEM: KodExplorer v4.51.03 - Pwned-Admin File-Inclusion": [[0, 49]], "VULNERABILITY: Remote Code Execution (RCE)": [[52, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51419"}} {"text": "Koken CMS 0.22.24 - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: Koken CMS 0.22.24": [[0, 17]], "VULNERABILITY: Arbitrary File Upload": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48706"}} {"text": "Kuicms PHP EE 2.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Kuicms PHP EE 2.0": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48526"}} {"text": "Landa Driving School Management System 2.0.1 - Arbitrary File Upload", "spans": {"SYSTEM: Landa Driving School Management System 2.0.1": [[0, 44]], "VULNERABILITY: Arbitrary File Upload": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50681"}} {"text": "Laravel 8.4.2 debug mode - Remote code execution", "spans": {"SYSTEM: Laravel 8.4.2 debug mode": [[0, 24]], "VULNERABILITY: Remote code execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49424"}} {"text": "Laravel Administrator 4 - Unrestricted File Upload (Authenticated)", "spans": {"SYSTEM: Laravel Administrator 4": [[0, 23]], "VULNERABILITY: Unrestricted File Upload": [[26, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49112"}} {"text": "Laravel Framework 11 - Credential Leakage", "spans": {"SYSTEM: Laravel Framework 11": [[0, 20]], "VULNERABILITY: Credential Leakage": [[23, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52000"}} {"text": "Laravel Nova 3.7.0 - 'range' DoS", "spans": {"SYSTEM: Laravel Nova 3.7.0": [[0, 18]], "VULNERABILITY: DoS": [[29, 32]]}, "info": {"source": "exploitdb", "exploit_id": "49198"}} {"text": "Laravel Pulse 1.3.1 - Arbitrary Code Injection", "spans": {"SYSTEM: Laravel Pulse 1.3.1": [[0, 19]], "VULNERABILITY: Code Injection": [[32, 46]]}, "info": {"source": "exploitdb", "exploit_id": "52319"}} {"text": "Laundry Booking Management System 1.0 - 'Multiple' SQL Injection", "spans": {"SYSTEM: Laundry Booking Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50219"}} {"text": "Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Laundry Booking Management System 1.0": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[51, 84]]}, "info": {"source": "exploitdb", "exploit_id": "50220"}} {"text": "Laundry Booking Management System 1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Laundry Booking Management System 1.0": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50556"}} {"text": "Lavalite v9.0.0 - XSRF-TOKEN cookie File path traversal", "spans": {"SYSTEM: Lavalite v9.0.0": [[0, 15]], "VULNERABILITY: XSRF-TOKEN cookie File path traversal": [[18, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51050"}} {"text": "LayerBB 1.1.4 - 'search_query' SQL Injection", "spans": {"SYSTEM: LayerBB 1.1.4": [[0, 13]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49593"}} {"text": "LDAP Tool Box Self Service Password v1.5.2 - Account takeover", "spans": {"SYSTEM: LDAP Tool Box Self Service Password v1.5.2": [[0, 42]], "VULNERABILITY: Account takeover": [[46, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51275"}} {"text": "LeadPro CRM v1.0 - SQL Injection", "spans": {"SYSTEM: LeadPro CRM v1.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51471"}} {"text": "Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Leafpub 1.1.9": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52014"}} {"text": "LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection", "spans": {"SYSTEM: LearnPress WordPress LMS Plugin 4.2.7": [[0, 37]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52171"}} {"text": "LEPTON CMS 4.7.0 - 'URL' Persistent Cross-Site Scripting", "spans": {"SYSTEM: LEPTON CMS 4.7.0": [[0, 16]], "VULNERABILITY: Persistent Cross-Site Scripting": [[25, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49137"}} {"text": "LeptonCMS 4.5.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: LeptonCMS 4.5.0": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48250"}} {"text": "LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: LeptonCMS 7.0.0": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51949"}} {"text": "Library CMS Powerful Book Management System 2.2.0 - Session Fixation", "spans": {"SYSTEM: Library CMS Powerful Book Management System 2.2.0": [[0, 49]], "VULNERABILITY: Session Fixation": [[52, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48374"}} {"text": "Library Management System 1.0 - Blind Time-Based SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Library Management System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[49, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50300"}} {"text": "Library Management System 2.0 - Auth Bypass SQL Injection", "spans": {"SYSTEM: Library Management System 2.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49230"}} {"text": "Library Management System 3.0 - _Add Category_ Stored XSS", "spans": {"SYSTEM: Library Management System 3.0": [[0, 29]], "VULNERABILITY: XSS": [[54, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49315"}} {"text": "Library System 1.0 - 'category' SQL Injection", "spans": {"SYSTEM: Library System 1.0": [[0, 18]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49471"}} {"text": "Library System 1.0 - 'student_id' SQL injection (Authenticated)", "spans": {"SYSTEM: Library System 1.0": [[0, 18]], "VULNERABILITY: SQL injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50334"}} {"text": "Library System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Library System 1.0": [[0, 18]], "VULNERABILITY: Authentication Bypass": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49462"}} {"text": "Library System in PHP 1.0 - 'publisher name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Library System in PHP 1.0": [[0, 25]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[45, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50625"}} {"text": "LibreHealth 2.0.0 - Authenticated Remote Code Execution", "spans": {"SYSTEM: LibreHealth 2.0.0": [[0, 17]], "VULNERABILITY: Authenticated Remote Code Execution": [[20, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48702"}} {"text": "Life Insurance Management System 1.0 - 'client_id' SQL Injection", "spans": {"SYSTEM: Life Insurance Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49439"}} {"text": "Life Insurance Management System 1.0 - File Upload RCE (Authenticated)", "spans": {"SYSTEM: Life Insurance Management System 1.0": [[0, 36]], "VULNERABILITY: RCE": [[51, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49440"}} {"text": "Life Insurance Management System 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Life Insurance Management System 1.0": [[0, 36]], "VULNERABILITY: XSS": [[55, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49395"}} {"text": "Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit)", "spans": {"SYSTEM: Lightweight facebook-styled blog 1.3": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]], "TOOL: Metasploit": [[84, 94]]}, "info": {"source": "exploitdb", "exploit_id": "50064"}} {"text": "Lilac-Reloaded for Nagios 2.0.8 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Lilac-Reloaded for Nagios 2.0.8": [[0, 31]], "VULNERABILITY: Remote Code Execution (RCE)": [[34, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51374"}} {"text": "LimeSurvey 4.1.11 - 'File Manager' Path Traversal", "spans": {"SYSTEM: LimeSurvey 4.1.11": [[0, 17]], "VULNERABILITY: Path Traversal": [[35, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48297"}} {"text": "LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting", "spans": {"SYSTEM: LimeSurvey 4.1.11": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[39, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48523"}} {"text": "LimeSurvey 4.1.11 - 'Survey Groups' Persistent Cross-Site Scripting", "spans": {"SYSTEM: LimeSurvey 4.1.11": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48289"}} {"text": "LimeSurvey 4.3.10 - 'Survey Menu' Persistent Cross-Site Scripting", "spans": {"SYSTEM: LimeSurvey 4.3.10": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48762"}} {"text": "LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: LimeSurvey 5.2.4": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50573"}} {"text": "LimeSurvey Community 5.3.32 - Stored XSS", "spans": {"SYSTEM: LimeSurvey Community 5.3.32": [[0, 27]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51926"}} {"text": "Limo Booking Software v1.0 - CORS", "spans": {"SYSTEM: Limo Booking Software v1.0": [[0, 26]], "VULNERABILITY: CORS": [[29, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51744"}} {"text": "Litespeed Cache 6.5.0.1 - Authentication Bypass", "spans": {"SYSTEM: Litespeed Cache 6.5.0.1": [[0, 23]], "VULNERABILITY: Authentication Bypass": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52099"}} {"text": "Litespeed Cache WordPress Plugin 6.3.0.1 - Privilege Escalation", "spans": {"SYSTEM: Litespeed Cache WordPress Plugin 6.3.0.1": [[0, 40]], "VULNERABILITY: Privilege Escalation": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "52328"}} {"text": "LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated)", "spans": {"SYSTEM: LiteSpeed Web Server Enterprise 5.4.11": [[0, 38]], "VULNERABILITY: Command Injection": [[41, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49523"}} {"text": "LiveHelperChat 4.61 - Stored Cross Site Scripting (XSS) via Department Assignment Alias Nick Field", "spans": {"SYSTEM: LiveHelperChat 4.61": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52381"}} {"text": "LiveHelperChat 4.61 - Stored Cross Site Scripting (XSS) via Facebook Integration Page Name Field", "spans": {"SYSTEM: LiveHelperChat 4.61": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52378"}} {"text": "LiveHelperChat 4.61 - Stored Cross Site Scripting (XSS) via Operator Surname", "spans": {"SYSTEM: LiveHelperChat 4.61": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52377"}} {"text": "LiveHelperChat 4.61 - Stored Cross Site Scripting (XSS) via Personal Canned Messages", "spans": {"SYSTEM: LiveHelperChat 4.61": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52379"}} {"text": "LiveHelperChat 4.61 - Stored Cross Site Scripting (XSS) via Telegram Bot Username", "spans": {"SYSTEM: LiveHelperChat 4.61": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52376"}} {"text": "LiveHelperChat 4.61 - Stored Cross Site Scripting (XSS) via the Chat Transfer Function", "spans": {"SYSTEM: LiveHelperChat 4.61": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52380"}} {"text": "liveSite Version 2019.1 - Remote Code Execution", "spans": {"SYSTEM: liveSite Version 2019.1": [[0, 23]], "VULNERABILITY: Remote Code Execution": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51936"}} {"text": "LiveZilla Server 8.0.1.0 - 'Accept-Language' Reflected XSS", "spans": {"SYSTEM: LiveZilla Server 8.0.1.0": [[0, 24]], "VULNERABILITY: XSS": [[55, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49669"}} {"text": "Loaded Commerce 6.6 - Client-Side Template Injection(CSTI)", "spans": {"SYSTEM: Loaded Commerce 6.6": [[0, 19]], "VULNERABILITY: Client-Side Template Injection": [[22, 52]]}, "info": {"source": "exploitdb", "exploit_id": "52084"}} {"text": "Loan Management System 1.0 - Multiple Cross Site Scripting (Stored)", "spans": {"SYSTEM: Loan Management System 1.0": [[0, 26]], "VULNERABILITY: Cross Site Scripting": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48909"}} {"text": "Loan Management System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Loan Management System 1.0": [[0, 26]], "VULNERABILITY: Authentication Bypass": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50402"}} {"text": "Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Local Services Search Engine Management System (LSSMES) 1.0": [[0, 59]], "VULNERABILITY: Persistent Cross-Site Scripting": [[69, 100]]}, "info": {"source": "exploitdb", "exploit_id": "49609"}} {"text": "Local Services Search Engine Management System (LSSMES) 1.0 - Blind & Error based SQL injection (Authenticated)", "spans": {"SYSTEM: Local Services Search Engine Management System (LSSMES) 1.0": [[0, 59]], "VULNERABILITY: SQL injection": [[82, 95]]}, "info": {"source": "exploitdb", "exploit_id": "49610"}} {"text": "Lodging Reservation Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Lodging Reservation Management System 1.0": [[0, 41]], "VULNERABILITY: Authentication Bypass": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50372"}} {"text": "Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over", "spans": {"SYSTEM: Lost and Found Information System v1.0": [[0, 38]], "VULNERABILITY: IDOR": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51795"}} {"text": "Lost and Found Information System v1.0 - SQL Injection", "spans": {"SYSTEM: Lost and Found Information System v1.0": [[0, 38]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51570"}} {"text": "Lot Reservation Management System - Unauthenticated File Disclosure", "spans": {"SYSTEM: Lot Reservation Management System": [[0, 33]], "VULNERABILITY: Unauthenticated File Disclosure": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51861"}} {"text": "Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution", "spans": {"SYSTEM: Lot Reservation Management System": [[0, 33]], "VULNERABILITY: Remote Code Execution": [[68, 89]]}, "info": {"source": "exploitdb", "exploit_id": "51860"}} {"text": "Lot Reservation Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Lot Reservation Management System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48934"}} {"text": "Lot Reservation Management System 1.0 - Cross-Site Scripting (Stored)", "spans": {"SYSTEM: Lot Reservation Management System 1.0": [[0, 37]], "VULNERABILITY: Cross-Site Scripting": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48935"}} {"text": "Lotus Core CMS 1.0.1 - Local File Inclusion", "spans": {"SYSTEM: Lotus Core CMS 1.0.1": [[0, 20]], "VULNERABILITY: Local File Inclusion": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "47985"}} {"text": "m1k1o's Blog v.10 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: m1k1o's Blog v.10": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50943"}} {"text": "Macs Framework 1.14f CMS - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Macs Framework 1.14f CMS": [[0, 24]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48325"}} {"text": "Magento eCommerce CE v2.3.5-p2 - Blind SQLi", "spans": {"SYSTEM: Magento eCommerce CE v2.3.5-p2": [[0, 30]], "VULNERABILITY: SQLi": [[39, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50896"}} {"text": "Magento WooCommerce CardGate Payment Gateway 2.0.30 - Payment Process Bypass", "spans": {"SYSTEM: Magento WooCommerce CardGate Payment Gateway 2.0.30": [[0, 51]], "VULNERABILITY: Payment Process Bypass": [[54, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48135"}} {"text": "Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Magnolia CMS 6.2.19": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[22, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50976"}} {"text": "MagpieRSS 0.72 - 'url' Command Injection", "spans": {"SYSTEM: MagpieRSS 0.72": [[0, 14]], "VULNERABILITY: Command Injection": [[23, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49643"}} {"text": "Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Maian Support Helpdesk 4.3": [[0, 26]], "VULNERABILITY: Cross-Site Request Forgery": [[29, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48386"}} {"text": "Maian-Cart 3.8 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Maian-Cart 3.8": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50394"}} {"text": "Mantis Bug Tracker 2.24.3 - 'access' SQL Injection", "spans": {"SYSTEM: Mantis Bug Tracker 2.24.3": [[0, 25]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49340"}} {"text": "Mantis Bug Tracker 2.3.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Mantis Bug Tracker 2.3.0": [[0, 24]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48818"}} {"text": "Mara CMS 7.5 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: Mara CMS 7.5": [[0, 13]], "VULNERABILITY: Cross-Site Scripting": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48777"}} {"text": "Mara CMS 7.5 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Mara CMS 7.5": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48780"}} {"text": "Mars Stealer 8.3 - Admin Account Takeover", "spans": {"SYSTEM: Mars Stealer 8.3": [[0, 16]], "VULNERABILITY: Admin Account Takeover": [[19, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51392"}} {"text": "MedDream PACS Server 6.8.3.751 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: MedDream PACS Server 6.8.3.751": [[0, 30]], "VULNERABILITY: Remote Code Execution": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48853"}} {"text": "MedDream PACS Server 6.8.3.751 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: MedDream PACS Server 6.8.3.751": [[0, 30]], "VULNERABILITY: Remote Code Execution": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48868"}} {"text": "Media Library Assistant Wordpress Plugin - RCE and LFI", "spans": {"SYSTEM: Media Library Assistant Wordpress Plugin": [[0, 40]], "VULNERABILITY: RCE": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51737"}} {"text": "Medical Center Portal Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Medical Center Portal Management System 1.0": [[0, 43]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49274"}} {"text": "Medical Center Portal Management System 1.0 - 'login' SQL Injection", "spans": {"SYSTEM: Medical Center Portal Management System 1.0": [[0, 43]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49138"}} {"text": "Medical Center Portal Management System 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Medical Center Portal Management System 1.0": [[0, 43]], "VULNERABILITY: XSS": [[62, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49236"}} {"text": "Medicine Tracker System v1.0 - Sql Injection", "spans": {"SYSTEM: Medicine Tracker System v1.0": [[0, 28]], "VULNERABILITY: Sql Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51338"}} {"text": "Member Login Script 3.3 - Client-side desync", "spans": {"SYSTEM: Member Login Script 3.3": [[0, 23]], "VULNERABILITY: Client-side desync": [[26, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51710"}} {"text": "Men Salon Management System 1.0 - Multiple Vulnerabilities", "spans": {"SYSTEM: Men Salon Management System 1.0": [[0, 31]], "VULNERABILITY: Multiple Vulnerabilities": [[34, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50274"}} {"text": "Men Salon Management System 1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Men Salon Management System 1.0": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50169"}} {"text": "meterN v1.2.3 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: meterN v1.2.3": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50596"}} {"text": "Metform Elementor Contact Form Builder v3.1.2 - Unauthenticated Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Metform Elementor Contact Form Builder v3.1.2": [[0, 45]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[64, 97]]}, "info": {"source": "exploitdb", "exploit_id": "51204"}} {"text": "Microfinance Management System 1.0 - 'customer_number' SQLi", "spans": {"SYSTEM: Microfinance Management System 1.0": [[0, 34]], "VULNERABILITY: SQLi": [[55, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50891"}} {"text": "Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Microweber 1.2.11": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50768"}} {"text": "Microweber 2.0.15 - Stored XSS", "spans": {"SYSTEM: Microweber 2.0.15": [[0, 17]], "VULNERABILITY: XSS": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "52058"}} {"text": "Microweber CMS 1.1.20 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Microweber CMS 1.1.20": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49856"}} {"text": "Microweber CMS 1.2.10 - Local File Inclusion (Authenticated) (Metasploit)", "spans": {"SYSTEM: Microweber CMS 1.2.10": [[0, 21]], "VULNERABILITY: Local File Inclusion": [[24, 44]], "TOOL: Metasploit": [[62, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50786"}} {"text": "Microweber CMS 1.2.15 - Account Takeover", "spans": {"SYSTEM: Microweber CMS 1.2.15": [[0, 21]], "VULNERABILITY: Account Takeover": [[24, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50947"}} {"text": "MiladWorkShop VIP System 1.0 - 'lang' SQL Injection", "spans": {"SYSTEM: MiladWorkShop VIP System 1.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48218"}} {"text": "minewebcms 1.15.2 - Cross-site Scripting (XSS)", "spans": {"SYSTEM: minewebcms 1.15.2": [[0, 17]], "VULNERABILITY: XSS": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50853"}} {"text": "MiniCMS 1.1 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: MiniCMS 1.1": [[0, 11]], "VULNERABILITY: Cross Site Scripting": [[14, 34]]}, "info": {"source": "exploitdb", "exploit_id": "52175"}} {"text": "MiniCMS 1.10 - 'content box' Stored XSS", "spans": {"SYSTEM: MiniCMS 1.10": [[0, 12]], "VULNERABILITY: XSS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49193"}} {"text": "MISP 2.4.171 - Stored XSS", "spans": {"SYSTEM: MISP 2.4.171": [[0, 12]], "VULNERABILITY: XSS": [[22, 25]]}, "info": {"source": "exploitdb", "exploit_id": "51780"}} {"text": "Mobile Shop System v1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Mobile Shop System v1.0": [[0, 23]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48916"}} {"text": "MobileDetect 2.8.31 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: MobileDetect 2.8.31": [[0, 19]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52454"}} {"text": "MobileShop master v1.0 - SQL Injection Vuln.", "spans": {"SYSTEM: MobileShop master v1.0": [[0, 22]], "VULNERABILITY: SQL Injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51921"}} {"text": "MODX Revolution v2.8.3-pl - Authenticated Remote Code Execution", "spans": {"SYSTEM: MODX Revolution v2.8.3-pl": [[0, 25]], "VULNERABILITY: Authenticated Remote Code Execution": [[28, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51059"}} {"text": "Money Transfer Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Money Transfer Management System 1.0": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50501"}} {"text": "Monitoring System (Dashboard) 1.0 - 'uname' SQL Injection", "spans": {"SYSTEM: Monitoring System (Dashboard) 1.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49639"}} {"text": "Monitoring System (Dashboard) 1.0 - File Upload RCE (Authenticated)", "spans": {"SYSTEM: Monitoring System (Dashboard) 1.0": [[0, 33]], "VULNERABILITY: RCE": [[48, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49640"}} {"text": "Monitorr 1.7.6m - Authorization Bypass", "spans": {"SYSTEM: Monitorr 1.7.6m": [[0, 15]], "VULNERABILITY: Authorization Bypass": [[18, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48981"}} {"text": "Monitorr 1.7.6m - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Monitorr 1.7.6m": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48980"}} {"text": "MonoCMS Blog 1.0 - Arbitrary File Deletion (Authenticated)", "spans": {"SYSTEM: MonoCMS Blog 1.0": [[0, 16]], "VULNERABILITY: Arbitrary File Deletion": [[19, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48848"}} {"text": "Monstra 3.0.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Monstra 3.0.4": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51519"}} {"text": "Monstra CMS 3.0.4 - Authenticated Arbitrary File Upload", "spans": {"SYSTEM: Monstra CMS 3.0.4": [[0, 17]], "VULNERABILITY: Arbitrary File Upload": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48479"}} {"text": "Monstra CMS 3.0.4 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Monstra CMS 3.0.4": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49949"}} {"text": "Monstra CMS 3.0.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Monstra CMS 3.0.4": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52038"}} {"text": "Montiorr 1.7.6m - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Montiorr 1.7.6m": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49806"}} {"text": "mooDating 1.2 - Reflected Cross-site scripting (XSS)", "spans": {"SYSTEM: mooDating 1.2": [[0, 13]], "VULNERABILITY: XSS": [[48, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51628"}} {"text": "Moodle 3.10.1 - Authenticated Blind Time-Based SQL Injection - _sort_ parameter", "spans": {"SYSTEM: Moodle 3.10.1": [[0, 13]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51984"}} {"text": "Moodle 3.10.3 - 'label' Persistent Cross Site Scripting", "spans": {"SYSTEM: Moodle 3.10.3": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49714"}} {"text": "Moodle 3.10.3 - 'url' Persistent Cross Site Scripting", "spans": {"SYSTEM: Moodle 3.10.3": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49797"}} {"text": "Moodle 3.11.4 - SQL Injection", "spans": {"SYSTEM: Moodle 3.11.4": [[0, 13]], "VULNERABILITY: SQL Injection": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "50700"}} {"text": "Moodle 3.11.5 - SQLi (Authenticated)", "spans": {"SYSTEM: Moodle 3.11.5": [[0, 13]], "VULNERABILITY: SQLi": [[16, 20]]}, "info": {"source": "exploitdb", "exploit_id": "50825"}} {"text": "Moodle 3.6.1 - Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Moodle 3.6.1": [[0, 12]], "VULNERABILITY: Persistent Cross-Site Scripting": [[15, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49814"}} {"text": "Moodle 3.8 - Unrestricted File Upload", "spans": {"SYSTEM: Moodle 3.8": [[0, 10]], "VULNERABILITY: Unrestricted File Upload": [[13, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49114"}} {"text": "Moodle 3.9 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Moodle 3.9": [[0, 10]], "VULNERABILITY: Remote Code Execution (RCE)": [[13, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50180"}} {"text": "Moodle 4.3 - Insecure Direct Object Reference", "spans": {"SYSTEM: Moodle 4.3": [[0, 10]], "VULNERABILITY: Insecure Direct Object Reference": [[13, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51820"}} {"text": "Moodle LMS 4.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Moodle LMS 4.0": [[0, 14]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[17, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51115"}} {"text": "mooSocial 3.1.8 - Reflected XSS", "spans": {"SYSTEM: mooSocial 3.1.8": [[0, 15]], "VULNERABILITY: XSS": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51670"}} {"text": "MotoCMS Version 3.4.3 - SQL Injection", "spans": {"SYSTEM: MotoCMS Version 3.4.3": [[0, 21]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51504"}} {"text": "MOVEit Transfer 11.1.1 - 'token' Unauthenticated SQL Injection", "spans": {"SYSTEM: MOVEit Transfer 11.1.1": [[0, 22]], "VULNERABILITY: SQL Injection": [[49, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48316"}} {"text": "Movie Rating System 1.0 - Broken Access Control (Admin Account Creation) (Unauthenticated)", "spans": {"SYSTEM: Movie Rating System 1.0": [[0, 23]], "VULNERABILITY: Broken Access Control": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50621"}} {"text": "Movie Rating System 1.0 - SQLi to RCE (Unauthenticated)", "spans": {"SYSTEM: Movie Rating System 1.0": [[0, 23]], "VULNERABILITY: SQLi": [[26, 30]]}, "info": {"source": "exploitdb", "exploit_id": "50622"}} {"text": "moziloCMS 2.0 - Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: moziloCMS 2.0": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48781"}} {"text": "MoziloCMS 3.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: MoziloCMS 3.0": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "52096"}} {"text": "MPC Sharj 3.11.1 - Arbitrary File Download", "spans": {"SYSTEM: MPC Sharj 3.11.1": [[0, 16]], "VULNERABILITY: Arbitrary File Download": [[19, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48433"}} {"text": "mPDF 7.0 - Local File Inclusion", "spans": {"SYSTEM: mPDF 7.0": [[0, 8]], "VULNERABILITY: Local File Inclusion": [[11, 31]]}, "info": {"source": "exploitdb", "exploit_id": "50995"}} {"text": "Mult-e-Cart Ultimate 2.4 - 'id' SQL Injection", "spans": {"SYSTEM: Mult-e-Cart Ultimate 2.4": [[0, 24]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50489"}} {"text": "Multi Branch School Management System 3.5 - _Create Branch_ Stored XSS", "spans": {"SYSTEM: Multi Branch School Management System 3.5": [[0, 41]], "VULNERABILITY: XSS": [[67, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49316"}} {"text": "Multi Restaurant Table Reservation System 1.0 - 'table_id' Unauthenticated SQL Injection", "spans": {"SYSTEM: Multi Restaurant Table Reservation System 1.0": [[0, 45]], "VULNERABILITY: SQL Injection": [[75, 88]]}, "info": {"source": "exploitdb", "exploit_id": "48984"}} {"text": "Multi Restaurant Table Reservation System 1.0 - Multiple Persistent XSS", "spans": {"SYSTEM: Multi Restaurant Table Reservation System 1.0": [[0, 45]], "VULNERABILITY: XSS": [[68, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49135"}} {"text": "Multi-Vendor Online Groceries Management System 1.0 - 'id' Blind SQL Injection", "spans": {"SYSTEM: Multi-Vendor Online Groceries Management System 1.0": [[0, 51]], "VULNERABILITY: SQL Injection": [[65, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50739"}} {"text": "Multi-Vendor Online Groceries Management System 1.0 - Remote Code Execution", "spans": {"SYSTEM: Multi-Vendor Online Groceries Management System 1.0": [[0, 51]], "VULNERABILITY: Remote Code Execution": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "51394"}} {"text": "Music Gallery Site v1.0 - Broken Access Control", "spans": {"SYSTEM: Music Gallery Site v1.0": [[0, 23]], "VULNERABILITY: Broken Access Control": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51289"}} {"text": "Music Gallery Site v1.0 - SQL Injection on music_list.php", "spans": {"SYSTEM: Music Gallery Site v1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51288"}} {"text": "Music Gallery Site v1.0 - SQL Injection on page Master.php", "spans": {"SYSTEM: Music Gallery Site v1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51291"}} {"text": "Music Gallery Site v1.0 - SQL Injection on page view_music_details.php", "spans": {"SYSTEM: Music Gallery Site v1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51290"}} {"text": "MyBB 1.8.25 - Chained Remote Command Execution", "spans": {"SYSTEM: MyBB 1.8.25": [[0, 11]], "VULNERABILITY: Remote Command Execution": [[22, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49696"}} {"text": "MyBB 1.8.25 - Poll Vote Count SQL Injection", "spans": {"SYSTEM: MyBB 1.8.25": [[0, 11]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49699"}} {"text": "MyBB 1.8.29 - MyBB 1.8.29 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: MyBB 1.8.29 - MyBB 1.8.29": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50924"}} {"text": "MyBB 1.8.32 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: MyBB 1.8.32": [[0, 11]], "VULNERABILITY: Remote Code Execution (RCE)": [[14, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51213"}} {"text": "MyBB Delete Account Plugin 1.4 - Cross-Site Scripting", "spans": {"SYSTEM: MyBB Delete Account Plugin 1.4": [[0, 30]], "VULNERABILITY: Cross-Site Scripting": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49500"}} {"text": "myBB forums 1.8.26 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: myBB forums 1.8.26": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[21, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51136"}} {"text": "MyBB Hide Thread Content Plugin 1.0 - Information Disclosure", "spans": {"SYSTEM: MyBB Hide Thread Content Plugin 1.0": [[0, 35]], "VULNERABILITY: Information Disclosure": [[38, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49496"}} {"text": "MyBB OUGC Feedback Plugin 1.8.22 - Cross-Site Scripting", "spans": {"SYSTEM: MyBB OUGC Feedback Plugin 1.8.22": [[0, 32]], "VULNERABILITY: Cross-Site Scripting": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49635"}} {"text": "MyBB Thread Redirect Plugin 0.2.1 - Cross-Site Scripting", "spans": {"SYSTEM: MyBB Thread Redirect Plugin 0.2.1": [[0, 33]], "VULNERABILITY: Cross-Site Scripting": [[36, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49505"}} {"text": "MyBB Timeline Plugin 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: MyBB Timeline Plugin 1.0": [[0, 24]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49467"}} {"text": "MyBB Trending Widget Plugin 1.2 - Cross-Site Scripting", "spans": {"SYSTEM: MyBB Trending Widget Plugin 1.2": [[0, 31]], "VULNERABILITY: Cross-Site Scripting": [[34, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49504"}} {"text": "Nagios XI 5.6.12 - 'export-rrd.php' Remote Code Execution", "spans": {"SYSTEM: Nagios XI 5.6.12": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48640"}} {"text": "Nagios XI 5.7.3 - 'Contact Templates' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Nagios XI 5.7.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[38, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48893"}} {"text": "Nagios XI 5.7.3 - 'Manage Users' Authenticated SQL Injection", "spans": {"SYSTEM: Nagios XI 5.7.3": [[0, 15]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48894"}} {"text": "Nagios XI 5.7.3 - 'mibs.php' Remote Command Injection (Authenticated)", "spans": {"SYSTEM: Nagios XI 5.7.3": [[0, 15]], "VULNERABILITY: Command Injection": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48959"}} {"text": "Nagios XI 5.7.3 - 'SNMP Trap Interface' Authenticated SQL Injection", "spans": {"SYSTEM: Nagios XI 5.7.3": [[0, 15]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48895"}} {"text": "Nagios XI 5.7.5 - Multiple Persistent Cross-Site Scripting", "spans": {"SYSTEM: Nagios XI 5.7.5": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49449"}} {"text": "Nagios XI 5.7.X - Remote Code Execution RCE (Authenticated)", "spans": {"SYSTEM: Nagios XI 5.7.X": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49422"}} {"text": "NagVis 1.9.33 - Arbitrary File Read", "spans": {"SYSTEM: NagVis 1.9.33": [[0, 13]], "VULNERABILITY: Arbitrary File Read": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "52229"}} {"text": "NanoCMS v0.4 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: NanoCMS v0.4": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50997"}} {"text": "Navigate CMS 2.8.7 - ''sidx' SQL Injection (Authenticated)", "spans": {"SYSTEM: Navigate CMS 2.8.7": [[0, 18]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48545"}} {"text": "Navigate CMS 2.8.7 - Authenticated Directory Traversal", "spans": {"SYSTEM: Navigate CMS 2.8.7": [[0, 18]], "VULNERABILITY: Directory Traversal": [[35, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48550"}} {"text": "Navigate CMS 2.8.7 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Navigate CMS 2.8.7": [[0, 18]], "VULNERABILITY: Cross-Site Request Forgery": [[21, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48548"}} {"text": "Navigate CMS 2.9.4 - Server-Side Request Forgery (SSRF) (Authenticated)", "spans": {"SYSTEM: Navigate CMS 2.9.4": [[0, 18]], "VULNERABILITY: Server-Side Request Forgery (SSRF)": [[21, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50921"}} {"text": "Neontext Wordpress Plugin - Stored XSS", "spans": {"SYSTEM: Neontext Wordpress Plugin": [[0, 25]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51858"}} {"text": "Nettmp NNT 5.1 - SQLi Authentication Bypass", "spans": {"SYSTEM: Nettmp NNT 5.1": [[0, 14]], "VULNERABILITY: Authentication Bypass": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50627"}} {"text": "News Portal v4.0 - SQL Injection (Unauthorized)", "spans": {"SYSTEM: News Portal v4.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51587"}} {"text": "NEWS-BUZZ News Management System 1.0 - SQL Injection", "spans": {"SYSTEM: NEWS-BUZZ News Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "52174"}} {"text": "NEX-Forms WordPress plugin < 7.9.7 - Authenticated SQLi", "spans": {"SYSTEM: NEX-Forms WordPress plugin < 7.9.7": [[0, 34]], "VULNERABILITY: SQLi": [[51, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51042"}} {"text": "NotrinosERP 0.7 - Authenticated Blind SQL Injection", "spans": {"SYSTEM: NotrinosERP 0.7": [[0, 15]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51318"}} {"text": "NukeViet VMS 4.4.00 - Cross-Site Request Forgery (Change Admin Password)", "spans": {"SYSTEM: NukeViet VMS 4.4.00": [[0, 19]], "VULNERABILITY: Cross-Site Request Forgery": [[22, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48489"}} {"text": "Octeth Oempro 4.8 - 'CampaignID' SQL Injection", "spans": {"SYSTEM: Octeth Oempro 4.8": [[0, 17]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47967"}} {"text": "October CMS Build 465 - Arbitrary File Read Exploit (Authenticated)", "spans": {"SYSTEM: October CMS Build 465": [[0, 21]], "VULNERABILITY: Arbitrary File Read": [[24, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49045"}} {"text": "October CMS v3.4.4 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: October CMS v3.4.4": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[21, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51630"}} {"text": "Old Age Home Management System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Old Age Home Management System 1.0": [[0, 34]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50966"}} {"text": "Online Admission System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Online Admission System 1.0": [[0, 27]], "VULNERABILITY: Remote Code Execution (RCE)": [[30, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50623"}} {"text": "Online AgroCulture Farm Management System 1.0 - 'pid' SQL Injection", "spans": {"SYSTEM: Online AgroCulture Farm Management System 1.0": [[0, 45]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48440"}} {"text": "Online AgroCulture Farm Management System 1.0 - 'uname' SQL Injection", "spans": {"SYSTEM: Online AgroCulture Farm Management System 1.0": [[0, 45]], "VULNERABILITY: SQL Injection": [[56, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48444"}} {"text": "Online Appointment System V1.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Online Appointment System V1.0": [[0, 30]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51337"}} {"text": "Online Art gallery project 1.0 - Arbitrary File Upload (Unauthenticated)", "spans": {"SYSTEM: Online Art gallery project 1.0": [[0, 30]], "VULNERABILITY: Arbitrary File Upload": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51524"}} {"text": "Online Birth Certificate System 1.1 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Online Birth Certificate System 1.1": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50089"}} {"text": "Online Book Store 1.0 - 'bookisbn' SQL Injection", "spans": {"SYSTEM: Online Book Store 1.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "47922"}} {"text": "Online Book Store 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Online Book Store 1.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48775"}} {"text": "Online Book Store 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Online Book Store 1.0": [[0, 21]], "VULNERABILITY: Arbitrary File Upload": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "47928"}} {"text": "Online Book Store 1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Online Book Store 1.0": [[0, 21]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[24, 61]]}, "info": {"source": "exploitdb", "exploit_id": "47887"}} {"text": "Online Bus Ticket Reservation 1.0 - SQL Injection", "spans": {"SYSTEM: Online Bus Ticket Reservation 1.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49212"}} {"text": "Online Car Rental System 1.0 - Stored Cross Site Scripting", "spans": {"SYSTEM: Online Car Rental System 1.0": [[0, 28]], "VULNERABILITY: Stored Cross Site Scripting": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49546"}} {"text": "Online Catering Reservation System 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Online Catering Reservation System 1.0": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49603"}} {"text": "online Chatting System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: online Chatting System 1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48480"}} {"text": "Online Clinic Management System 2.2 - Multiple Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Online Clinic Management System 2.2": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[47, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51439"}} {"text": "Online Clothing Store 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Online Clothing Store 1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48429"}} {"text": "Online Clothing Store 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Online Clothing Store 1.0": [[0, 25]], "VULNERABILITY: Arbitrary File Upload": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48438"}} {"text": "Online Clothing Store 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Online Clothing Store 1.0": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48426"}} {"text": "Online Computer and Laptop Store 1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Online Computer and Laptop Store 1.0": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51358"}} {"text": "Online Course Registration 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Course Registration 1.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48559"}} {"text": "Online Course Registration 1.0 - Blind Boolean-Based SQL Injection (Authenticated)", "spans": {"SYSTEM: Online Course Registration 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50440"}} {"text": "Online Course Registration 1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Online Course Registration 1.0": [[0, 30]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[33, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48704"}} {"text": "Online Course Registration 2.0 - Authentication Bypass", "spans": {"SYSTEM: Online Course Registration 2.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48385"}} {"text": "Online Course Registration 2.0 - Remote Code Execution", "spans": {"SYSTEM: Online Course Registration 2.0": [[0, 30]], "VULNERABILITY: Remote Code Execution": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "47843"}} {"text": "Online Covid Vaccination Scheduler System 1.0 - 'username' time-based blind SQL Injection", "spans": {"SYSTEM: Online Covid Vaccination Scheduler System 1.0": [[0, 45]], "VULNERABILITY: SQL Injection": [[76, 89]]}, "info": {"source": "exploitdb", "exploit_id": "50109"}} {"text": "Online Covid Vaccination Scheduler System 1.0 - Arbitrary File Upload to Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Online Covid Vaccination Scheduler System 1.0": [[0, 45]], "VULNERABILITY: Remote Code Execution": [[73, 94]]}, "info": {"source": "exploitdb", "exploit_id": "50114"}} {"text": "Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated)", "spans": {"SYSTEM: Online Diagnostic Lab Management System 1.0": [[0, 43]], "VULNERABILITY: Account Takeover": [[46, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50660"}} {"text": "Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Diagnostic Lab Management System 1.0": [[0, 43]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50662"}} {"text": "Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Online Diagnostic Lab Management System 1.0": [[0, 43]], "VULNERABILITY: Stored Cross Site Scripting": [[46, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50661"}} {"text": "Online Diagnostic Lab Management System v1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Online Diagnostic Lab Management System v1.0": [[0, 44]], "VULNERABILITY: Remote Code Execution (RCE)": [[47, 74]]}, "info": {"source": "exploitdb", "exploit_id": "51045"}} {"text": "Online Discussion Forum Site 1.0 - Remote Code Execution", "spans": {"SYSTEM: Online Discussion Forum Site 1.0": [[0, 32]], "VULNERABILITY: Remote Code Execution": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48512"}} {"text": "Online Discussion Forum Site 1.0 - XSS in Messaging System", "spans": {"SYSTEM: Online Discussion Forum Site 1.0": [[0, 32]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48897"}} {"text": "Online DJ Booking Management System 1.0 - 'Multiple' Blind Cross-Site Scripting", "spans": {"SYSTEM: Online DJ Booking Management System 1.0": [[0, 39]], "VULNERABILITY: Cross-Site Scripting": [[59, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50386"}} {"text": "Online Doctor Appointment Booking System PHP and Mysql 1.0 - 'q' SQL Injection", "spans": {"SYSTEM: Online Doctor Appointment Booking System PHP and Mysql 1.0": [[0, 58]], "VULNERABILITY: SQL Injection": [[65, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49059"}} {"text": "Online Doctor Appointment System 1.0 - 'Multiple' Stored XSS", "spans": {"SYSTEM: Online Doctor Appointment System 1.0": [[0, 36]], "VULNERABILITY: XSS": [[57, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49396"}} {"text": "Online Documents Sharing Platform 1.0 - 'user' SQL Injection", "spans": {"SYSTEM: Online Documents Sharing Platform 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49447"}} {"text": "Online Employees Work From Home Attendance System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Online Employees Work From Home Attendance System 1.0": [[0, 53]], "VULNERABILITY: Authentication Bypass": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50400"}} {"text": "Online Enrollment Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Enrollment Management System 1.0": [[0, 39]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50399"}} {"text": "Online Enrollment Management System in PHP and PayPal 1.0 - 'U_NAME' Stored Cross-Site Scripting", "spans": {"SYSTEM: Online Enrollment Management System in PHP and PayPal 1.0": [[0, 57]], "VULNERABILITY: Stored Cross-Site Scripting": [[69, 96]]}, "info": {"source": "exploitdb", "exploit_id": "50557"}} {"text": "Online Event Booking and Reservation System 1.0 - 'reason' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Online Event Booking and Reservation System 1.0": [[0, 47]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[59, 92]]}, "info": {"source": "exploitdb", "exploit_id": "50450"}} {"text": "Online Exam System With Timer 1.0 - 'email' SQL injection Auth Bypass", "spans": {"SYSTEM: Online Exam System With Timer 1.0": [[0, 33]], "VULNERABILITY: SQL injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49576"}} {"text": "Online Examination System 1.0 - 'eid' SQL Injection", "spans": {"SYSTEM: Online Examination System 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48476"}} {"text": "Online Examination System 1.0 - 'name' Stored Cross Site Scripting", "spans": {"SYSTEM: Online Examination System 1.0": [[0, 29]], "VULNERABILITY: Stored Cross Site Scripting": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48969"}} {"text": "Online Examination System Project 1.0 - Cross-site request forgery (CSRF)", "spans": {"SYSTEM: Online Examination System Project 1.0": [[0, 37]], "VULNERABILITY: CSRF": [[68, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51511"}} {"text": "Online Eyewear Shop 1.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Eyewear Shop 1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51246"}} {"text": "Online Farm Management System 0.1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Online Farm Management System 0.1.0": [[0, 35]], "VULNERABILITY: Persistent Cross-Site Scripting": [[38, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48673"}} {"text": "Online Fire Reporting System OFRS - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Online Fire Reporting System OFRS": [[0, 33]], "VULNERABILITY: Authentication Bypass": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51989"}} {"text": "Online Food Ordering System 1.0 - Remote Code Execution", "spans": {"SYSTEM: Online Food Ordering System 1.0": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48827"}} {"text": "Online Food Ordering System 2.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Online Food Ordering System 2.0": [[0, 31]], "VULNERABILITY: Remote Code Execution (RCE)": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50305"}} {"text": "Online Grading System 1.0 - 'uname' SQL Injection", "spans": {"SYSTEM: Online Grading System 1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49493"}} {"text": "Online Health Care System 1.0 - Multiple Cross Site Scripting (Stored)", "spans": {"SYSTEM: Online Health Care System 1.0": [[0, 29]], "VULNERABILITY: Cross Site Scripting": [[41, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48945"}} {"text": "Online Healthcare management system 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Healthcare management system 1.0": [[0, 39]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48482"}} {"text": "Online Healthcare Patient Record Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Healthcare Patient Record Management System 1.0": [[0, 54]], "VULNERABILITY: Authentication Bypass": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48481"}} {"text": "Online Hotel Booking In PHP 1.0 - Blind SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Hotel Booking In PHP 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51938"}} {"text": "Online Hotel Reservation System 1.0 - 'description' Stored Cross-site Scripting", "spans": {"SYSTEM: Online Hotel Reservation System 1.0": [[0, 35]], "VULNERABILITY: Stored Cross-site Scripting": [[52, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49428"}} {"text": "Online Hotel Reservation System 1.0 - 'id' Time-based SQL Injection", "spans": {"SYSTEM: Online Hotel Reservation System 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49429"}} {"text": "Online Hotel Reservation System 1.0 - 'Multiple' Cross-site scripting (XSS)", "spans": {"SYSTEM: Online Hotel Reservation System 1.0": [[0, 35]], "VULNERABILITY: XSS": [[71, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50171"}} {"text": "Online Hotel Reservation System 1.0 - 'person' time-based SQL Injection", "spans": {"SYSTEM: Online Hotel Reservation System 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[58, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49431"}} {"text": "Online Hotel Reservation System 1.0 - Admin Authentication Bypass", "spans": {"SYSTEM: Online Hotel Reservation System 1.0": [[0, 35]], "VULNERABILITY: Authentication Bypass": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49420"}} {"text": "Online Hotel Reservation System 1.0 - Cross-site request forgery (CSRF)", "spans": {"SYSTEM: Online Hotel Reservation System 1.0": [[0, 35]], "VULNERABILITY: CSRF": [[66, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49430"}} {"text": "Online ID Generator 1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Online ID Generator 1.0": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51728"}} {"text": "Online Internship Management System 1.0 - 'email' SQL injection Auth Bypass", "spans": {"SYSTEM: Online Internship Management System 1.0": [[0, 39]], "VULNERABILITY: SQL injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49564"}} {"text": "Online Job Portal 1.0 - 'userid' SQL Injection", "spans": {"SYSTEM: Online Job Portal 1.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48976"}} {"text": "Online Job Portal 1.0 - 'user_email' SQL Injection", "spans": {"SYSTEM: Online Job Portal 1.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48007"}} {"text": "Online Job Portal 1.0 - Cross Site Request Forgery (Add User)", "spans": {"SYSTEM: Online Job Portal 1.0": [[0, 21]], "VULNERABILITY: Cross Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48016"}} {"text": "Online Job Portal 1.0 - Cross Site Scripting (Stored)", "spans": {"SYSTEM: Online Job Portal 1.0": [[0, 21]], "VULNERABILITY: Cross Site Scripting": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48898"}} {"text": "Online Job Portal 1.0 - Remote Code Execution", "spans": {"SYSTEM: Online Job Portal 1.0": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48012"}} {"text": "Online Learning Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Online Learning Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49326"}} {"text": "Online Learning Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Learning Management System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49324"}} {"text": "Online Learning Management System 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Online Learning Management System 1.0": [[0, 37]], "VULNERABILITY: XSS": [[56, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49325"}} {"text": "Online Learning Management System 1.0 - RCE (Authenticated)", "spans": {"SYSTEM: Online Learning Management System 1.0": [[0, 37]], "VULNERABILITY: RCE": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49365"}} {"text": "Online Learning System 2.0 - 'Multiple' SQLi Authentication Bypass", "spans": {"SYSTEM: Online Learning System 2.0": [[0, 26]], "VULNERABILITY: Authentication Bypass": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50410"}} {"text": "Online Learning System 2.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Online Learning System 2.0": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50526"}} {"text": "Online Leave Management System 1.0 - Arbitrary File Upload to Shell (Unauthenticated)", "spans": {"SYSTEM: Online Leave Management System 1.0": [[0, 34]], "VULNERABILITY: Arbitrary File Upload": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50228"}} {"text": "Online Library Management System 1.0 - 'Search' SQL Injection", "spans": {"SYSTEM: Online Library Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50053"}} {"text": "Online Library Management System 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Online Library Management System 1.0": [[0, 36]], "VULNERABILITY: Arbitrary File Upload": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48928"}} {"text": "Online Library Management System 1.0 - Arbitrary File Upload Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Online Library Management System 1.0": [[0, 36]], "VULNERABILITY: Remote Code Execution": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50054"}} {"text": "Online Magazine Management System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Online Magazine Management System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50561"}} {"text": "Online Marriage Registration System (OMRS) 1.0 - Remote Code Execution (2)", "spans": {"SYSTEM: Online Marriage Registration System (OMRS) 1.0": [[0, 46]], "VULNERABILITY: Remote Code Execution": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49260"}} {"text": "Online Marriage Registration System (OMRS) 1.0 - Remote code execution (3)", "spans": {"SYSTEM: Online Marriage Registration System (OMRS) 1.0": [[0, 46]], "VULNERABILITY: Remote code execution": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49557"}} {"text": "Online Marriage Registration System 1.0 - 'searchdata' SQL Injection", "spans": {"SYSTEM: Online Marriage Registration System 1.0": [[0, 39]], "VULNERABILITY: SQL Injection": [[55, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49307"}} {"text": "Online Marriage Registration System 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Online Marriage Registration System 1.0": [[0, 39]], "VULNERABILITY: Persistent Cross-Site Scripting": [[42, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48522"}} {"text": "Online Marriage Registration System 1.0 - Remote Code Execution (1)", "spans": {"SYSTEM: Online Marriage Registration System 1.0": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48552"}} {"text": "Online Matrimonial Project 1.0 - Authenticated Remote Code Execution", "spans": {"SYSTEM: Online Matrimonial Project 1.0": [[0, 30]], "VULNERABILITY: Authenticated Remote Code Execution": [[33, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49183"}} {"text": "Online Motorcycle (Bike) Rental System 1.0 - Blind Time-Based SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Motorcycle (Bike) Rental System 1.0": [[0, 42]], "VULNERABILITY: SQL Injection": [[62, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50429"}} {"text": "Online Movie Streaming 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Movie Streaming 1.0": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49356"}} {"text": "Online Movie Streaming 1.0 - Admin Authentication Bypass", "spans": {"SYSTEM: Online Movie Streaming 1.0": [[0, 26]], "VULNERABILITY: Authentication Bypass": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49421"}} {"text": "Online News Portal 1.0 - 'Multiple' Stored Cross-Site Scripting", "spans": {"SYSTEM: Online News Portal 1.0": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting": [[36, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49688"}} {"text": "Online News Portal 1.0 - 'name' SQL Injection", "spans": {"SYSTEM: Online News Portal 1.0": [[0, 22]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49687"}} {"text": "Online Nurse Hiring System 1.0 - Time-Based SQL Injection", "spans": {"SYSTEM: Online Nurse Hiring System 1.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51791"}} {"text": "Online Ordering System 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Online Ordering System 1.0": [[0, 26]], "VULNERABILITY: Arbitrary File Upload": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49615"}} {"text": "Online Ordering System 1.0 - Blind SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Ordering System 1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49618"}} {"text": "Online Piggery Management System v1.0 - unauthenticated file upload vulnerability", "spans": {"SYSTEM: Online Piggery Management System v1.0": [[0, 37]], "VULNERABILITY: unauthenticated file upload vulnerability": [[40, 81]]}, "info": {"source": "exploitdb", "exploit_id": "51598"}} {"text": "Online Pizza Ordering System v1.0 - Unauthenticated File Upload", "spans": {"SYSTEM: Online Pizza Ordering System v1.0": [[0, 33]], "VULNERABILITY: File Upload": [[52, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51431"}} {"text": "Online Polling System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Polling System 1.0": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48671"}} {"text": "Online Pre-owned/Used Car Showroom Management System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Online Pre-owned/Used Car Showroom Management System 1.0": [[0, 56]], "VULNERABILITY: Authentication Bypass": [[65, 86]]}, "info": {"source": "exploitdb", "exploit_id": "50560"}} {"text": "Online Project Time Management System 1.0 - Multiple Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Online Project Time Management System 1.0": [[0, 41]], "VULNERABILITY: Stored Cross Site Scripting": [[53, 80]]}, "info": {"source": "exploitdb", "exploit_id": "50683"}} {"text": "Online Project Time Management System 1.0 - SQLi (Authenticated)", "spans": {"SYSTEM: Online Project Time Management System 1.0": [[0, 41]], "VULNERABILITY: SQLi": [[44, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50682"}} {"text": "Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Railway Reservation System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50646"}} {"text": "Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)", "spans": {"SYSTEM: Online Railway Reservation System 1.0": [[0, 37]], "VULNERABILITY: Stored Cross Site Scripting": [[51, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50649"}} {"text": "Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated)", "spans": {"SYSTEM: Online Railway Reservation System 1.0": [[0, 37]], "VULNERABILITY: Admin Account Creation": [[40, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50648"}} {"text": "Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Online Railway Reservation System 1.0": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50647"}} {"text": "Online Resort Management System 1.0 - SQLi (Authenticated)", "spans": {"SYSTEM: Online Resort Management System 1.0": [[0, 35]], "VULNERABILITY: SQLi": [[38, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50666"}} {"text": "Online Reviewer System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Online Reviewer System 1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50319"}} {"text": "Online Scheduling System 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Online Scheduling System 1.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48419"}} {"text": "Online Scheduling System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Scheduling System 1.0": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48409"}} {"text": "Online Scheduling System 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Online Scheduling System 1.0": [[0, 28]], "VULNERABILITY: Persistent Cross-Site Scripting": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48403"}} {"text": "Online Security Guards Hiring System 1.0 - Reflected XSS", "spans": {"SYSTEM: Online Security Guards Hiring System 1.0": [[0, 40]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51494"}} {"text": "Online Shop Project 1.0 - 'p' SQL Injection", "spans": {"SYSTEM: Online Shop Project 1.0": [[0, 23]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48819"}} {"text": "Online Shopping Alphaware 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Online Shopping Alphaware 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48771"}} {"text": "Online Shopping Alphaware 1.0 - Authentication Bypass", "spans": {"SYSTEM: Online Shopping Alphaware 1.0": [[0, 29]], "VULNERABILITY: Authentication Bypass": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48725"}} {"text": "Online Shopping Alphaware 1.0 - Error Based SQL injection", "spans": {"SYSTEM: Online Shopping Alphaware 1.0": [[0, 29]], "VULNERABILITY: SQL injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49131"}} {"text": "Online Shopping Cart System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Online Shopping Cart System 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49423"}} {"text": "Online Shopping Portal 3.1 - 'email' SQL Injection", "spans": {"SYSTEM: Online Shopping Portal 3.1": [[0, 26]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48647"}} {"text": "Online Shopping Portal 3.1 - Authentication Bypass", "spans": {"SYSTEM: Online Shopping Portal 3.1": [[0, 26]], "VULNERABILITY: Authentication Bypass": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48631"}} {"text": "Online Shopping Portal 3.1 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Online Shopping Portal 3.1": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50029"}} {"text": "Online Shopping System Advanced - Sql Injection", "spans": {"SYSTEM: Online Shopping System Advanced": [[0, 31]], "VULNERABILITY: Sql Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51811"}} {"text": "Online shopping system advanced 1.0 - 'p' SQL Injection", "spans": {"SYSTEM: Online shopping system advanced 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48383"}} {"text": "Online shopping system advanced 1.0 - Multiple Vulnerabilities", "spans": {"SYSTEM: Online shopping system advanced 1.0": [[0, 35]], "VULNERABILITY: Multiple Vulnerabilities": [[38, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51103"}} {"text": "Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)", "spans": {"SYSTEM: Online Student Enrollment System 1.0": [[0, 36]], "VULNERABILITY: Cross-Site Request Forgery": [[39, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48616"}} {"text": "Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload", "spans": {"SYSTEM: Online Student Enrollment System 1.0": [[0, 36]], "VULNERABILITY: Arbitrary File Upload": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48610"}} {"text": "Online Student's Management System 1.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Online Student's Management System 1.0": [[0, 38]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48896"}} {"text": "Online Students Management System 1.0 - 'username' SQL Injections", "spans": {"SYSTEM: Online Students Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48870"}} {"text": "Online Thesis Archiving System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Online Thesis Archiving System 1.0": [[0, 34]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50597"}} {"text": "Online Thesis Archiving System v1.0 - Multiple-SQLi", "spans": {"SYSTEM: Online Thesis Archiving System v1.0": [[0, 35]], "VULNERABILITY: SQLi": [[47, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51521"}} {"text": "Online Tours & Travels Management System 1.0 - _id_ SQL Injection", "spans": {"SYSTEM: Online Tours & Travels Management System 1.0": [[0, 44]], "VULNERABILITY: SQL Injection": [[52, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49277"}} {"text": "Online Traffic Offense Management System 1.0 - 'id' SQL Injection (Authenticated)", "spans": {"SYSTEM: Online Traffic Offense Management System 1.0": [[0, 44]], "VULNERABILITY: SQL Injection": [[52, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50218"}} {"text": "Online Traffic Offense Management System 1.0 - Multiple RCE (Unauthenticated)", "spans": {"SYSTEM: Online Traffic Offense Management System 1.0": [[0, 44]], "VULNERABILITY: RCE": [[56, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50389"}} {"text": "Online Traffic Offense Management System 1.0 - Multiple SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Online Traffic Offense Management System 1.0": [[0, 44]], "VULNERABILITY: SQL Injection": [[56, 69]]}, "info": {"source": "exploitdb", "exploit_id": "50387"}} {"text": "Online Traffic Offense Management System 1.0 - Multiple XSS (Unauthenticated)", "spans": {"SYSTEM: Online Traffic Offense Management System 1.0": [[0, 44]], "VULNERABILITY: XSS": [[56, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50388"}} {"text": "Online Traffic Offense Management System 1.0 - Privilage escalation (Unauthenticated)", "spans": {"SYSTEM: Online Traffic Offense Management System 1.0": [[0, 44]], "VULNERABILITY: Privilage escalation": [[47, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50392"}} {"text": "Online Traffic Offense Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Online Traffic Offense Management System 1.0": [[0, 44]], "VULNERABILITY: Remote Code Execution (RCE)": [[47, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50221"}} {"text": "Online Veterinary Appointment System 1.0 - 'Multiple' SQL Injection", "spans": {"SYSTEM: Online Veterinary Appointment System 1.0": [[0, 40]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50644"}} {"text": "Online Voting System 1.0 - Authentication Bypass (SQLi)", "spans": {"SYSTEM: Online Voting System 1.0": [[0, 24]], "VULNERABILITY: Authentication Bypass": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50075"}} {"text": "Online Voting System 1.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Online Voting System 1.0": [[0, 24]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50076"}} {"text": "Online Voting System 1.0 - SQLi (Authentication Bypass) + Remote Code Execution (RCE)", "spans": {"SYSTEM: Online Voting System 1.0": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[58, 85]]}, "info": {"source": "exploitdb", "exploit_id": "50088"}} {"text": "Online-Exam-System 2015 - 'feedback' SQL Injection", "spans": {"SYSTEM: Online-Exam-System 2015": [[0, 23]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48560"}} {"text": "Online-Exam-System 2015 - 'fid' SQL Injection", "spans": {"SYSTEM: Online-Exam-System 2015": [[0, 23]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48529"}} {"text": "Online-Pizza-Ordering -1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Online-Pizza-Ordering -1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution (RCE)": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51344"}} {"text": "Open Source Medicine Ordering System v1.0 - SQLi", "spans": {"SYSTEM: Open Source Medicine Ordering System v1.0": [[0, 41]], "VULNERABILITY: SQLi": [[44, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51974"}} {"text": "Open Web Analytics 1.7.3 - Remote Code Execution", "spans": {"SYSTEM: Open Web Analytics 1.7.3": [[0, 24]], "VULNERABILITY: Remote Code Execution": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51026"}} {"text": "Open-AudIT 3.3.0 - Reflective Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: Open-AudIT 3.3.0": [[0, 16]], "VULNERABILITY: Cross-Site Scripting": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48516"}} {"text": "Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Open-AudIT Community 4.2.0": [[0, 26]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[29, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50651"}} {"text": "Open-AudIT Professional 3.3.1 - Remote Code Execution", "spans": {"SYSTEM: Open-AudIT Professional 3.3.1": [[0, 29]], "VULNERABILITY: Remote Code Execution": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48393"}} {"text": "OpenBMCS 2.4 - Create Admin / Remote Privilege Escalation", "spans": {"SYSTEM: OpenBMCS 2.4": [[0, 12]], "VULNERABILITY: Privilege Escalation": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50669"}} {"text": "OpenBMCS 2.4 - Cross Site Request Forgery (CSRF)", "spans": {"SYSTEM: OpenBMCS 2.4": [[0, 12]], "VULNERABILITY: CSRF": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50667"}} {"text": "OpenBMCS 2.4 - Information Disclosure", "spans": {"SYSTEM: OpenBMCS 2.4": [[0, 12]], "VULNERABILITY: Information Disclosure": [[15, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50671"}} {"text": "OpenBMCS 2.4 - Server Side Request Forgery (SSRF) (Unauthenticated)", "spans": {"SYSTEM: OpenBMCS 2.4": [[0, 12]], "VULNERABILITY: Server Side Request Forgery": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50670"}} {"text": "OpenBMCS 2.4 - SQLi (Authenticated)", "spans": {"SYSTEM: OpenBMCS 2.4": [[0, 12]], "VULNERABILITY: SQLi": [[15, 19]]}, "info": {"source": "exploitdb", "exploit_id": "50668"}} {"text": "Opencart 3 Extension TMD Vendor System - Blind SQL Injection", "spans": {"SYSTEM: Opencart 3 Extension TMD Vendor System": [[0, 38]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50493"}} {"text": "OpenCart 3.0.3.2 - Stored Cross Site Scripting (Authenticated)", "spans": {"SYSTEM: OpenCart 3.0.3.2": [[0, 16]], "VULNERABILITY: Stored Cross Site Scripting": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48539"}} {"text": "OpenCart 3.0.3.6 - 'Profile Image' Stored Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: OpenCart 3.0.3.6": [[0, 16]], "VULNERABILITY: Stored Cross-Site Scripting": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49098"}} {"text": "OpenCart 3.0.3.6 - 'subject' Stored Cross-Site Scripting", "spans": {"SYSTEM: OpenCart 3.0.3.6": [[0, 16]], "VULNERABILITY: Stored Cross-Site Scripting": [[29, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49099"}} {"text": "OpenCart 3.0.3.6 - Cross Site Request Forgery", "spans": {"SYSTEM: OpenCart 3.0.3.6": [[0, 16]], "VULNERABILITY: Cross Site Request Forgery": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49228"}} {"text": "OpenCart 3.0.3.7 - 'Change Password' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: OpenCart 3.0.3.7": [[0, 16]], "VULNERABILITY: CSRF": [[65, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49970"}} {"text": "opencart 3.0.3.8 - Sessjion Injection", "spans": {"SYSTEM: opencart 3.0.3.8": [[0, 16]], "VULNERABILITY: Sessjion Injection": [[19, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50555"}} {"text": "OpenCart 3.0.36 - ATO via Cross Site Request Forgery", "spans": {"SYSTEM: OpenCart 3.0.36": [[0, 15]], "VULNERABILITY: ATO via Cross Site Request Forgery": [[18, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49407"}} {"text": "OpenCart Core 4.0.2.3 - 'search' SQLi", "spans": {"SYSTEM: OpenCart Core 4.0.2.3": [[0, 21]], "VULNERABILITY: SQLi": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51940"}} {"text": "OpenCart Theme Journal 3.1.0 - Sensitive Data Exposure", "spans": {"SYSTEM: OpenCart Theme Journal 3.1.0": [[0, 28]], "VULNERABILITY: Sensitive Data Exposure": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49044"}} {"text": "OpenCart v3.x Newsletter Module - Blind SQLi", "spans": {"SYSTEM: OpenCart v3.x Newsletter Module": [[0, 31]], "VULNERABILITY: SQLi": [[40, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50942"}} {"text": "OpenCATS 0.9.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: OpenCATS 0.9.4": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50585"}} {"text": "OpenCats 0.9.4-2 - 'docx ' XML External Entity Injection (XXE)", "spans": {"SYSTEM: OpenCats 0.9.4-2": [[0, 16]], "VULNERABILITY: XML External Entity Injection": [[27, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50316"}} {"text": "OpenClinic GA 5.247.01 - Information Disclosure", "spans": {"SYSTEM: OpenClinic GA 5.247.01": [[0, 22]], "VULNERABILITY: Information Disclosure": [[25, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51994"}} {"text": "OpenClinic GA 5.247.01 - Path Traversal (Authenticated)", "spans": {"SYSTEM: OpenClinic GA 5.247.01": [[0, 22]], "VULNERABILITY: Path Traversal": [[25, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51995"}} {"text": "OpenCMS 17.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: OpenCMS 17.0": [[0, 12]], "VULNERABILITY: Stored Cross Site Scripting": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52209"}} {"text": "OpenEMR 4.1.0 - 'u' SQL Injection", "spans": {"SYSTEM: OpenEMR 4.1.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "49742"}} {"text": "OpenEMR 5.0.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: OpenEMR 5.0.0": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49983"}} {"text": "OpenEMR 5.0.1 - 'controller' Remote Code Execution", "spans": {"SYSTEM: OpenEMR 5.0.1": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48623"}} {"text": "OpenEMR 5.0.1 - Remote Code Execution (1)", "spans": {"SYSTEM: OpenEMR 5.0.1": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48515"}} {"text": "OpenEMR 5.0.1 - Remote Code Execution (Authenticated) (2)", "spans": {"SYSTEM: OpenEMR 5.0.1": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49486"}} {"text": "OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated)", "spans": {"SYSTEM: OpenEMR 5.0.1.3": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49998"}} {"text": "OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated) (2)", "spans": {"SYSTEM: OpenEMR 5.0.1.3": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50122"}} {"text": "OpenEMR 5.0.1.3 - Authentication Bypass", "spans": {"SYSTEM: OpenEMR 5.0.1.3": [[0, 15]], "VULNERABILITY: Authentication Bypass": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50017"}} {"text": "OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated)", "spans": {"SYSTEM: OpenEMR 5.0.1.7": [[0, 15]], "VULNERABILITY: Path Traversal": [[29, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50037"}} {"text": "OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2)", "spans": {"SYSTEM: OpenEMR 5.0.1.7": [[0, 15]], "VULNERABILITY: Path Traversal": [[29, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50087"}} {"text": "OpenEMR 5.0.2.1 - Remote Code Execution", "spans": {"SYSTEM: OpenEMR 5.0.2.1": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49784"}} {"text": "OpenEMR 6.0.0 - 'noteid' Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: OpenEMR 6.0.0": [[0, 13]], "VULNERABILITY: Insecure Direct Object Reference": [[25, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50260"}} {"text": "OpenEMR v7.0.1 - Authentication credentials brute force", "spans": {"SYSTEM: OpenEMR v7.0.1": [[0, 14]], "VULNERABILITY: Authentication credentials brute force": [[17, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51413"}} {"text": "OpenRepeater 2.1 - OS Command Injection", "spans": {"SYSTEM: OpenRepeater 2.1": [[0, 16]], "VULNERABILITY: Command Injection": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52452"}} {"text": "OpenSIS 8.0 'modname' - Directory Traversal", "spans": {"SYSTEM: OpenSIS 8.0 'modname'": [[0, 21]], "VULNERABILITY: Directory Traversal": [[24, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50259"}} {"text": "OpenSIS 8.0 - 'cp_id_miss_attn' Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: OpenSIS 8.0": [[0, 11]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[32, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50352"}} {"text": "openSIS 9.1 - SQLi (Authenticated)", "spans": {"SYSTEM: openSIS 9.1": [[0, 11]], "VULNERABILITY: SQLi": [[14, 18]]}, "info": {"source": "exploitdb", "exploit_id": "52080"}} {"text": "OpenSIS Community 8.0 - 'cp_id_miss_attn' SQL Injection", "spans": {"SYSTEM: OpenSIS Community 8.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50249"}} {"text": "openSIS Community Edition 8.0 - SQL Injection", "spans": {"SYSTEM: openSIS Community Edition 8.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52447"}} {"text": "openSIS Student Information System 8.0 - 'multiple' SQL Injection", "spans": {"SYSTEM: openSIS Student Information System 8.0": [[0, 38]], "VULNERABILITY: SQL Injection": [[52, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50637"}} {"text": "OpenZ ERP 3.6.60 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: OpenZ ERP 3.6.60": [[0, 16]], "VULNERABILITY: Persistent Cross-Site Scripting": [[19, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48450"}} {"text": "Oriol Espinal CMS 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Oriol Espinal CMS 1.0": [[0, 21]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48546"}} {"text": "osCommerce 2.3.4.1 - 'title' Persistent Cross-Site Scripting", "spans": {"SYSTEM: osCommerce 2.3.4.1": [[0, 18]], "VULNERABILITY: Persistent Cross-Site Scripting": [[29, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49103"}} {"text": "osCommerce 2.3.4.1 - Remote Code Execution (2)", "spans": {"SYSTEM: osCommerce 2.3.4.1": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50128"}} {"text": "osTicket 1.14.1 - 'Saved Search' Persistent Cross-Site Scripting", "spans": {"SYSTEM: osTicket 1.14.1": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48525"}} {"text": "osTicket 1.14.1 - 'Ticket Queue' Persistent Cross-Site Scripting", "spans": {"SYSTEM: osTicket 1.14.1": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48524"}} {"text": "osTicket 1.14.1 - Persistent Authenticated Cross-Site Scripting", "spans": {"SYSTEM: osTicket 1.14.1": [[0, 15]], "VULNERABILITY: Cross-Site Scripting": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48413"}} {"text": "osTicket 1.14.2 - SSRF", "spans": {"SYSTEM: osTicket 1.14.2": [[0, 15]], "VULNERABILITY: SSRF": [[18, 22]]}, "info": {"source": "exploitdb", "exploit_id": "49441"}} {"text": "Ovidentia 6 - 'id' SQL injection (Authenticated)", "spans": {"SYSTEM: Ovidentia 6": [[0, 11]], "VULNERABILITY: SQL injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "49707"}} {"text": "OVOO Movie Portal CMS v3.3.3 - SQL Injection", "spans": {"SYSTEM: OVOO Movie Portal CMS v3.3.3": [[0, 28]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51691"}} {"text": "OXID eShop 6.3.4 - 'sorting' SQL Injection", "spans": {"SYSTEM: OXID eShop 6.3.4": [[0, 16]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48527"}} {"text": "PackWeb Formap E-learning 1.0 - 'NumCours' SQL Injection", "spans": {"SYSTEM: PackWeb Formap E-learning 1.0": [[0, 29]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48024"}} {"text": "Paid Memberships Pro v2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection", "spans": {"SYSTEM: Paid Memberships Pro v2.9.8 (WordPress Plugin)": [[0, 47]], "VULNERABILITY: SQL Injection": [[66, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51235"}} {"text": "Pandora 7.0NG - Remote Code Execution", "spans": {"SYSTEM: Pandora 7.0NG": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "47898"}} {"text": "Pandora FMS 7.0 NG 749 - 'CG Items' SQL Injection (Authenticated)", "spans": {"SYSTEM: Pandora FMS 7.0 NG 749": [[0, 22]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49046"}} {"text": "Pandora FMS 7.0 NG 749 - Multiple Persistent Cross-Site Scripting Vulnerabilities", "spans": {"SYSTEM: Pandora FMS 7.0 NG 749": [[0, 22]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49139"}} {"text": "Pandora FMS 7.0 NG 750 - 'Network Scan' SQL Injection (Authenticated)", "spans": {"SYSTEM: Pandora FMS 7.0 NG 750": [[0, 22]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49312"}} {"text": "Pandora FMS 7.0NG - 'net_tools.php' Remote Code Execution", "spans": {"SYSTEM: Pandora FMS 7.0NG": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48280"}} {"text": "Pandora FMS v7.0NG.742 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Pandora FMS v7.0NG.742": [[0, 22]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50961"}} {"text": "PANDORAFMS 7.0 - Authenticated Remote Code Execution", "spans": {"SYSTEM: PANDORAFMS 7.0": [[0, 14]], "VULNERABILITY: Authenticated Remote Code Execution": [[17, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48064"}} {"text": "PandoraFMS 7.0 NG 746 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: PandoraFMS 7.0 NG 746": [[0, 21]], "VULNERABILITY: Persistent Cross-Site Scripting": [[24, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48707"}} {"text": "PandoraFMS 7.0NG.772 - SQL Injection", "spans": {"SYSTEM: PandoraFMS 7.0NG.772": [[0, 20]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52157"}} {"text": "PandoraFMS NG747 7.0 - 'filename' Persistent Cross-Site Scripting", "spans": {"SYSTEM: PandoraFMS NG747 7.0": [[0, 20]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48700"}} {"text": "Park Ticketing Management System 1.0 - 'viewid' SQL Injection", "spans": {"SYSTEM: Park Ticketing Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[49, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48662"}} {"text": "Park Ticketing Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Park Ticketing Management System 1.0": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48663"}} {"text": "Park Ticketing Management System 1.0 - 'viewid' SQL Injection", "spans": {"SYSTEM: Park Ticketing Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49503"}} {"text": "part-db 0.5.11 - Remote Code Execution (RCE)", "spans": {"SYSTEM: part-db 0.5.11": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50800"}} {"text": "Patient Appointment Scheduler System 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Patient Appointment Scheduler System 1.0": [[0, 40]], "VULNERABILITY: Persistent Cross-Site Scripting": [[43, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50265"}} {"text": "Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload", "spans": {"SYSTEM: Patient Appointment Scheduler System 1.0": [[0, 40]], "VULNERABILITY: File Upload": [[59, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50264"}} {"text": "PaulPrinting CMS - (Search Delivery) Cross Site Scripting", "spans": {"SYSTEM: PaulPrinting CMS": [[0, 16]], "VULNERABILITY: Cross Site Scripting": [[37, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51614"}} {"text": "PaulPrinting CMS - Multiple Cross Site Web Vulnerabilities", "spans": {"SYSTEM: PaulPrinting CMS": [[0, 16]], "VULNERABILITY: Multiple Cross Site Web Vulnerabilities": [[19, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51618"}} {"text": "Payment Terminal 3.1 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Payment Terminal 3.1": [[0, 20]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50495"}} {"text": "PDW File Browser 1.3 - 'new_filename' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PDW File Browser 1.3": [[0, 20]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[38, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48947"}} {"text": "PDW File Browser 1.3 - Remote Code Execution", "spans": {"SYSTEM: PDW File Browser 1.3": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48987"}} {"text": "PEEL Shopping 9.3.0 - 'address' Stored Cross-Site Scripting", "spans": {"SYSTEM: PEEL Shopping 9.3.0": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49553"}} {"text": "PEEL Shopping 9.3.0 - 'Comments' Persistent Cross-Site Scripting", "spans": {"SYSTEM: PEEL Shopping 9.3.0": [[0, 19]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49574"}} {"text": "PEEL Shopping 9.3.0 - 'id' Time-based SQL Injection", "spans": {"SYSTEM: PEEL Shopping 9.3.0": [[0, 19]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50142"}} {"text": "Perch v3.2 - Persistent Cross Site Scripting (XSS)", "spans": {"SYSTEM: Perch v3.2": [[0, 10]], "VULNERABILITY: Cross Site Scripting": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51627"}} {"text": "Perch v3.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Perch v3.2": [[0, 10]], "VULNERABILITY: Remote Code Execution (RCE)": [[13, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51620"}} {"text": "Perch v3.2 - Stored XSS", "spans": {"SYSTEM: Perch v3.2": [[0, 10]], "VULNERABILITY: XSS": [[20, 23]]}, "info": {"source": "exploitdb", "exploit_id": "51621"}} {"text": "Persian VIP Download Script 1.0 - 'active' SQL Injection", "spans": {"SYSTEM: Persian VIP Download Script 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48190"}} {"text": "Pet Shop Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Pet Shop Management System 1.0": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50353"}} {"text": "Petrol Pump Management Software v1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Petrol Pump Management Software v1.0": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51943"}} {"text": "pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE)", "spans": {"SYSTEM: pfBlockerNG 2.1.4_26": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51032"}} {"text": "pfSense 2.4.4-p3 - Cross-Site Request Forgery", "spans": {"SYSTEM: pfSense 2.4.4-p3": [[0, 16]], "VULNERABILITY: Cross-Site Request Forgery": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48714"}} {"text": "pfSense v2.7.0 - OS Command Injection", "spans": {"SYSTEM: pfSense v2.7.0": [[0, 14]], "VULNERABILITY: Command Injection": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51608"}} {"text": "Pharmacy Medical Store and Sale Point 1.0 - 'catid' SQL Injection", "spans": {"SYSTEM: Pharmacy Medical Store and Sale Point 1.0": [[0, 41]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48752"}} {"text": "Pharmacy Point of Sale System 1.0 - 'Add New User' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Pharmacy Point of Sale System 1.0": [[0, 33]], "VULNERABILITY: CSRF": [[79, 83]]}, "info": {"source": "exploitdb", "exploit_id": "50409"}} {"text": "Pharmacy Point of Sale System 1.0 - 'Multiple' SQL Injection (SQLi)", "spans": {"SYSTEM: Pharmacy Point of Sale System 1.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50357"}} {"text": "Pharmacy Point of Sale System 1.0 - SQLi Authentication BYpass", "spans": {"SYSTEM: Pharmacy Point of Sale System 1.0": [[0, 33]], "VULNERABILITY: SQLi": [[36, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50329"}} {"text": "Pharmacy Store Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Pharmacy Store Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49149"}} {"text": "Pharmacy/Medical Store & Sale Point 1.0 - 'email' SQL Injection", "spans": {"SYSTEM: Pharmacy/Medical Store & Sale Point 1.0": [[0, 39]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49132"}} {"text": "Phone Shop Sales Managements System 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Phone Shop Sales Managements System 1.0": [[0, 39]], "VULNERABILITY: Arbitrary File Upload": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50106"}} {"text": "Phone Shop Sales Managements System 1.0 - Authentication Bypass (SQLi)", "spans": {"SYSTEM: Phone Shop Sales Managements System 1.0": [[0, 39]], "VULNERABILITY: Authentication Bypass": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50105"}} {"text": "Phone Shop Sales Managements System 1.0 - Insecure Direct Object Reference (IDOR)", "spans": {"SYSTEM: Phone Shop Sales Managements System 1.0": [[0, 39]], "VULNERABILITY: Insecure Direct Object Reference": [[42, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50050"}} {"text": "Photo Share Website 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Photo Share Website 1.0": [[0, 23]], "VULNERABILITY: Persistent Cross-Site Scripting": [[26, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48854"}} {"text": "PhotoShow 3.0 - Remote Code Execution", "spans": {"SYSTEM: PhotoShow 3.0": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51236"}} {"text": "PHP 7.3.15-3 - 'PHP_SESSION_UPLOAD_PROGRESS' Session Data Injection", "spans": {"SYSTEM: PHP 7.3.15-3": [[0, 12]], "VULNERABILITY: Session Data Injection": [[45, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50156"}} {"text": "PHP 7.4 FFI - 'disable_functions' Bypass", "spans": {"SYSTEM: PHP 7.4 FFI": [[0, 11]], "VULNERABILITY: Bypass": [[34, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48655"}} {"text": "PHP 8.1.0-dev - 'User-Agentt' Remote Code Execution", "spans": {"SYSTEM: PHP 8.1.0-dev": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49933"}} {"text": "PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows)", "spans": {"SYSTEM: PHP < 8.3.8": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "52047"}} {"text": "PHP CGI Module 8.3.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: PHP CGI Module 8.3.4": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52331"}} {"text": "PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF)", "spans": {"SYSTEM: PHP Laravel 8.70.1": [[0, 18]], "VULNERABILITY: Cross Site Scripting": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50525"}} {"text": "PHP Melody 3.0 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PHP Melody 3.0": [[0, 14]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[28, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50486"}} {"text": "PHP Melody 3.0 - 'vid' SQL Injection", "spans": {"SYSTEM: PHP Melody 3.0": [[0, 14]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50487"}} {"text": "PHP Melody 3.0 - Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PHP Melody 3.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50488"}} {"text": "PHP Restaurants 1.0 - SQLi (Unauthenticated)", "spans": {"SYSTEM: PHP Restaurants 1.0": [[0, 19]], "VULNERABILITY: SQLi": [[22, 26]]}, "info": {"source": "exploitdb", "exploit_id": "50699"}} {"text": "PHP Restaurants 1.0 - SQLi Authentication Bypass & Cross Site Scripting", "spans": {"SYSTEM: PHP Restaurants 1.0": [[0, 19]], "VULNERABILITY: Cross Site Scripting": [[51, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51398"}} {"text": "PHP Shopping Cart 4.2 - Multiple-SQLi", "spans": {"SYSTEM: PHP Shopping Cart 4.2": [[0, 21]], "VULNERABILITY: SQLi": [[33, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51754"}} {"text": "PHP Timeclock 1.04 - 'Multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: PHP Timeclock 1.04": [[0, 18]], "VULNERABILITY: Cross Site Scripting": [[32, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49853"}} {"text": "PHP Timeclock 1.04 - Time and Boolean Based Blind SQL Injection", "spans": {"SYSTEM: PHP Timeclock 1.04": [[0, 18]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49849"}} {"text": "PHP Unit 4.8.28 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: PHP Unit 4.8.28": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50702"}} {"text": "php-fusion 9.03.50 - 'ctype' SQL Injection", "spans": {"SYSTEM: php-fusion 9.03.50": [[0, 18]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48487"}} {"text": "PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload", "spans": {"SYSTEM: PHP-Fusion 9.03.50": [[0, 18]], "VULNERABILITY: Arbitrary File Upload": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48381"}} {"text": "PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution", "spans": {"SYSTEM: PHP-Fusion 9.03.50": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48278"}} {"text": "php-fusion 9.03.50 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: php-fusion 9.03.50": [[0, 18]], "VULNERABILITY: Persistent Cross-Site Scripting": [[21, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48404"}} {"text": "PHP-Fusion 9.03.60 - PHP Object Injection", "spans": {"SYSTEM: PHP-Fusion 9.03.60": [[0, 18]], "VULNERABILITY: PHP Object Injection": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48630"}} {"text": "PHP-Fusion CMS 9.03.90 - Cross-Site Request Forgery (Delete admin shoutbox message)", "spans": {"SYSTEM: PHP-Fusion CMS 9.03.90": [[0, 22]], "VULNERABILITY: Cross-Site Request Forgery": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49426"}} {"text": "phpAbook 0.9i - SQL Injection", "spans": {"SYSTEM: phpAbook 0.9i": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "50071"}} {"text": "phpfm v1.7.9 - Authentication type juggling", "spans": {"SYSTEM: phpfm v1.7.9": [[0, 12]], "VULNERABILITY: Authentication type juggling": [[15, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51594"}} {"text": "phpFox < 4.8.13 - (redirect) PHP Object Injection Exploit", "spans": {"SYSTEM: phpFox < 4.8.13": [[0, 15]], "VULNERABILITY: (redirect) PHP Object Injection Exploit": [[18, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51799"}} {"text": "PHPFusion 9.03.50 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: PHPFusion 9.03.50": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48497"}} {"text": "PHPFusion 9.03.50 - Remote Code Execution", "spans": {"SYSTEM: PHPFusion 9.03.50": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49911"}} {"text": "PHPFusion 9.10.30 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PHPFusion 9.10.30": [[0, 17]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[20, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51411"}} {"text": "PHPGurukul Hostel Management System 2.1 - Cross-site request forgery (CSRF) to Cross-site Scripting (XSS)", "spans": {"SYSTEM: PHPGurukul Hostel Management System 2.1": [[0, 39]], "VULNERABILITY: CSRF": [[70, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50461"}} {"text": "PHPGurukul Online Birth Certificate System V 1.2 - Blind XSS", "spans": {"SYSTEM: PHPGurukul Online Birth Certificate System V 1.2": [[0, 48]], "VULNERABILITY: XSS": [[57, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51061"}} {"text": "phpIPAM 1.4 - SQL-Injection", "spans": {"SYSTEM: phpIPAM 1.4": [[0, 11]], "VULNERABILITY: SQL-Injection": [[14, 27]]}, "info": {"source": "exploitdb", "exploit_id": "52453"}} {"text": "PHPIPAM 1.4.4 - SQLi (Authenticated)", "spans": {"SYSTEM: PHPIPAM 1.4.4": [[0, 13]], "VULNERABILITY: SQLi": [[16, 20]]}, "info": {"source": "exploitdb", "exploit_id": "50684"}} {"text": "phpIPAM 1.4.5 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: phpIPAM 1.4.5": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50963"}} {"text": "phpIPAM 1.5.1 - SQL Injection", "spans": {"SYSTEM: phpIPAM 1.5.1": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52444"}} {"text": "phpIPAM 1.6 - Reflected Cross Site Scripting (XSS)", "spans": {"SYSTEM: phpIPAM 1.6": [[0, 11]], "VULNERABILITY: Cross Site Scripting": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52176"}} {"text": "phpIPAM 1.6 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: phpIPAM 1.6": [[0, 11]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[14, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52441"}} {"text": "phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)", "spans": {"SYSTEM: phpIPAM 1.6": [[0, 11]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52442"}} {"text": "PhpIX 2012 Professional - 'id' SQL Injection", "spans": {"SYSTEM: PhpIX 2012 Professional": [[0, 23]], "VULNERABILITY: SQL Injection": [[31, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48138"}} {"text": "PHPJabbers Appointment Scheduler 2.3 - Reflected XSS (Cross-Site Scripting)", "spans": {"SYSTEM: PHPJabbers Appointment Scheduler 2.3": [[0, 36]], "VULNERABILITY: Cross-Site Scripting": [[54, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49281"}} {"text": "PHPJabbers Business Directory Script v3.2 - Multiple Vulnerabilities", "spans": {"SYSTEM: PHPJabbers Business Directory Script v3.2": [[0, 41]], "VULNERABILITY: Multiple Vulnerabilities": [[44, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51687"}} {"text": "PHPJabbers Cleaning Business 1.0 - Reflected XSS", "spans": {"SYSTEM: PHPJabbers Cleaning Business 1.0": [[0, 32]], "VULNERABILITY: XSS": [[45, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51651"}} {"text": "PHPJabbers Night Club Booking 1.0 - Reflected XSS", "spans": {"SYSTEM: PHPJabbers Night Club Booking 1.0": [[0, 33]], "VULNERABILITY: XSS": [[46, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51650"}} {"text": "PHPJabbers Rental Property Booking 2.0 - Reflected XSS", "spans": {"SYSTEM: PHPJabbers Rental Property Booking 2.0": [[0, 38]], "VULNERABILITY: XSS": [[51, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51653"}} {"text": "PHPJabbers Service Booking Script 1.0 - Reflected XSS", "spans": {"SYSTEM: PHPJabbers Service Booking Script 1.0": [[0, 37]], "VULNERABILITY: XSS": [[50, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51649"}} {"text": "PHPJabbers Shuttle Booking Software 1.0 - Reflected XSS", "spans": {"SYSTEM: PHPJabbers Shuttle Booking Software 1.0": [[0, 39]], "VULNERABILITY: XSS": [[52, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51648"}} {"text": "PHPJabbers Simple CMS 5 - 'name' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PHPJabbers Simple CMS 5": [[0, 23]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50475"}} {"text": "PHPJabbers Simple CMS 5.0 - SQL Injection", "spans": {"SYSTEM: PHPJabbers Simple CMS 5.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[28, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51416"}} {"text": "PHPJabbers Simple CMS V5.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PHPJabbers Simple CMS V5.0": [[0, 26]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[29, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51415"}} {"text": "PHPJabbers Taxi Booking 2.0 - Reflected XSS", "spans": {"SYSTEM: PHPJabbers Taxi Booking 2.0": [[0, 27]], "VULNERABILITY: XSS": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51652"}} {"text": "PHPJabbers Vacation Rental Script 4.0 - CSRF", "spans": {"SYSTEM: PHPJabbers Vacation Rental Script 4.0": [[0, 37]], "VULNERABILITY: CSRF": [[40, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51672"}} {"text": "PHPKB Multi-Language 9 - 'image-upload.php' Authenticated Remote Code Execution", "spans": {"SYSTEM: PHPKB Multi-Language 9": [[0, 22]], "VULNERABILITY: Authenticated Remote Code Execution": [[44, 79]]}, "info": {"source": "exploitdb", "exploit_id": "48221"}} {"text": "PHPKB Multi-Language 9 - Authenticated Directory Traversal", "spans": {"SYSTEM: PHPKB Multi-Language 9": [[0, 22]], "VULNERABILITY: Directory Traversal": [[39, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48220"}} {"text": "PHPKB Multi-Language 9 - Authenticated Remote Code Execution", "spans": {"SYSTEM: PHPKB Multi-Language 9": [[0, 22]], "VULNERABILITY: Authenticated Remote Code Execution": [[25, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48219"}} {"text": "phpKF CMS 3.00 Beta y6 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: phpKF CMS 3.00 Beta y6": [[0, 22]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50610"}} {"text": "phpList 3.5.0 - Authentication Bypass", "spans": {"SYSTEM: phpList 3.5.0": [[0, 13]], "VULNERABILITY: Authentication Bypass": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "47989"}} {"text": "phpMyAdmin 4.8.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: phpMyAdmin 4.8.1": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50457"}} {"text": "phpMyAdmin 5.0.0 - SQL Injection", "spans": {"SYSTEM: phpMyAdmin 5.0.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "52451"}} {"text": "phpMyChat Plus 1.98 - 'pmc_username' SQL Injection", "spans": {"SYSTEM: phpMyChat Plus 1.98": [[0, 19]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48066"}} {"text": "phpMyFAQ 2.9.8 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: phpMyFAQ 2.9.8": [[0, 15]], "VULNERABILITY: CSRF": [[46, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52458"}} {"text": "phpMyFaq 2.9.8 - Cross Site Request Forgery (CSRF)", "spans": {"SYSTEM: phpMyFaq 2.9.8": [[0, 14]], "VULNERABILITY: CSRF": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52455"}} {"text": "phpMyFAQ 2.9.8 - Cross-Site Request Forgery(CSRF)", "spans": {"SYSTEM: phpMyFAQ 2.9.8": [[0, 14]], "VULNERABILITY: CSRF": [[44, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52459"}} {"text": "phpMyFAQ 3.1.7 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: phpMyFAQ 3.1.7": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[17, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52226"}} {"text": "phpMyFAQ 3.2.10 - Unintended File Download Triggered by Embedded Frames", "spans": {"SYSTEM: phpMyFAQ 3.2.10": [[0, 15]], "VULNERABILITY: Unintended File Download Triggered by Embedded Frames": [[18, 71]]}, "info": {"source": "exploitdb", "exploit_id": "52235"}} {"text": "phpMyFAQ v3.1.12 - CSV Injection", "spans": {"SYSTEM: phpMyFAQ v3.1.12": [[0, 16]], "VULNERABILITY: CSV Injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51399"}} {"text": "PHProjekt PhpSimplyGest v1.3. - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PHProjekt PhpSimplyGest v1.3.": [[0, 29]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[32, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50922"}} {"text": "Phpwcms 1.9.30 - Arbitrary File Upload", "spans": {"SYSTEM: Phpwcms 1.9.30": [[0, 14]], "VULNERABILITY: Arbitrary File Upload": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50363"}} {"text": "PhreeBooks 5.2.3 ERP - Remote Code Execution (2)", "spans": {"SYSTEM: PhreeBooks 5.2.3 ERP": [[0, 20]], "VULNERABILITY: Remote Code Execution": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49524"}} {"text": "PhreeBooks ERP 5.2.5 - Remote Command Execution", "spans": {"SYSTEM: PhreeBooks ERP 5.2.5": [[0, 20]], "VULNERABILITY: Remote Command Execution": [[23, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48423"}} {"text": "pimCore v5.4.18-skeleton - Sensitive Cookie with Improper SameSite Attribute", "spans": {"SYSTEM: pimCore v5.4.18-skeleton": [[0, 24]], "VULNERABILITY: Sensitive Cookie with Improper SameSite Attribute": [[28, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51201"}} {"text": "PimpMyLog v1.7.14 - Improper access control", "spans": {"SYSTEM: PimpMyLog v1.7.14": [[0, 17]], "VULNERABILITY: Improper access control": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51593"}} {"text": "Pinger 1.0 - Remote Code Execution", "spans": {"SYSTEM: Pinger 1.0": [[0, 10]], "VULNERABILITY: Remote Code Execution": [[13, 34]]}, "info": {"source": "exploitdb", "exploit_id": "48323"}} {"text": "Pisay Online E-Learning System 1.0 - Remote Code Execution", "spans": {"SYSTEM: Pisay Online E-Learning System 1.0": [[0, 34]], "VULNERABILITY: Remote Code Execution": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48439"}} {"text": "Piwigo 11.3.0 - 'language' SQL", "spans": {"SYSTEM: Piwigo 11.3.0": [[0, 13]], "VULNERABILITY: SQL": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "49818"}} {"text": "Piwigo 13.6.0 - SQL Injection", "spans": {"SYSTEM: Piwigo 13.6.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52443"}} {"text": "Piwigo 13.6.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Piwigo 13.6.0": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51386"}} {"text": "Piwigo 2.10.1 - Cross Site Scripting", "spans": {"SYSTEM: Piwigo 2.10.1": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[16, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48814"}} {"text": "Piwigo v13.7.0 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Piwigo v13.7.0": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[17, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51572"}} {"text": "PixelStor 5000 K:4.0.1580-20150629 - Remote Code Execution", "spans": {"SYSTEM: PixelStor 5000 K:4.0.1580-20150629": [[0, 34]], "VULNERABILITY: Remote Code Execution": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "47899"}} {"text": "PKP Open Journals System 3.3 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PKP Open Journals System 3.3": [[0, 28]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50881"}} {"text": "PlaySMS 1.4.3 - Template Injection / Remote Code Execution", "spans": {"SYSTEM: PlaySMS 1.4.3": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48199"}} {"text": "Pluck 4.7.7-dev2 - PHP Code Execution", "spans": {"SYSTEM: Pluck 4.7.7-dev2": [[0, 16]], "VULNERABILITY: PHP Code Execution": [[20, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52460"}} {"text": "Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Pluck CMS 4.7.13": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49909"}} {"text": "Pluck CMS 4.7.16 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Pluck CMS 4.7.16": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50826"}} {"text": "Pluck v4.7.18 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Pluck v4.7.18": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51592"}} {"text": "pluck v4.7.18 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: pluck v4.7.18": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51420"}} {"text": "PluckCMS 4.7.10 - Unrestricted File Upload", "spans": {"SYSTEM: PluckCMS 4.7.10": [[0, 15]], "VULNERABILITY: Unrestricted File Upload": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52448"}} {"text": "PMB 5.6 - 'chemin' Local File Disclosure", "spans": {"SYSTEM: PMB 5.6": [[0, 7]], "VULNERABILITY: Local File Disclosure": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "49054"}} {"text": "PMB 5.6 - 'logid' SQL Injection", "spans": {"SYSTEM: PMB 5.6": [[0, 7]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "48356"}} {"text": "PMB 7.4.6 - SQL Injection", "spans": {"SYSTEM: PMB 7.4.6": [[0, 9]], "VULNERABILITY: SQL Injection": [[12, 25]]}, "info": {"source": "exploitdb", "exploit_id": "51197"}} {"text": "Podcast Generator 3.1 - 'Long Description' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Podcast Generator 3.1": [[0, 21]], "VULNERABILITY: Persistent Cross-Site Scripting": [[43, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49866"}} {"text": "PodcastGenerator 3.2.9 - Blind SSRF via XML Injection", "spans": {"SYSTEM: PodcastGenerator 3.2.9": [[0, 22]], "VULNERABILITY: SSRF": [[31, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51565"}} {"text": "PodcastGenerator 3.2.9 - Multiple Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: PodcastGenerator 3.2.9": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[34, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51454"}} {"text": "Point of Sale System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Point of Sale System 1.0": [[0, 24]], "VULNERABILITY: Authentication Bypass": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49284"}} {"text": "Point of Sale System 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Point of Sale System 1.0": [[0, 24]], "VULNERABILITY: XSS": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49306"}} {"text": "Point of Sales 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Point of Sales 1.0": [[0, 18]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48933"}} {"text": "Point of Sales 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: Point of Sales 1.0": [[0, 18]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48937"}} {"text": "Police Crime Record Management Project 1.0 - Time Based SQLi", "spans": {"SYSTEM: Police Crime Record Management Project 1.0": [[0, 42]], "VULNERABILITY: SQLi": [[56, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50327"}} {"text": "Police Crime Record Management System 1.0 - 'casedetails' SQL Injection", "spans": {"SYSTEM: Police Crime Record Management System 1.0": [[0, 41]], "VULNERABILITY: SQL Injection": [[58, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50196"}} {"text": "Police Crime Record Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Police Crime Record Management System 1.0": [[0, 41]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[55, 88]]}, "info": {"source": "exploitdb", "exploit_id": "50195"}} {"text": "POLR URL 2.3.0 - Shortener Admin Takeover", "spans": {"SYSTEM: POLR URL 2.3.0": [[0, 14]], "VULNERABILITY: Shortener Admin Takeover": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51277"}} {"text": "PopojiCMS 2.0.1 - Remote Command Execution (RCE)", "spans": {"SYSTEM: PopojiCMS 2.0.1": [[0, 15]], "VULNERABILITY: Remote Command Execution": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "52022"}} {"text": "PopojiCMS Version 2.0.1 - Remote Command Execution", "spans": {"SYSTEM: PopojiCMS Version 2.0.1": [[0, 23]], "VULNERABILITY: Remote Command Execution": [[26, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51982"}} {"text": "POS Codekop v2.0 - Authenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: POS Codekop v2.0": [[0, 16]], "VULNERABILITY: Authenticated Remote Code Execution": [[19, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51551"}} {"text": "Poultry Farm Management System v1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Poultry Farm Management System v1.0": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "52053"}} {"text": "Prestashop 1.7.6.4 - Cross-Site Request Forgery", "spans": {"SYSTEM: Prestashop 1.7.6.4": [[0, 18]], "VULNERABILITY: Cross-Site Request Forgery": [[21, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48347"}} {"text": "PrestaShop 1.7.6.7 - 'location' Blind Sql Injection", "spans": {"SYSTEM: PrestaShop 1.7.6.7": [[0, 18]], "VULNERABILITY: Blind Sql Injection": [[32, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49755"}} {"text": "Prestashop 1.7.7.0 - 'id_product' Time Based Blind SQL Injection", "spans": {"SYSTEM: Prestashop 1.7.7.0": [[0, 18]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49410"}} {"text": "Prestashop 8.0.4 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Prestashop 8.0.4": [[0, 16]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51563"}} {"text": "Prestashop 8.0.4 - CSV injection", "spans": {"SYSTEM: Prestashop 8.0.4": [[0, 16]], "VULNERABILITY: CSV injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51463"}} {"text": "Prestashop blockwishlist module 2.1.0 - SQLi", "spans": {"SYSTEM: Prestashop blockwishlist module 2.1.0": [[0, 37]], "VULNERABILITY: SQLi": [[40, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51001"}} {"text": "PrestaShop ProductComments 4.2.0 - 'id_products' Time Based Blind SQL Injection", "spans": {"SYSTEM: PrestaShop ProductComments 4.2.0": [[0, 32]], "VULNERABILITY: SQL Injection": [[66, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49267"}} {"text": "PrestaShop Winbiz Payment module - Improper Limitation of a Pathname to a Restricted Directory", "spans": {"SYSTEM: PrestaShop Winbiz Payment module": [[0, 32]], "VULNERABILITY: Improper Limitation of a Pathname to a Restricted Directory": [[35, 94]]}, "info": {"source": "exploitdb", "exploit_id": "51545"}} {"text": "Printable Staff ID Card Creator System 1.0 - 'email' SQL Injection", "spans": {"SYSTEM: Printable Staff ID Card Creator System 1.0": [[0, 42]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49877"}} {"text": "Prison Management System - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Prison Management System": [[0, 24]], "VULNERABILITY: Authentication Bypass": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "52017"}} {"text": "Prizm Content Connect v10.5.1030.8315 - XXE", "spans": {"SYSTEM: Prizm Content Connect v10.5.1030.8315": [[0, 37]], "VULNERABILITY: XXE": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51185"}} {"text": "Processwire CMS 2.4.0 - 'download' Local File Inclusion", "spans": {"SYSTEM: Processwire CMS 2.4.0": [[0, 21]], "VULNERABILITY: Local File Inclusion": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48986"}} {"text": "Profiling System for Human Resource Management 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Profiling System for Human Resource Management 1.0": [[0, 50]], "VULNERABILITY: Remote Code Execution": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49672"}} {"text": "Projectsend r1295 - 'name' Stored XSS", "spans": {"SYSTEM: Projectsend r1295": [[0, 17]], "VULNERABILITY: XSS": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50240"}} {"text": "projectSend r1605 - CSV injection", "spans": {"SYSTEM: projectSend r1605": [[0, 17]], "VULNERABILITY: CSV injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51517"}} {"text": "projectSend r1605 - Private file download", "spans": {"SYSTEM: projectSend r1605": [[0, 17]], "VULNERABILITY: Private file download": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51400"}} {"text": "projectSend r1605 - Remote Code Exectution RCE", "spans": {"SYSTEM: projectSend r1605": [[0, 17]], "VULNERABILITY: RCE": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51238"}} {"text": "projectSend r1605 - Stored XSS", "spans": {"SYSTEM: projectSend r1605": [[0, 17]], "VULNERABILITY: XSS": [[27, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51518"}} {"text": "ProjeQtOr Project Management 9.1.4 - Remote Code Execution", "spans": {"SYSTEM: ProjeQtOr Project Management 9.1.4": [[0, 34]], "VULNERABILITY: Remote Code Execution": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49919"}} {"text": "ProjeQtOr Project Management System 10.3.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: ProjeQtOr Project Management System 10.3.2": [[0, 42]], "VULNERABILITY: Remote Code Execution (RCE)": [[45, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51387"}} {"text": "ProjeQtOr Project Management System v10.4.1 - Multiple XSS", "spans": {"SYSTEM: ProjeQtOr Project Management System v10.4.1": [[0, 43]], "VULNERABILITY: XSS": [[55, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51588"}} {"text": "Projeqtor v9.3.1 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Projeqtor v9.3.1": [[0, 16]], "VULNERABILITY: Stored Cross Site Scripting": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50641"}} {"text": "Purchase Order Management System 1.0 - Remote File Upload", "spans": {"SYSTEM: Purchase Order Management System 1.0": [[0, 36]], "VULNERABILITY: File Upload": [[46, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50292"}} {"text": "Purchase Order Management-1.0 - Local File Inclusion", "spans": {"SYSTEM: Purchase Order Management-1.0": [[0, 29]], "VULNERABILITY: Local File Inclusion": [[32, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51312"}} {"text": "Purei CMS 1.0 - SQL Injection", "spans": {"SYSTEM: Purei CMS 1.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51929"}} {"text": "PyroCMS v3.0.1 - Stored XSS", "spans": {"SYSTEM: PyroCMS v3.0.1": [[0, 14]], "VULNERABILITY: XSS": [[24, 27]]}, "info": {"source": "exploitdb", "exploit_id": "52016"}} {"text": "PZ Frontend Manager WordPress Plugin 1.0.5 - Cross Site Request Forgery (CSRF)", "spans": {"SYSTEM: PZ Frontend Manager WordPress Plugin 1.0.5": [[0, 42]], "VULNERABILITY: CSRF": [[73, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52153"}} {"text": "qdPM 9.1 - 'cfg[app_app_name]' Persistent Cross-Site Scripting", "spans": {"SYSTEM: qdPM 9.1": [[0, 8]], "VULNERABILITY: Persistent Cross-Site Scripting": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48486"}} {"text": "qdPM 9.1 - Arbitrary File Upload", "spans": {"SYSTEM: qdPM 9.1": [[0, 8]], "VULNERABILITY: Arbitrary File Upload": [[11, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48460"}} {"text": "qdPM 9.1 - Remote Code Execution", "spans": {"SYSTEM: qdPM 9.1": [[0, 8]], "VULNERABILITY: Remote Code Execution": [[11, 32]]}, "info": {"source": "exploitdb", "exploit_id": "47954"}} {"text": "qdPM 9.1 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: qdPM 9.1": [[0, 8]], "VULNERABILITY: Remote Code Execution": [[11, 32]]}, "info": {"source": "exploitdb", "exploit_id": "50175"}} {"text": "qdPM 9.1 - Remote Code Execution (RCE) (Authenticated) (v2)", "spans": {"SYSTEM: qdPM 9.1": [[0, 8]], "VULNERABILITY: Remote Code Execution (RCE)": [[11, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50944"}} {"text": "qdPM 9.2 - Cross-site Request Forgery (CSRF)", "spans": {"SYSTEM: qdPM 9.2": [[0, 8]], "VULNERABILITY: CSRF": [[39, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50854"}} {"text": "qdPM 9.2 - Password Exposure (Unauthenticated)", "spans": {"SYSTEM: qdPM 9.2": [[0, 8]], "VULNERABILITY: Password Exposure": [[11, 28]]}, "info": {"source": "exploitdb", "exploit_id": "50176"}} {"text": "QNAP QTS and Photo Station 6.0.3 - Remote Command Execution", "spans": {"SYSTEM: QNAP QTS and Photo Station 6.0.3": [[0, 32]], "VULNERABILITY: Remote Command Execution": [[35, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48531"}} {"text": "Queue Management System 4.0.0 - _Add User_ Stored XSS", "spans": {"SYSTEM: Queue Management System 4.0.0": [[0, 29]], "VULNERABILITY: XSS": [[50, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49296"}} {"text": "Quick.CMS 6.7 - Cross Site Request Forgery (CSRF) to Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Quick.CMS 6.7": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[53, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50530"}} {"text": "Quick.CMS 6.7 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Quick.CMS 6.7": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49494"}} {"text": "Quick.CMS 6.7 - SQL Injection Login Bypass", "spans": {"SYSTEM: Quick.CMS 6.7": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51910"}} {"text": "QuickBox Pro 2.1.8 - Authenticated Remote Code Execution", "spans": {"SYSTEM: QuickBox Pro 2.1.8": [[0, 18]], "VULNERABILITY: Authenticated Remote Code Execution": [[21, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48536"}} {"text": "QuickDate 1.3.2 - SQL Injection", "spans": {"SYSTEM: QuickDate 1.3.2": [[0, 15]], "VULNERABILITY: SQL Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "48022"}} {"text": "Quicklancer v1.0 - SQL Injection", "spans": {"SYSTEM: Quicklancer v1.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[19, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51474"}} {"text": "Rail Pass Management System 1.0 - Time-Based SQL Injection", "spans": {"SYSTEM: Rail Pass Management System 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51790"}} {"text": "RaspAP 2.6.6 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: RaspAP 2.6.6": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50224"}} {"text": "RATES SYSTEM 1.0 - 'Multiple' SQL Injections", "spans": {"SYSTEM: RATES SYSTEM 1.0": [[0, 16]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50192"}} {"text": "RATES SYSTEM 1.0 - Authentication Bypass", "spans": {"SYSTEM: RATES SYSTEM 1.0": [[0, 16]], "VULNERABILITY: Authentication Bypass": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50199"}} {"text": "rConfig 3.9 - 'searchColumn' SQL Injection", "spans": {"SYSTEM: rConfig 3.9": [[0, 11]], "VULNERABILITY: SQL Injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48208"}} {"text": "rConfig 3.9.3 - Authenticated Remote Code Execution", "spans": {"SYSTEM: rConfig 3.9.3": [[0, 13]], "VULNERABILITY: Authenticated Remote Code Execution": [[16, 51]]}, "info": {"source": "exploitdb", "exploit_id": "47982"}} {"text": "rConfig 3.9.4 - 'search.crud.php' Remote Command Injection", "spans": {"SYSTEM: rConfig 3.9.4": [[0, 13]], "VULNERABILITY: Command Injection": [[41, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48241"}} {"text": "rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Execution", "spans": {"SYSTEM: rConfig 3.9.4": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48261"}} {"text": "rConfig 3.9.5 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: rConfig 3.9.5": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48878"}} {"text": "rConfig 3.9.6 - 'path' Local File Inclusion (Authenticated)", "spans": {"SYSTEM: rConfig 3.9.6": [[0, 13]], "VULNERABILITY: Local File Inclusion": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49644"}} {"text": "rconfig 3.9.6 - Arbitrary File Upload", "spans": {"SYSTEM: rconfig 3.9.6": [[0, 13]], "VULNERABILITY: Arbitrary File Upload": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49783"}} {"text": "rConfig 3.9.6 - Arbitrary File Upload to Remote Code Execution (Authenticated) (1)", "spans": {"SYSTEM: rConfig 3.9.6": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49665"}} {"text": "rconfig 3.9.7 - Sql Injection (Authenticated)", "spans": {"SYSTEM: rconfig 3.9.7": [[0, 13]], "VULNERABILITY: Sql Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51163"}} {"text": "rConfig 3.93 - 'ajaxAddTemplate.php' Authenticated Remote Code Execution", "spans": {"SYSTEM: rConfig 3.93": [[0, 12]], "VULNERABILITY: Authenticated Remote Code Execution": [[37, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48207"}} {"text": "Really Simple Security 9.1.1.1 - Authentication Bypass", "spans": {"SYSTEM: Really Simple Security 9.1.1.1": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52207"}} {"text": "REDCap 11.3.9 - Stored Cross Site Scripting", "spans": {"SYSTEM: REDCap 11.3.9": [[0, 13]], "VULNERABILITY: Stored Cross Site Scripting": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50877"}} {"text": "Regis Inventory And Monitoring System 1.0 - 'Item List' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Regis Inventory And Monitoring System 1.0": [[0, 41]], "VULNERABILITY: Persistent Cross-Site Scripting": [[56, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49713"}} {"text": "RemoteClinic 2 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: RemoteClinic 2": [[0, 14]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[28, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49781"}} {"text": "RemoteClinic 2.0 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: RemoteClinic 2.0": [[0, 16]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[30, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49795"}} {"text": "Reservit Hotel 2.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Reservit Hotel 2.1": [[0, 18]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[21, 54]]}, "info": {"source": "exploitdb", "exploit_id": "52133"}} {"text": "Reside Property Management 3.0 - 'profile' SQL Injection", "spans": {"SYSTEM: Reside Property Management 3.0": [[0, 30]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48627"}} {"text": "ResidenceCMS 2.10.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: ResidenceCMS 2.10.1": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[22, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52150"}} {"text": "Responsive E-Learning System 1.0 - 'id' Sql Injection", "spans": {"SYSTEM: Responsive E-Learning System 1.0": [[0, 32]], "VULNERABILITY: Sql Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49357"}} {"text": "Responsive E-Learning System 1.0 - Stored Cross Site Scripting", "spans": {"SYSTEM: Responsive E-Learning System 1.0": [[0, 32]], "VULNERABILITY: Stored Cross Site Scripting": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49376"}} {"text": "Responsive E-Learning System 1.0 - Unrestricted File Upload to RCE", "spans": {"SYSTEM: Responsive E-Learning System 1.0": [[0, 32]], "VULNERABILITY: RCE": [[63, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49375"}} {"text": "Responsive FileManager 9.13.4 - 'path' Path Traversal", "spans": {"SYSTEM: Responsive FileManager 9.13.4": [[0, 29]], "VULNERABILITY: Path Traversal": [[39, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49359"}} {"text": "Responsive FileManager 9.9.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Responsive FileManager 9.9.5": [[0, 28]], "VULNERABILITY: Remote Code Execution (RCE)": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51251"}} {"text": "Responsive Online Blog 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Responsive Online Blog 1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48615"}} {"text": "Responsive Tourism Website 3.1 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Responsive Tourism Website 3.1": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50049"}} {"text": "Restaurant Management System 1.0 - SQL Injection", "spans": {"SYSTEM: Restaurant Management System 1.0": [[0, 32]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51330"}} {"text": "Restaurant Reservation System 1.0 - 'date' SQL Injection (Authenticated)", "spans": {"SYSTEM: Restaurant Reservation System 1.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48885"}} {"text": "Resumes Management and Job Application Website 1.0 - Authentication Bypass", "spans": {"SYSTEM: Resumes Management and Job Application Website 1.0": [[0, 50]], "VULNERABILITY: Authentication Bypass": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49353"}} {"text": "Resumes Management and Job Application Website 1.0 - RCE (Unauthenticated)", "spans": {"SYSTEM: Resumes Management and Job Application Website 1.0": [[0, 50]], "VULNERABILITY: RCE": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49380"}} {"text": "Revenue Collection System v1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Revenue Collection System v1.0": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51133"}} {"text": "revive-adserver v5.4.1 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: revive-adserver v5.4.1": [[0, 22]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51401"}} {"text": "RiteCMS 2.2.1 - Authenticated Remote Code Execution", "spans": {"SYSTEM: RiteCMS 2.2.1": [[0, 13]], "VULNERABILITY: Authenticated Remote Code Execution": [[16, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48636"}} {"text": "RiteCMS 2.2.1 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: RiteCMS 2.2.1": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48915"}} {"text": "RiteCMS 3.1.0 - Arbitrary File Deletion (Authenticated)", "spans": {"SYSTEM: RiteCMS 3.1.0": [[0, 13]], "VULNERABILITY: Arbitrary File Deletion": [[16, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50615"}} {"text": "RiteCMS 3.1.0 - Arbitrary File Overwrite (Authenticated)", "spans": {"SYSTEM: RiteCMS 3.1.0": [[0, 13]], "VULNERABILITY: Arbitrary File Overwrite": [[16, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50614"}} {"text": "RiteCMS 3.1.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: RiteCMS 3.1.0": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50616"}} {"text": "Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)", "spans": {"SYSTEM: Rocket LMS 1.1": [[0, 14]], "VULNERABILITY: Cross Site Scripting": [[28, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50677"}} {"text": "Rocket LMS 1.9 - Persistent Cross Site Scripting (XSS)", "spans": {"SYSTEM: Rocket LMS 1.9": [[0, 14]], "VULNERABILITY: Cross Site Scripting": [[28, 48]]}, "info": {"source": "exploitdb", "exploit_id": "52018"}} {"text": "RockMongo 1.1.7 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: RockMongo 1.1.7": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[18, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51437"}} {"text": "RosarioSIS 10.8.4 - CSV Injection", "spans": {"SYSTEM: RosarioSIS 10.8.4": [[0, 17]], "VULNERABILITY: CSV Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51622"}} {"text": "RosarioSIS 6.7.2 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: RosarioSIS 6.7.2": [[0, 16]], "VULNERABILITY: Cross Site Scripting": [[19, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52450"}} {"text": "RosarioSIS 6.7.2 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: RosarioSIS 6.7.2": [[0, 16]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52449"}} {"text": "RosarioSIS 7.6 - SQL Injection", "spans": {"SYSTEM: RosarioSIS 7.6": [[0, 14]], "VULNERABILITY: SQL Injection": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "52169"}} {"text": "Roundcube Webmail 1.2 - File Disclosure", "spans": {"SYSTEM: Roundcube Webmail 1.2": [[0, 21]], "VULNERABILITY: File Disclosure": [[24, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49510"}} {"text": "Roundcube Webmail 1.6.6 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Roundcube Webmail 1.6.6": [[0, 23]], "VULNERABILITY: Stored Cross Site Scripting": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52173"}} {"text": "Royal Event Management System 1.0 - 'todate' SQL Injection (Authenticated)", "spans": {"SYSTEM: Royal Event Management System 1.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50934"}} {"text": "Rukovoditel 2.6.1 - Cross-Site Request Forgery (Change password)", "spans": {"SYSTEM: Rukovoditel 2.6.1": [[0, 17]], "VULNERABILITY: Cross-Site Request Forgery": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49245"}} {"text": "Rukovoditel 2.6.1 - RCE (1)", "spans": {"SYSTEM: Rukovoditel 2.6.1": [[0, 17]], "VULNERABILITY: RCE": [[20, 23]]}, "info": {"source": "exploitdb", "exploit_id": "49238"}} {"text": "Rukovoditel 2.7.1 - Remote Code Execution (2) (Authenticated)", "spans": {"SYSTEM: Rukovoditel 2.7.1": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48784"}} {"text": "rukovoditel 3.2.1 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: rukovoditel 3.2.1": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51121"}} {"text": "Rukovoditel 3.3.1 - CSV injection", "spans": {"SYSTEM: Rukovoditel 3.3.1": [[0, 17]], "VULNERABILITY: CSV injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51490"}} {"text": "Rukovoditel 3.3.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Rukovoditel 3.3.1": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51322"}} {"text": "Rukovoditel 3.4.1 - Multiple Stored XSS", "spans": {"SYSTEM: Rukovoditel 3.4.1": [[0, 17]], "VULNERABILITY: XSS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51548"}} {"text": "Rukovoditel Project Management CRM 2.5.2 - 'entities_id' SQL Injection", "spans": {"SYSTEM: Rukovoditel Project Management CRM 2.5.2": [[0, 40]], "VULNERABILITY: SQL Injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "47931"}} {"text": "Rukovoditel Project Management CRM 2.5.2 - 'filters' SQL Injection", "spans": {"SYSTEM: Rukovoditel Project Management CRM 2.5.2": [[0, 40]], "VULNERABILITY: SQL Injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "47934"}} {"text": "Rukovoditel Project Management CRM 2.5.2 - 'reports_id' SQL Injection", "spans": {"SYSTEM: Rukovoditel Project Management CRM 2.5.2": [[0, 40]], "VULNERABILITY: SQL Injection": [[56, 69]]}, "info": {"source": "exploitdb", "exploit_id": "47926"}} {"text": "SAFARI Montage 8.5 - Reflected Cross Site Scripting (XSS)", "spans": {"SYSTEM: SAFARI Montage 8.5": [[0, 18]], "VULNERABILITY: Cross Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50626"}} {"text": "Sales and Inventory System for Grocery Store 1.0 - Multiple Stored XSS", "spans": {"SYSTEM: Sales and Inventory System for Grocery Store 1.0": [[0, 48]], "VULNERABILITY: XSS": [[67, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49329"}} {"text": "Sales of Cashier Goods v1.0 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Sales of Cashier Goods v1.0": [[0, 27]], "VULNERABILITY: Cross Site Scripting": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51549"}} {"text": "Sales Tracker Management System v1.0 - Multiple Vulnerabilities", "spans": {"SYSTEM: Sales Tracker Management System v1.0": [[0, 36]], "VULNERABILITY: Multiple Vulnerabilities": [[39, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51513"}} {"text": "SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated)", "spans": {"SYSTEM: SalonERP 3.0.1": [[0, 14]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50659"}} {"text": "sar2html 3.2.1 - 'plot' Remote Code Execution", "spans": {"SYSTEM: sar2html 3.2.1": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49344"}} {"text": "Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting", "spans": {"SYSTEM: Savsoft Quiz 5": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49196"}} {"text": "Savsoft Quiz 5 - 'Skype ID' Stored XSS", "spans": {"SYSTEM: Savsoft Quiz 5": [[0, 14]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49208"}} {"text": "Savsoft Quiz 5 - 'User Account Settings' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Savsoft Quiz 5": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[41, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49825"}} {"text": "Savsoft Quiz 5 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Savsoft Quiz 5": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48658"}} {"text": "Savsoft Quiz 5 - Stored Cross-Site Scripting", "spans": {"SYSTEM: Savsoft Quiz 5": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48753"}} {"text": "Savsoft Quiz Enterprise Version 5.5 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Savsoft Quiz Enterprise Version 5.5": [[0, 35]], "VULNERABILITY: Persistent Cross-Site Scripting": [[38, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48785"}} {"text": "Savsoft Quiz v6.0 Enterprise - Stored XSS", "spans": {"SYSTEM: Savsoft Quiz v6.0 Enterprise": [[0, 28]], "VULNERABILITY: XSS": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51988"}} {"text": "School ERP Pro 1.0 - 'es_messagesid' SQL Injection", "spans": {"SYSTEM: School ERP Pro 1.0": [[0, 18]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48390"}} {"text": "School ERP Pro 1.0 - Arbitrary File Read", "spans": {"SYSTEM: School ERP Pro 1.0": [[0, 18]], "VULNERABILITY: Arbitrary File Read": [[21, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48394"}} {"text": "School ERP Pro 1.0 - Remote Code Execution", "spans": {"SYSTEM: School ERP Pro 1.0": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48392"}} {"text": "School ERP System 1.0 - Cross Site Request Forgery (Add Admin)", "spans": {"SYSTEM: School ERP System 1.0": [[0, 21]], "VULNERABILITY: Cross Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47992"}} {"text": "School Event Attendance Monitoring System 1.0 - 'Item Name' Stored Cross-Site Scripting", "spans": {"SYSTEM: School Event Attendance Monitoring System 1.0": [[0, 45]], "VULNERABILITY: Stored Cross-Site Scripting": [[60, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49560"}} {"text": "School Faculty Scheduling System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: School Faculty Scheduling System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48938"}} {"text": "School Faculty Scheduling System 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: School Faculty Scheduling System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48939"}} {"text": "School Faculty Scheduling System 1.0 - Authentication Bypass POC", "spans": {"SYSTEM: School Faculty Scheduling System 1.0": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48922"}} {"text": "School Faculty Scheduling System 1.0 - Stored Cross Site Scripting POC", "spans": {"SYSTEM: School Faculty Scheduling System 1.0": [[0, 36]], "VULNERABILITY: Stored Cross Site Scripting": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48921"}} {"text": "School File Management System 1.0 - 'multiple' Stored Cross-Site Scripting", "spans": {"SYSTEM: School File Management System 1.0": [[0, 33]], "VULNERABILITY: Stored Cross-Site Scripting": [[47, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49559"}} {"text": "School File Management System 1.0 - 'username' SQL Injection", "spans": {"SYSTEM: School File Management System 1.0": [[0, 33]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48437"}} {"text": "School Log Management System 1.0 - 'username' SQL Injection / Remote Code Execution", "spans": {"SYSTEM: School Log Management System 1.0": [[0, 32]], "VULNERABILITY: Remote Code Execution": [[62, 83]]}, "info": {"source": "exploitdb", "exploit_id": "48988"}} {"text": "Scriptcase 9.7 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Scriptcase 9.7": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50872"}} {"text": "SCRMS 2023-05-27 1.0 - Multiple SQL Injection", "spans": {"SYSTEM: SCRMS 2023-05-27 1.0": [[0, 20]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51491"}} {"text": "Seat Reservation System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Seat Reservation System 1.0": [[0, 27]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48822"}} {"text": "Seat Reservation System 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Seat Reservation System 1.0": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48887"}} {"text": "Seat Reservation System 1.0 - Unauthenticated SQL Injection", "spans": {"SYSTEM: Seat Reservation System 1.0": [[0, 27]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48889"}} {"text": "Seeddms 5.1.10 - Remote Command Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Seeddms 5.1.10": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50062"}} {"text": "SeedDMS 5.1.18 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: SeedDMS 5.1.18": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[17, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48324"}} {"text": "Sellacious eCommerce 4.6 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Sellacious eCommerce 4.6": [[0, 24]], "VULNERABILITY: Persistent Cross-Site Scripting": [[27, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48467"}} {"text": "Senayan Library Management System v9.0.0 - SQL Injection", "spans": {"SYSTEM: Senayan Library Management System v9.0.0": [[0, 40]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51161"}} {"text": "Senayan Library Management System v9.5.0 - SQL Injection", "spans": {"SYSTEM: Senayan Library Management System v9.5.0": [[0, 40]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51120"}} {"text": "Sentrifugo 3.2 - 'assets' Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Sentrifugo 3.2": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48997"}} {"text": "Sentrifugo 3.2 - File Upload Restriction Bypass (Authenticated)", "spans": {"SYSTEM: Sentrifugo 3.2": [[0, 14]], "VULNERABILITY: File Upload": [[17, 28]]}, "info": {"source": "exploitdb", "exploit_id": "48955"}} {"text": "Sentrifugo CMS 3.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Sentrifugo CMS 3.2": [[0, 18]], "VULNERABILITY: Persistent Cross-Site Scripting": [[21, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48446"}} {"text": "Sentrifugo HRMS 3.2 - 'id' SQL Injection", "spans": {"SYSTEM: Sentrifugo HRMS 3.2": [[0, 19]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48179"}} {"text": "Sentrifugo Version 3.2 - 'announcements' Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Sentrifugo Version 3.2": [[0, 22]], "VULNERABILITY: Remote Code Execution": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48998"}} {"text": "SEO Panel 4.6.0 - Remote Code Execution (1)", "spans": {"SYSTEM: SEO Panel 4.6.0": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48862"}} {"text": "SEO Panel 4.6.0 - Remote Code Execution (2)", "spans": {"SYSTEM: SEO Panel 4.6.0": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49525"}} {"text": "Seo Panel 4.8.0 - 'category' Reflected XSS", "spans": {"SYSTEM: Seo Panel 4.8.0": [[0, 15]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49932"}} {"text": "Seo Panel 4.8.0 - 'from_time' Reflected XSS", "spans": {"SYSTEM: Seo Panel 4.8.0": [[0, 15]], "VULNERABILITY: XSS": [[40, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49935"}} {"text": "SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (1)", "spans": {"SYSTEM: SEO Panel 4.8.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49666"}} {"text": "SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2)", "spans": {"SYSTEM: SEO Panel 4.8.0": [[0, 15]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49804"}} {"text": "Seo Panel 4.8.0 - 'search_name' Reflected XSS", "spans": {"SYSTEM: Seo Panel 4.8.0": [[0, 15]], "VULNERABILITY: XSS": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49931"}} {"text": "Seotoaster 3.2.0 - Stored XSS on Edit page properties", "spans": {"SYSTEM: Seotoaster 3.2.0": [[0, 16]], "VULNERABILITY: XSS": [[26, 29]]}, "info": {"source": "exploitdb", "exploit_id": "49268"}} {"text": "Serendipity 2.4.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Serendipity 2.4.0": [[0, 17]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51373"}} {"text": "Serendipity 2.4.0 - File Inclusion RCE", "spans": {"SYSTEM: Serendipity 2.4.0": [[0, 17]], "VULNERABILITY: File Inclusion": [[20, 34]]}, "info": {"source": "exploitdb", "exploit_id": "51403"}} {"text": "Serendipity 2.4.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Serendipity 2.4.0": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51372"}} {"text": "Serendipity 2.5.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Serendipity 2.5.0": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52036"}} {"text": "Service Provider Management System v1.0 - SQL Injection", "spans": {"SYSTEM: Service Provider Management System v1.0": [[0, 39]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51482"}} {"text": "Shopping Portal ProVersion 3.0 - Authentication Bypass", "spans": {"SYSTEM: Shopping Portal ProVersion 3.0": [[0, 30]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "47834"}} {"text": "ShoreTel Conferencing 19.46.1802.0 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: ShoreTel Conferencing 19.46.1802.0": [[0, 34]], "VULNERABILITY: Reflected Cross-Site Scripting": [[37, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49026"}} {"text": "Showdoc 2.10.3 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Showdoc 2.10.3": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[17, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50941"}} {"text": "Shuttle-Booking-Software v1.0 - Multiple-SQLi", "spans": {"SYSTEM: Shuttle-Booking-Software v1.0": [[0, 29]], "VULNERABILITY: SQLi": [[41, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51745"}} {"text": "Simple Attendance System 1.0 - Authenticated bypass", "spans": {"SYSTEM: Simple Attendance System 1.0": [[0, 28]], "VULNERABILITY: Authenticated bypass": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50301"}} {"text": "Simple Attendance System 1.0 - Unauthenticated Blind SQLi", "spans": {"SYSTEM: Simple Attendance System 1.0": [[0, 28]], "VULNERABILITY: SQLi": [[53, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50312"}} {"text": "Simple Backup Plugin Python Exploit 2.7.10 - Path Traversal", "spans": {"SYSTEM: Simple Backup Plugin Python Exploit 2.7.10": [[0, 42]], "VULNERABILITY: Path Traversal": [[45, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51937"}} {"text": "Simple Chatbot Application 1.0 - 'Category' Stored Cross site Scripting", "spans": {"SYSTEM: Simple Chatbot Application 1.0": [[0, 30]], "VULNERABILITY: Stored Cross site Scripting": [[44, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49873"}} {"text": "Simple Chatbot Application 1.0 - 'message' Blind SQLi", "spans": {"SYSTEM: Simple Chatbot Application 1.0": [[0, 30]], "VULNERABILITY: SQLi": [[49, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50673"}} {"text": "Simple Chatbot Application 1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Simple Chatbot Application 1.0": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50672"}} {"text": "Simple Client Management System 1.0 - 'multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Simple Client Management System 1.0": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50498"}} {"text": "Simple Client Management System 1.0 - 'uemail' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Simple Client Management System 1.0": [[0, 35]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50063"}} {"text": "Simple Client Management System 1.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Simple Client Management System 1.0": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50094"}} {"text": "Simple Client Management System 1.0 - SQLi (Authentication Bypass)", "spans": {"SYSTEM: Simple Client Management System 1.0": [[0, 35]], "VULNERABILITY: Authentication Bypass": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50497"}} {"text": "Simple College Website 1.0 - 'full' Stored Cross Site Scripting", "spans": {"SYSTEM: Simple College Website 1.0": [[0, 26]], "VULNERABILITY: Stored Cross Site Scripting": [[36, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49477"}} {"text": "Simple College Website 1.0 - 'name' Sql Injection (Authentication Bypass)", "spans": {"SYSTEM: Simple College Website 1.0": [[0, 26]], "VULNERABILITY: Authentication Bypass": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49476"}} {"text": "Simple College Website 1.0 - 'page' Local File Inclusion", "spans": {"SYSTEM: Simple College Website 1.0": [[0, 26]], "VULNERABILITY: Local File Inclusion": [[36, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49175"}} {"text": "Simple College Website 1.0 - 'username' SQL Injection / Remote Code Execution", "spans": {"SYSTEM: Simple College Website 1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48977"}} {"text": "Simple CRM 3.0 - 'Change user information' Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: Simple CRM 3.0": [[0, 14]], "VULNERABILITY: CSRF": [[71, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50043"}} {"text": "Simple CRM 3.0 - 'email' SQL injection (Authentication Bypass)", "spans": {"SYSTEM: Simple CRM 3.0": [[0, 14]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50055"}} {"text": "Simple CRM 3.0 - 'name' Stored Cross site scripting (XSS)", "spans": {"SYSTEM: Simple CRM 3.0": [[0, 14]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50044"}} {"text": "Simple Employee Records System 1.0 - File Upload RCE (Unauthenticated)", "spans": {"SYSTEM: Simple Employee Records System 1.0": [[0, 34]], "VULNERABILITY: RCE": [[49, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49596"}} {"text": "Simple Food Ordering System v1.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Simple Food Ordering System v1.0": [[0, 32]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51292"}} {"text": "Simple Food Website 1.0 - Authentication Bypass", "spans": {"SYSTEM: Simple Food Website 1.0": [[0, 23]], "VULNERABILITY: Authentication Bypass": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49740"}} {"text": "Simple Grocery Store Sales And Inventory System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Simple Grocery Store Sales And Inventory System 1.0": [[0, 51]], "VULNERABILITY: Authentication Bypass": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48879"}} {"text": "Simple Image Gallery 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Simple Image Gallery 1.0": [[0, 24]], "VULNERABILITY: Remote Code Execution (RCE)": [[27, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50214"}} {"text": "Simple Image Gallery System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Simple Image Gallery System 1.0": [[0, 31]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50198"}} {"text": "Simple Issue Tracker System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Simple Issue Tracker System 1.0": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50411"}} {"text": "Simple Library Management System 1.0 - 'rollno' SQL Injection", "spans": {"SYSTEM: Simple Library Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50189"}} {"text": "Simple Online College Entrance Exam System 1.0 - 'Multiple' SQL injection", "spans": {"SYSTEM: Simple Online College Entrance Exam System 1.0": [[0, 46]], "VULNERABILITY: SQL injection": [[60, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50398"}} {"text": "Simple Online College Entrance Exam System 1.0 - Account Takeover", "spans": {"SYSTEM: Simple Online College Entrance Exam System 1.0": [[0, 46]], "VULNERABILITY: Account Takeover": [[49, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50397"}} {"text": "Simple Online College Entrance Exam System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Simple Online College Entrance Exam System 1.0": [[0, 46]], "VULNERABILITY: Authentication Bypass": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50390"}} {"text": "Simple Online College Entrance Exam System 1.0 - Unauthenticated Admin Creation", "spans": {"SYSTEM: Simple Online College Entrance Exam System 1.0": [[0, 46]], "VULNERABILITY: Unauthenticated Admin Creation": [[49, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50396"}} {"text": "Simple Online Food Ordering System 1.0 - 'id' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Simple Online Food Ordering System 1.0": [[0, 38]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48829"}} {"text": "Simple Payroll System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Simple Payroll System 1.0": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50403"}} {"text": "Simple Phone Book 1.0 - 'Username' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Simple Phone Book 1.0": [[0, 22]], "VULNERABILITY: SQL Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50223"}} {"text": "Simple Public Chat Room 1.0 - 'msg' Stored Cross-Site Scripting", "spans": {"SYSTEM: Simple Public Chat Room 1.0": [[0, 27]], "VULNERABILITY: Stored Cross-Site Scripting": [[36, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49498"}} {"text": "Simple Public Chat Room 1.0 - Authentication Bypass SQLi", "spans": {"SYSTEM: Simple Public Chat Room 1.0": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49497"}} {"text": "Simple Real Estate Portal System 1.0 - 'id' SQLi", "spans": {"SYSTEM: Simple Real Estate Portal System 1.0": [[0, 36]], "VULNERABILITY: SQLi": [[45, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50778"}} {"text": "Simple Student Information System 1.0 - SQL Injection (Authentication Bypass)", "spans": {"SYSTEM: Simple Student Information System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49758"}} {"text": "Simple Student Quarterly Result/Grade System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Simple Student Quarterly Result/Grade System 1.0": [[0, 48]], "VULNERABILITY: Authentication Bypass": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50740"}} {"text": "Simple Subscription Website 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Simple Subscription Website 1.0": [[0, 31]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50522"}} {"text": "Simple Task List 1.0 - 'status' SQLi", "spans": {"SYSTEM: Simple Task List 1.0": [[0, 20]], "VULNERABILITY: SQLi": [[32, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51913"}} {"text": "Simple Task Managing System v1.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Simple Task Managing System v1.0": [[0, 32]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51273"}} {"text": "Simple Water Refilling Station Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Simple Water Refilling Station Management System 1.0": [[0, 52]], "VULNERABILITY: Authentication Bypass": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50204"}} {"text": "Simple Water Refilling Station Management System 1.0 - Remote Code Execution (RCE) through File Upload", "spans": {"SYSTEM: Simple Water Refilling Station Management System 1.0": [[0, 52]], "VULNERABILITY: Remote Code Execution (RCE)": [[55, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50205"}} {"text": "SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution", "spans": {"SYSTEM: SimpleMachinesForum v2.1.1": [[0, 26]], "VULNERABILITY: Authenticated Remote Code Execution": [[29, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51057"}} {"text": "SimplePHPGal 0.7 - Remote File Inclusion", "spans": {"SYSTEM: SimplePHPGal 0.7": [[0, 16]], "VULNERABILITY: Remote File Inclusion": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48424"}} {"text": "Simplephpscripts Simple CMS 2.1 - 'Multiple' SQL Injection", "spans": {"SYSTEM: Simplephpscripts Simple CMS 2.1": [[0, 31]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50483"}} {"text": "Simplephpscripts Simple CMS 2.1 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Simplephpscripts Simple CMS 2.1": [[0, 31]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[45, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50482"}} {"text": "Sistem Informasi Pengumuman Kelulusan Online 1.0 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Sistem Informasi Pengumuman Kelulusan Online 1.0": [[0, 48]], "VULNERABILITY: Cross-Site Request Forgery": [[51, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48571"}} {"text": "SiteMagic CMS 4.4.2 - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: SiteMagic CMS 4.4.2": [[0, 19]], "VULNERABILITY: Arbitrary File Upload": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48788"}} {"text": "SitemagicCMS 4.4.3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: SitemagicCMS 4.4.3": [[0, 18]], "VULNERABILITY: Remote Code Execution (RCE)": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51464"}} {"text": "SLIMSV 9.5.2 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: SLIMSV 9.5.2": [[0, 12]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[15, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51211"}} {"text": "Small CRM 2.0 - 'email' SQL Injection", "spans": {"SYSTEM: Small CRM 2.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48867"}} {"text": "Small CRM 2.0 - Authentication Bypass", "spans": {"SYSTEM: Small CRM 2.0": [[0, 13]], "VULNERABILITY: Authentication Bypass": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "47874"}} {"text": "Small CRM 3.0 - 'Authentication Bypass' SQL Injection", "spans": {"SYSTEM: Small CRM 3.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49995"}} {"text": "Small CRM 3.0 - 'description' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Small CRM 3.0": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[30, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50435"}} {"text": "Smart Hospital 3.1 - _Add Patient_ Stored XSS", "spans": {"SYSTEM: Smart Hospital 3.1": [[0, 18]], "VULNERABILITY: XSS": [[42, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49290"}} {"text": "Smart Manager 8.27.0 - Post-Authenticated SQL Injection", "spans": {"SYSTEM: Smart Manager 8.27.0": [[0, 20]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52247"}} {"text": "Smart School 6.4.1 - SQL Injection", "spans": {"SYSTEM: Smart School 6.4.1": [[0, 18]], "VULNERABILITY: SQL Injection": [[21, 34]]}, "info": {"source": "exploitdb", "exploit_id": "51958"}} {"text": "Smart School v1.0 - SQL Injection", "spans": {"SYSTEM: Smart School v1.0": [[0, 17]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51472"}} {"text": "SmartBlog 2.0.1 - 'id_post' Blind SQL injection", "spans": {"SYSTEM: SmartBlog 2.0.1": [[0, 15]], "VULNERABILITY: SQL injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48995"}} {"text": "Social Networking Site - Authentication Bypass (SQli)", "spans": {"SYSTEM: Social Networking Site": [[0, 22]], "VULNERABILITY: Authentication Bypass": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49140"}} {"text": "Social-Commerce 3.1.6 - Reflected XSS", "spans": {"SYSTEM: Social-Commerce 3.1.6": [[0, 21]], "VULNERABILITY: XSS": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51671"}} {"text": "Social-Share-Buttons v2.2.3 - SQL Injection", "spans": {"SYSTEM: Social-Share-Buttons v2.2.3": [[0, 27]], "VULNERABILITY: SQL Injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51116"}} {"text": "SofaWiki 3.9.2 - Remote Command Execution (RCE) (Authenticated)", "spans": {"SYSTEM: SofaWiki 3.9.2": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51999"}} {"text": "SoftExpert (SE) Suite v2.1.3 - Local File Inclusion", "spans": {"SYSTEM: SoftExpert (SE) Suite v2.1.3": [[0, 28]], "VULNERABILITY: Local File Inclusion": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51404"}} {"text": "soosyze 2.0.0 - File Upload", "spans": {"SYSTEM: soosyze 2.0.0": [[0, 13]], "VULNERABILITY: File Upload": [[16, 27]]}, "info": {"source": "exploitdb", "exploit_id": "51718"}} {"text": "Sophos Web Appliance 4.3.10.4 - Pre-auth command injection", "spans": {"SYSTEM: Sophos Web Appliance 4.3.10.4": [[0, 29]], "VULNERABILITY: Pre-auth command injection": [[32, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51396"}} {"text": "SOPlanning 1.45 - 'by' SQL Injection", "spans": {"SYSTEM: SOPlanning 1.45": [[0, 15]], "VULNERABILITY: SQL Injection": [[23, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48074"}} {"text": "SOPlanning 1.45 - 'users' SQL Injection", "spans": {"SYSTEM: SOPlanning 1.45": [[0, 15]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48089"}} {"text": "SOPlanning 1.45 - Cross-Site Request Forgery (Add User)", "spans": {"SYSTEM: SOPlanning 1.45": [[0, 15]], "VULNERABILITY: Cross-Site Request Forgery": [[18, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48086"}} {"text": "SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: SOPlanning 1.52.01 (Simple Online Planning Tool)": [[0, 48]], "VULNERABILITY: Remote Code Execution (RCE)": [[51, 78]]}, "info": {"source": "exploitdb", "exploit_id": "52082"}} {"text": "SPA-CART CMS - Stored XSS", "spans": {"SYSTEM: SPA-CART CMS": [[0, 12]], "VULNERABILITY: XSS": [[22, 25]]}, "info": {"source": "exploitdb", "exploit_id": "51919"}} {"text": "SPA-Cart eCommerce CMS 1.9.0.3 - Reflected XSS", "spans": {"SYSTEM: SPA-Cart eCommerce CMS 1.9.0.3": [[0, 30]], "VULNERABILITY: XSS": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51713"}} {"text": "SPA-Cart eCommerce CMS 1.9.0.3 - SQL Injection", "spans": {"SYSTEM: SPA-Cart eCommerce CMS 1.9.0.3": [[0, 30]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51714"}} {"text": "SpamTitan 7.07 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: SpamTitan 7.07": [[0, 14]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[17, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48856"}} {"text": "Sphider Search Engine 1.3.6 - 'word_upper_bound' RCE (Authenticated)", "spans": {"SYSTEM: Sphider Search Engine 1.3.6": [[0, 27]], "VULNERABILITY: RCE": [[49, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48957"}} {"text": "spip v4.1.10 - Spoofing Admin account", "spans": {"SYSTEM: spip v4.1.10": [[0, 12]], "VULNERABILITY: Spoofing Admin account": [[15, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51557"}} {"text": "SPIP v4.2.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: SPIP v4.2.0": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51536"}} {"text": "Spitfire CMS 1.0.475 - PHP Object Injection", "spans": {"SYSTEM: Spitfire CMS 1.0.475": [[0, 20]], "VULNERABILITY: PHP Object Injection": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51162"}} {"text": "Stackposts Social Marketing Tool v1.0 - SQL Injection", "spans": {"SYSTEM: Stackposts Social Marketing Tool v1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51473"}} {"text": "Statamic 4.7.0 - File-Inclusion", "spans": {"SYSTEM: Statamic 4.7.0": [[0, 14]], "VULNERABILITY: File-Inclusion": [[17, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51602"}} {"text": "Stock Management System 1.0 - 'Brand Name' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: Persistent Cross-Site Scripting": [[43, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48926"}} {"text": "Stock Management System 1.0 - 'brandId and categoriesId' SQL Injection", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: SQL Injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48930"}} {"text": "Stock Management System 1.0 - 'Categories Name' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: Persistent Cross-Site Scripting": [[48, 79]]}, "info": {"source": "exploitdb", "exploit_id": "48925"}} {"text": "Stock Management System 1.0 - 'Product Name' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: Persistent Cross-Site Scripting": [[45, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48924"}} {"text": "Stock Management System 1.0 - 'user_id' Blind SQL injection (Authenticated)", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: SQL injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49994"}} {"text": "Stock Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48733"}} {"text": "Stock Management System 1.0 - Cross-Site Request Forgery (Change Username)", "spans": {"SYSTEM: Stock Management System 1.0": [[0, 27]], "VULNERABILITY: Cross-Site Request Forgery": [[30, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48783"}} {"text": "Stock Management System v1.0 - Unauthenticated SQL Injection", "spans": {"SYSTEM: Stock Management System v1.0": [[0, 28]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51990"}} {"text": "Storage Unit Rental Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Storage Unit Rental Management System 1.0": [[0, 41]], "VULNERABILITY: Remote Code Execution (RCE)": [[44, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50348"}} {"text": "Student Attendance Management System 1.0 - 'username' SQL Injection / Remote Code Execution", "spans": {"SYSTEM: Student Attendance Management System 1.0": [[0, 40]], "VULNERABILITY: Remote Code Execution": [[70, 91]]}, "info": {"source": "exploitdb", "exploit_id": "48989"}} {"text": "Student Enrollment 1.0 - Unauthenticated Remote Code Execution", "spans": {"SYSTEM: Student Enrollment 1.0": [[0, 22]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[25, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48608"}} {"text": "Student Management System 1.0 - 'message' Persistent Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: Student Management System 1.0": [[0, 29]], "VULNERABILITY: Persistent Cross-Site Scripting": [[42, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49865"}} {"text": "Student Management System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Student Management System 1.0": [[0, 29]], "VULNERABILITY: Authentication Bypass": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50579"}} {"text": "Student Quarterly Grading System 1.0 - 'grade' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Student Quarterly Grading System 1.0": [[0, 36]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[47, 80]]}, "info": {"source": "exploitdb", "exploit_id": "50412"}} {"text": "Student Quarterly Grading System 1.0 - SQLi Authentication Bypass", "spans": {"SYSTEM: Student Quarterly Grading System 1.0": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50376"}} {"text": "Student Record System 1.0 - 'cid' SQLi (Authenticated)", "spans": {"SYSTEM: Student Record System 1.0": [[0, 25]], "VULNERABILITY: SQLi": [[34, 38]]}, "info": {"source": "exploitdb", "exploit_id": "50782"}} {"text": "Student Record System 4.0 - 'cid' SQL Injection", "spans": {"SYSTEM: Student Record System 4.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49513"}} {"text": "Student Result Management System 1.0 - 'class' SQL Injection", "spans": {"SYSTEM: Student Result Management System 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49974"}} {"text": "Student Study Center Management System v1.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Student Study Center Management System v1.0": [[0, 43]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[46, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51528"}} {"text": "Submitty 20.04.01 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Submitty 20.04.01": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48488"}} {"text": "Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: Subrion CMS 4.0.5": [[0, 17]], "VULNERABILITY: Cross-Site Request Forgery": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47851"}} {"text": "Subrion CMS 4.2.1 - 'avatar[path]' XSS", "spans": {"SYSTEM: Subrion CMS 4.2.1": [[0, 17]], "VULNERABILITY: XSS": [[35, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49346"}} {"text": "Subrion CMS 4.2.1 - Arbitrary File Upload", "spans": {"SYSTEM: Subrion CMS 4.2.1": [[0, 17]], "VULNERABILITY: Arbitrary File Upload": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49876"}} {"text": "Subrion CMS 4.2.1 - Cross Site Request Forgery (CSRF) (Add Amin)", "spans": {"SYSTEM: Subrion CMS 4.2.1": [[0, 17]], "VULNERABILITY: CSRF": [[48, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50737"}} {"text": "Subrion CMS 4.2.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Subrion CMS 4.2.1": [[0, 17]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[20, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51110"}} {"text": "SugarCRM 12.2.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: SugarCRM 12.2.0": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51187"}} {"text": "SugarCRM 6.5.18 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: SugarCRM 6.5.18": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[18, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49060"}} {"text": "SuiteCRM 7.11.15 - 'last_name' Remote Code Execution (Authenticated)", "spans": {"SYSTEM: SuiteCRM 7.11.15": [[0, 16]], "VULNERABILITY: Remote Code Execution": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49001"}} {"text": "SuiteCRM 7.11.18 - Remote Code Execution (RCE) (Authenticated) (Metasploit)", "spans": {"SYSTEM: SuiteCRM 7.11.18": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]], "TOOL: Metasploit": [[64, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50531"}} {"text": "Super Socializer 7.13.52 - Reflected XSS", "spans": {"SYSTEM: Super Socializer 7.13.52": [[0, 24]], "VULNERABILITY: XSS": [[37, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51534"}} {"text": "SuperStoreFinder - Multiple Vulnerabilities", "spans": {"SYSTEM: SuperStoreFinder": [[0, 16]], "VULNERABILITY: Multiple Vulnerabilities": [[19, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51822"}} {"text": "Supply Chain Management System - Auth Bypass SQL Injection", "spans": {"SYSTEM: Supply Chain Management System": [[0, 30]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49239"}} {"text": "Support Board 3.3.3 - 'Multiple' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: Support Board 3.3.3": [[0, 19]], "VULNERABILITY: SQL Injection": [[33, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50294"}} {"text": "Support Board 3.3.4 - 'Message' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Support Board 3.3.4": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[32, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50419"}} {"text": "SymphonyCMS 3.0.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: SymphonyCMS 3.0.0": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48773"}} {"text": "Tailor Management System - 'id' SQL Injection", "spans": {"SYSTEM: Tailor Management System": [[0, 24]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48797"}} {"text": "Tailor Management System 1.0 - Unrestricted File Upload to Remote Code Execution", "spans": {"SYSTEM: Tailor Management System 1.0": [[0, 28]], "VULNERABILITY: Remote Code Execution": [[59, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49136"}} {"text": "Tailor MS 1.0 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: Tailor MS 1.0": [[0, 13]], "VULNERABILITY: Reflected Cross-Site Scripting": [[16, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48813"}} {"text": "TAO Open Source Assessment Platform 3.3.0 RC02 - HTML Injection", "spans": {"SYSTEM: TAO Open Source Assessment Platform 3.3.0 RC02": [[0, 46]], "VULNERABILITY: HTML Injection": [[49, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48341"}} {"text": "Task Management System 1.0 - 'First Name and Last Name' Stored XSS", "spans": {"SYSTEM: Task Management System 1.0": [[0, 26]], "VULNERABILITY: XSS": [[63, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49222"}} {"text": "Task Management System 1.0 - 'id' SQL Injection", "spans": {"SYSTEM: Task Management System 1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49224"}} {"text": "Task Management System 1.0 - 'page' Local File Inclusion", "spans": {"SYSTEM: Task Management System 1.0": [[0, 26]], "VULNERABILITY: Local File Inclusion": [[36, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49258"}} {"text": "Task Management System 1.0 - Unrestricted File Upload to Remote Code Execution", "spans": {"SYSTEM: Task Management System 1.0": [[0, 26]], "VULNERABILITY: Remote Code Execution": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49223"}} {"text": "taskhub 2.8.7 - SQL Injection", "spans": {"SYSTEM: taskhub 2.8.7": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51810"}} {"text": "Taskhub CRM Tool 2.8.6 - SQL Injection", "spans": {"SYSTEM: Taskhub CRM Tool 2.8.6": [[0, 22]], "VULNERABILITY: SQL Injection": [[25, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51692"}} {"text": "Tatsu 3.3.11 - Unauthenticated RCE", "spans": {"SYSTEM: Tatsu 3.3.11": [[0, 12]], "VULNERABILITY: RCE": [[31, 34]]}, "info": {"source": "exploitdb", "exploit_id": "52260"}} {"text": "Teacher Subject Allocation Management System 1.0 - 'searchdata' SQLi", "spans": {"SYSTEM: Teacher Subject Allocation Management System 1.0": [[0, 48]], "VULNERABILITY: SQLi": [[64, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51914"}} {"text": "Teachers Record Management System 1.0 - 'email' Stored Cross-site Scripting (XSS)", "spans": {"SYSTEM: Teachers Record Management System 1.0": [[0, 37]], "VULNERABILITY: XSS": [[77, 80]]}, "info": {"source": "exploitdb", "exploit_id": "50019"}} {"text": "Teachers Record Management System 1.0 - 'Multiple' SQL Injection (Authenticated)", "spans": {"SYSTEM: Teachers Record Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[51, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50018"}} {"text": "Teachers Record Management System 1.0 - 'searchteacher' SQL Injection", "spans": {"SYSTEM: Teachers Record Management System 1.0": [[0, 37]], "VULNERABILITY: SQL Injection": [[56, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49562"}} {"text": "Teachers Record Management System 1.0 - File Upload Type Validation", "spans": {"SYSTEM: Teachers Record Management System 1.0": [[0, 37]], "VULNERABILITY: File Upload": [[40, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51512"}} {"text": "TeamCity Agent XML-RPC 10.0 - Remote Code Execution", "spans": {"SYSTEM: TeamCity Agent XML-RPC 10.0": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48201"}} {"text": "TeamPass 3.0.0.21 - SQL Injection", "spans": {"SYSTEM: TeamPass 3.0.0.21": [[0, 17]], "VULNERABILITY: SQL Injection": [[20, 33]]}, "info": {"source": "exploitdb", "exploit_id": "52094"}} {"text": "Terramaster TOS 4.2.15 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Terramaster TOS 4.2.15": [[0, 22]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50635"}} {"text": "Testa 3.5.1 Online Test Management System - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Testa 3.5.1 Online Test Management System": [[0, 41]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[44, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51023"}} {"text": "TestLink 1.19 - Arbitrary File Download (Unauthenticated)", "spans": {"SYSTEM: TestLink 1.19": [[0, 13]], "VULNERABILITY: Arbitrary File Download": [[16, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50578"}} {"text": "TestLink 1.9.20 - Unrestricted File Upload (Authenticated)", "spans": {"SYSTEM: TestLink 1.9.20": [[0, 15]], "VULNERABILITY: Unrestricted File Upload": [[18, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49561"}} {"text": "Textpattern 4.8.3 - Remote code execution (Authenticated) (2)", "spans": {"SYSTEM: Textpattern 4.8.3": [[0, 17]], "VULNERABILITY: Remote code execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49620"}} {"text": "Textpattern 4.8.8 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Textpattern 4.8.8": [[0, 17]], "VULNERABILITY: Remote Code Execution (RCE)": [[20, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51176"}} {"text": "Textpattern CMS 4.6.2 - 'body' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Textpattern CMS 4.6.2": [[0, 21]], "VULNERABILITY: Persistent Cross-Site Scripting": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48861"}} {"text": "Textpattern CMS 4.6.2 - Cross-site Request Forgery", "spans": {"SYSTEM: Textpattern CMS 4.6.2": [[0, 21]], "VULNERABILITY: Cross-site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48907"}} {"text": "TextPattern CMS 4.8.3 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: TextPattern CMS 4.8.3": [[0, 21]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48943"}} {"text": "Textpattern CMS 4.8.4 - 'Comments' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Textpattern CMS 4.8.4": [[0, 21]], "VULNERABILITY: Persistent Cross-Site Scripting": [[35, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49616"}} {"text": "TextPattern CMS 4.8.7 - Remote Command Execution (Authenticated)", "spans": {"SYSTEM: TextPattern CMS 4.8.7": [[0, 21]], "VULNERABILITY: Remote Command Execution": [[24, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49996"}} {"text": "TextPattern CMS 4.8.7 - Remote Command Execution (RCE) (Authenticated)", "spans": {"SYSTEM: TextPattern CMS 4.8.7": [[0, 21]], "VULNERABILITY: Remote Command Execution": [[24, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50415"}} {"text": "TextPattern CMS 4.8.7 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: TextPattern CMS 4.8.7": [[0, 21]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[24, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49975"}} {"text": "Textpattern CMS 4.9.0-dev - 'Excerpt' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Textpattern CMS 4.9.0-dev": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[38, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49617"}} {"text": "TextPattern CMS 4.9.0-dev - Remote Command Execution (RCE) (Authenticated)", "spans": {"SYSTEM: TextPattern CMS 4.9.0-dev": [[0, 25]], "VULNERABILITY: Remote Command Execution": [[28, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50095"}} {"text": "Textpattern CMS v4.8.8 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Textpattern CMS v4.8.8": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[25, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51523"}} {"text": "The Shop v2.5 - SQL Injection", "spans": {"SYSTEM: The Shop v2.5": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51525"}} {"text": "ThinkAdmin 6 - Arbitrarily File Read", "spans": {"SYSTEM: ThinkAdmin 6": [[0, 12]], "VULNERABILITY: Arbitrarily File Read": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48812"}} {"text": "thrsrossi Millhouse-Project 1.414 - Remote Code Execution", "spans": {"SYSTEM: thrsrossi Millhouse-Project 1.414": [[0, 33]], "VULNERABILITY: Remote Code Execution": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51450"}} {"text": "Tiki Wiki CMS Groupware 21.1 - Authentication Bypass", "spans": {"SYSTEM: Tiki Wiki CMS Groupware 21.1": [[0, 28]], "VULNERABILITY: Authentication Bypass": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48927"}} {"text": "Time Slot Booking Calendar 1.8 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Time Slot Booking Calendar 1.8": [[0, 30]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[33, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51558"}} {"text": "TimeClock Software 1.01 0 - (Authenticated) Time-Based SQL Injection", "spans": {"SYSTEM: TimeClock Software 1.01 0": [[0, 25]], "VULNERABILITY: SQL Injection": [[55, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48874"}} {"text": "Tiny File Manager 2.4.6 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Tiny File Manager 2.4.6": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50828"}} {"text": "Tiny Tiny RSS - Remote Code Execution", "spans": {"SYSTEM: Tiny Tiny RSS": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49606"}} {"text": "TinyWebGallery v2.5 - Remote Code Execution (RCE)", "spans": {"SYSTEM: TinyWebGallery v2.5": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51443"}} {"text": "TinyWebGallery v2.5 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: TinyWebGallery v2.5": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[22, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51442"}} {"text": "Total CMS 1.7.4 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Total CMS 1.7.4": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51500"}} {"text": "Tourism Management System 1.0 - Arbitrary File Upload", "spans": {"SYSTEM: Tourism Management System 1.0": [[0, 29]], "VULNERABILITY: Arbitrary File Upload": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48892"}} {"text": "Tourism Management System v2.0 - Arbitrary File Upload", "spans": {"SYSTEM: Tourism Management System v2.0": [[0, 30]], "VULNERABILITY: Arbitrary File Upload": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51923"}} {"text": "Traffic Offense Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Traffic Offense Management System 1.0": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50244"}} {"text": "Translatepress Multilinugal WordPress plugin < 2.3.3 - Authenticated SQL Injection", "spans": {"SYSTEM: Translatepress Multilinugal WordPress plugin < 2.3.3": [[0, 52]], "VULNERABILITY: SQL Injection": [[69, 82]]}, "info": {"source": "exploitdb", "exploit_id": "51043"}} {"text": "TranzAxis 3.2.41.10.26 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: TranzAxis 3.2.41.10.26": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[25, 58]]}, "info": {"source": "exploitdb", "exploit_id": "52086"}} {"text": "Tree Page View Plugin 1.6.7 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: Tree Page View Plugin 1.6.7": [[0, 27]], "VULNERABILITY: Cross Site Scripting": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51507"}} {"text": "Triconsole 3.75 - Reflected XSS", "spans": {"SYSTEM: Triconsole 3.75": [[0, 15]], "VULNERABILITY: XSS": [[28, 31]]}, "info": {"source": "exploitdb", "exploit_id": "49597"}} {"text": "Trixbox 2.8.0.4 - 'lang' Path Traversal", "spans": {"SYSTEM: Trixbox 2.8.0.4": [[0, 15]], "VULNERABILITY: Path Traversal": [[25, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49914"}} {"text": "Trixbox 2.8.0.4 - 'lang' Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Trixbox 2.8.0.4": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49913"}} {"text": "Tryton 5.4 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Tryton 5.4": [[0, 10]], "VULNERABILITY: Persistent Cross-Site Scripting": [[13, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48466"}} {"text": "Typecho 1.3.0 - Race Condition", "spans": {"SYSTEM: Typecho 1.3.0": [[0, 13]], "VULNERABILITY: Race Condition": [[16, 30]]}, "info": {"source": "exploitdb", "exploit_id": "52161"}} {"text": "Typecho 1.3.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Typecho 1.3.0": [[0, 13]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[16, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52162"}} {"text": "TypeSetter 5.1 - CSRF (Change admin e-mail)", "spans": {"SYSTEM: TypeSetter 5.1": [[0, 14]], "VULNERABILITY: CSRF": [[17, 21]]}, "info": {"source": "exploitdb", "exploit_id": "49128"}} {"text": "Typesetter CMS 5.1 - 'Site Title' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Typesetter CMS 5.1": [[0, 18]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48852"}} {"text": "Typesetter CMS 5.1 - Arbitrary Code Execution (Authenticated)", "spans": {"SYSTEM: Typesetter CMS 5.1": [[0, 18]], "VULNERABILITY: Arbitrary Code Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48906"}} {"text": "TYPO3 11.5.24 - Path Traversal (Authenticated)", "spans": {"SYSTEM: TYPO3 11.5.24": [[0, 13]], "VULNERABILITY: Path Traversal": [[16, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51901"}} {"text": "UADMIN Botnet 1.0 - 'link' SQL Injection", "spans": {"SYSTEM: UADMIN Botnet 1.0": [[0, 17]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48222"}} {"text": "uBidAuction v2.0.1 - 'Multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: uBidAuction v2.0.1": [[0, 18]], "VULNERABILITY: Cross Site Scripting": [[32, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50693"}} {"text": "uDoctorAppointment v2.1.1 - 'Multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: uDoctorAppointment v2.1.1": [[0, 25]], "VULNERABILITY: Cross Site Scripting": [[39, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50676"}} {"text": "UliCMS 2020.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: UliCMS 2020.1": [[0, 13]], "VULNERABILITY: Persistent Cross-Site Scripting": [[16, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48244"}} {"text": "Ulicms 2023.1 - create admin user via mass assignment", "spans": {"SYSTEM: Ulicms 2023.1": [[0, 13]], "VULNERABILITY: create admin user via mass assignment": [[16, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51486"}} {"text": "Ulicms-2023.1 sniffing-vicuna - Remote Code Execution (RCE)", "spans": {"SYSTEM: Ulicms-2023.1 sniffing-vicuna": [[0, 29]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51434"}} {"text": "Ulicms-2023.1 sniffing-vicuna - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Ulicms-2023.1 sniffing-vicuna": [[0, 29]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[32, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51435"}} {"text": "Ulicms-2023.1-sniffing-vicuna - Privilege escalation", "spans": {"SYSTEM: Ulicms-2023.1-sniffing-vicuna": [[0, 29]], "VULNERABILITY: Privilege escalation": [[32, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51433"}} {"text": "Ultimate POS 4.4 - 'name' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Ultimate POS 4.4": [[0, 16]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50492"}} {"text": "Ultimate Project Manager CRM PRO Version 2.0.5 - SQLi (Authenticated)", "spans": {"SYSTEM: Ultimate Project Manager CRM PRO Version 2.0.5": [[0, 46]], "VULNERABILITY: SQLi": [[49, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48912"}} {"text": "Unified Office Total Connect Now 1.0 - 'data' SQL Injection", "spans": {"SYSTEM: Unified Office Total Connect Now 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50022"}} {"text": "unilogies/bumsys v1.0.3 beta - Unrestricted File Upload", "spans": {"SYSTEM: unilogies/bumsys v1.0.3 beta": [[0, 28]], "VULNERABILITY: Unrestricted File Upload": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51492"}} {"text": "UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read", "spans": {"SYSTEM: UniSharp Laravel File Manager 2.0.0": [[0, 35]], "VULNERABILITY: Arbitrary File Read": [[38, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48166"}} {"text": "UPS Network Management Card 4 - Path Traversal", "spans": {"SYSTEM: UPS Network Management Card 4": [[0, 29]], "VULNERABILITY: Path Traversal": [[32, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51897"}} {"text": "User Management System 1.0 - 'uid' SQL Injection", "spans": {"SYSTEM: User Management System 1.0": [[0, 26]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49502"}} {"text": "User Management System 2.0 - Authentication Bypass", "spans": {"SYSTEM: User Management System 2.0": [[0, 26]], "VULNERABILITY: Authentication Bypass": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48369"}} {"text": "User Management System 2.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: User Management System 2.0": [[0, 26]], "VULNERABILITY: Persistent Cross-Site Scripting": [[29, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48368"}} {"text": "User Registration & Login and User Management System 2.1 - Cross Site Request Forgery", "spans": {"SYSTEM: User Registration & Login and User Management System 2.1": [[0, 56]], "VULNERABILITY: Cross Site Request Forgery": [[59, 85]]}, "info": {"source": "exploitdb", "exploit_id": "49180"}} {"text": "User Registration & Login and User Management System 2.1 - Login Bypass SQL Injection", "spans": {"SYSTEM: User Registration & Login and User Management System 2.1": [[0, 56]], "VULNERABILITY: SQL Injection": [[72, 85]]}, "info": {"source": "exploitdb", "exploit_id": "49052"}} {"text": "User Registration & Login and User Management System 2.1 - SQL Injection", "spans": {"SYSTEM: User Registration & Login and User Management System 2.1": [[0, 56]], "VULNERABILITY: SQL Injection": [[59, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48932"}} {"text": "User Registration & Login and User Management System v3.0 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: User Registration & Login and User Management System v3.0": [[0, 57]], "VULNERABILITY: SQL Injection": [[60, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51695"}} {"text": "User Registration & Login and User Management System v3.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: User Registration & Login and User Management System v3.0": [[0, 57]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[60, 93]]}, "info": {"source": "exploitdb", "exploit_id": "51694"}} {"text": "User Registration & Login and User Management System With admin panel 2.1 - Persistent XSS", "spans": {"SYSTEM: User Registration & Login and User Management System With admin panel 2.1": [[0, 73]], "VULNERABILITY: XSS": [[87, 90]]}, "info": {"source": "exploitdb", "exploit_id": "48914"}} {"text": "Uvdesk 1.1.4 - Stored XSS (Authenticated)", "spans": {"SYSTEM: Uvdesk 1.1.4": [[0, 12]], "VULNERABILITY: XSS": [[22, 25]]}, "info": {"source": "exploitdb", "exploit_id": "51696"}} {"text": "Uvdesk v1.1.3 - File Upload Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Uvdesk v1.1.3": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51639"}} {"text": "Vacation Rental 1.8 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Vacation Rental 1.8": [[0, 19]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[22, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51562"}} {"text": "Vaidya-Mitra 1.0 - Multiple SQLi", "spans": {"SYSTEM: Vaidya-Mitra 1.0": [[0, 16]], "VULNERABILITY: SQLi": [[28, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51596"}} {"text": "Vanguard 2.1 - 'Search' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Vanguard 2.1": [[0, 12]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50491"}} {"text": "Vanilla Forums 2.6.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Vanilla Forums 2.6.3": [[0, 20]], "VULNERABILITY: Persistent Cross-Site Scripting": [[23, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48042"}} {"text": "vBulletin 5.6.1 - 'nodeId' SQL Injection", "spans": {"SYSTEM: vBulletin 5.6.1": [[0, 15]], "VULNERABILITY: SQL Injection": [[27, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48472"}} {"text": "vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution", "spans": {"SYSTEM: vBulletin 5.6.2": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48743"}} {"text": "vBulletin 5.6.3 - 'group' Cross Site Scripting", "spans": {"SYSTEM: vBulletin 5.6.3": [[0, 15]], "VULNERABILITY: Cross Site Scripting": [[26, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49209"}} {"text": "Vehicle Parking Management System 1.0 - 'catename' Persistent Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Vehicle Parking Management System 1.0": [[0, 37]], "VULNERABILITY: Persistent Cross-Site Scripting": [[51, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49595"}} {"text": "Vehicle Parking Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Vehicle Parking Management System 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48877"}} {"text": "Vehicle Parking Tracker System 1.0 - 'Owner Name' Stored Cross-Site Scripting", "spans": {"SYSTEM: Vehicle Parking Tracker System 1.0": [[0, 34]], "VULNERABILITY: Stored Cross-Site Scripting": [[51, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49509"}} {"text": "Vehicle Service Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: Vehicle Service Management System 1.0": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50364"}} {"text": "VehicleWorkshop 1.0 - 'bookingid' SQL Injection", "spans": {"SYSTEM: VehicleWorkshop 1.0": [[0, 19]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48023"}} {"text": "VIAVIWEB Wallpaper Admin 1.0 - Multiple Vulnerabilities", "spans": {"SYSTEM: VIAVIWEB Wallpaper Admin 1.0": [[0, 28]], "VULNERABILITY: Multiple Vulnerabilities": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51033"}} {"text": "Victor CMS 1.0 - 'add_user' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48511"}} {"text": "Victor CMS 1.0 - 'cat_id' SQL Injection", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48485"}} {"text": "Victor CMS 1.0 - 'comment_author' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48484"}} {"text": "Victor CMS 1.0 - 'post' SQL Injection", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: SQL Injection": [[24, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48451"}} {"text": "Victor CMS 1.0 - 'Search' SQL Injection", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48734"}} {"text": "Victor CMS 1.0 - 'user_firstname' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: Persistent Cross-Site Scripting": [[34, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48626"}} {"text": "Victor CMS 1.0 - Authenticated Arbitrary File Upload", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: Arbitrary File Upload": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48490"}} {"text": "Victor CMS 1.0 - File Upload To RCE", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: RCE": [[32, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49310"}} {"text": "Victor CMS 1.0 - Multiple SQL Injection (Authenticated)", "spans": {"SYSTEM: Victor CMS 1.0": [[0, 14]], "VULNERABILITY: SQL Injection": [[26, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49282"}} {"text": "Virtual Airlines Manager 2.6.2 - 'airport' SQL Injection", "spans": {"SYSTEM: Virtual Airlines Manager 2.6.2": [[0, 30]], "VULNERABILITY: SQL Injection": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48567"}} {"text": "Virtual Airlines Manager 2.6.2 - 'id' SQL Injection", "spans": {"SYSTEM: Virtual Airlines Manager 2.6.2": [[0, 30]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48574"}} {"text": "Virtual Airlines Manager 2.6.2 - 'multiple' SQL Injection", "spans": {"SYSTEM: Virtual Airlines Manager 2.6.2": [[0, 30]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50634"}} {"text": "Virtual Airlines Manager 2.6.2 - 'notam' SQL Injection", "spans": {"SYSTEM: Virtual Airlines Manager 2.6.2": [[0, 30]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48562"}} {"text": "Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Virtual Airlines Manager 2.6.2": [[0, 30]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48715"}} {"text": "Virtual Freer 1.58 - Remote Command Execution", "spans": {"SYSTEM: Virtual Freer 1.58": [[0, 18]], "VULNERABILITY: Remote Command Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48094"}} {"text": "Visitor Management System in PHP 1.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Visitor Management System in PHP 1.0": [[0, 36]], "VULNERABILITY: Persistent Cross-Site Scripting": [[39, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48830"}} {"text": "Visitor Management System in PHP 1.0 - SQL Injection (Authenticated)", "spans": {"SYSTEM: Visitor Management System in PHP 1.0": [[0, 36]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48911"}} {"text": "Voting System 1.0 - Authentication Bypass (SQLI)", "spans": {"SYSTEM: Voting System 1.0": [[0, 17]], "VULNERABILITY: Authentication Bypass": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49843"}} {"text": "Voting System 1.0 - File Upload RCE (Authenticated Remote Code Execution)", "spans": {"SYSTEM: Voting System 1.0": [[0, 17]], "VULNERABILITY: Authenticated Remote Code Execution": [[37, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49445"}} {"text": "Voting System 1.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Voting System 1.0": [[0, 17]], "VULNERABILITY: Remote Code Execution": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49846"}} {"text": "Voting System 1.0 - Time based SQLI (Unauthenticated SQL injection)", "spans": {"SYSTEM: Voting System 1.0": [[0, 17]], "VULNERABILITY: SQL injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49817"}} {"text": "Voyager 1.3.0 - Directory Traversal", "spans": {"SYSTEM: Voyager 1.3.0": [[0, 13]], "VULNERABILITY: Directory Traversal": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "47875"}} {"text": "VTiger v7.0 CRM - 'To' Persistent XSS", "spans": {"SYSTEM: VTiger v7.0 CRM": [[0, 15]], "VULNERABILITY: XSS": [[34, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49090"}} {"text": "Wallos < 1.11.2 - File Upload RCE", "spans": {"SYSTEM: Wallos < 1.11.2": [[0, 15]], "VULNERABILITY: RCE": [[30, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51924"}} {"text": "Warehouse Inventory System 1.0 - Cross-Site Request Forgery (Change Admin Password)", "spans": {"SYSTEM: Warehouse Inventory System 1.0": [[0, 30]], "VULNERABILITY: Cross-Site Request Forgery": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48738"}} {"text": "Water Billing System 1.0 - 'id' SQL Injection (Authenticated)", "spans": {"SYSTEM: Water Billing System 1.0": [[0, 24]], "VULNERABILITY: SQL Injection": [[32, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49048"}} {"text": "Water Billing System 1.0 - 'username' and 'password' parameters SQL Injection", "spans": {"SYSTEM: Water Billing System 1.0": [[0, 24]], "VULNERABILITY: SQL Injection": [[64, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49032"}} {"text": "WBCE 1.6.0 - Unauthenticated SQL injection", "spans": {"SYSTEM: WBCE 1.6.0": [[0, 10]], "VULNERABILITY: SQL injection": [[29, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51985"}} {"text": "WBCE CMS 1.5.1 - Admin Password Reset", "spans": {"SYSTEM: WBCE CMS 1.5.1": [[0, 14]], "VULNERABILITY: Admin Password Reset": [[17, 37]]}, "info": {"source": "exploitdb", "exploit_id": "50609"}} {"text": "WBCE CMS 1.5.2 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WBCE CMS 1.5.2": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50707"}} {"text": "WBCE CMS 1.6.1 - Multiple Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WBCE CMS 1.6.1": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51484"}} {"text": "WBCE CMS 1.6.1 - Open Redirect & CSRF", "spans": {"SYSTEM: WBCE CMS 1.6.1": [[0, 14]], "VULNERABILITY: Open Redirect": [[17, 30]]}, "info": {"source": "exploitdb", "exploit_id": "51566"}} {"text": "WBCE CMS v1.6.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: WBCE CMS v1.6.2": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52039"}} {"text": "WBCE CMS Version 1.6.1 - Remote Command Execution (Authenticated)", "spans": {"SYSTEM: WBCE CMS Version 1.6.1": [[0, 22]], "VULNERABILITY: Remote Command Execution": [[25, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51986"}} {"text": "WBiz Desk 1.2 - SQL Injection", "spans": {"SYSTEM: WBiz Desk 1.2": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51451"}} {"text": "Web Based Online Hotel Booking System 0.1.0 - Authentication Bypass", "spans": {"SYSTEM: Web Based Online Hotel Booking System 0.1.0": [[0, 43]], "VULNERABILITY: Authentication Bypass": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48672"}} {"text": "Web Based Quiz System 1.0 - 'eid' Union Based Sql Injection (Authenticated)", "spans": {"SYSTEM: Web Based Quiz System 1.0": [[0, 25]], "VULNERABILITY: Union Based Sql Injection": [[34, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49619"}} {"text": "Web Based Quiz System 1.0 - 'MCQ options' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Web Based Quiz System 1.0": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[42, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49605"}} {"text": "Web Based Quiz System 1.0 - 'name' Persistent Cross-Site Scripting", "spans": {"SYSTEM: Web Based Quiz System 1.0": [[0, 25]], "VULNERABILITY: Persistent Cross-Site Scripting": [[35, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49607"}} {"text": "Webedition CMS v2.9.8.8 - Blind SSRF", "spans": {"SYSTEM: Webedition CMS v2.9.8.8": [[0, 23]], "VULNERABILITY: SSRF": [[32, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51743"}} {"text": "Webedition CMS v2.9.8.8 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Webedition CMS v2.9.8.8": [[0, 23]], "VULNERABILITY: Remote Code Execution (RCE)": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51661"}} {"text": "Webedition CMS v2.9.8.8 - Stored XSS", "spans": {"SYSTEM: Webedition CMS v2.9.8.8": [[0, 23]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51662"}} {"text": "webERP 4.15.1 - Unauthenticated Backup File Access", "spans": {"SYSTEM: webERP 4.15.1": [[0, 13]], "VULNERABILITY: Unauthenticated Backup File Access": [[16, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48420"}} {"text": "Webgrind 1.1 - Reflected Cross-Site Scripting (XSS) & Remote Command Execution (RCE)", "spans": {"SYSTEM: Webgrind 1.1": [[0, 12]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[15, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51074"}} {"text": "WebHMI 4.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WebHMI 4.0": [[0, 10]], "VULNERABILITY: Remote Code Execution (RCE)": [[13, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50589"}} {"text": "WebHMI 4.1 - Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WebHMI 4.1": [[0, 10]], "VULNERABILITY: Stored Cross Site Scripting": [[13, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50785"}} {"text": "WebHMI 4.1.1 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WebHMI 4.1.1": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50784"}} {"text": "WEBIGniter v28.7.23 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: WEBIGniter v28.7.23": [[0, 19]], "VULNERABILITY: Stored Cross Site Scripting": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51807"}} {"text": "WEBIGniter v28.7.23 - Stored XSS", "spans": {"SYSTEM: WEBIGniter v28.7.23": [[0, 19]], "VULNERABILITY: XSS": [[29, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51900"}} {"text": "WEBIGniter v28.7.23 File Upload - Remote Code Execution", "spans": {"SYSTEM: WEBIGniter v28.7.23 File Upload": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51736"}} {"text": "Webile v1.0.1 - Multiple Cross Site Scripting", "spans": {"SYSTEM: Webile v1.0.1": [[0, 13]], "VULNERABILITY: Cross Site Scripting": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51616"}} {"text": "Webkul Qloapps 1.5.2 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Webkul Qloapps 1.5.2": [[0, 20]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[23, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51465"}} {"text": "WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting", "spans": {"SYSTEM: WebPort 1.19.1": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting": [[25, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48612"}} {"text": "WebsiteBaker 2.12.2 - 'display_name' SQL Injection (authenticated)", "spans": {"SYSTEM: WebsiteBaker 2.12.2": [[0, 19]], "VULNERABILITY: SQL Injection": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48849"}} {"text": "WebsiteBaker 2.12.2 - Remote Code Execution", "spans": {"SYSTEM: WebsiteBaker 2.12.2": [[0, 19]], "VULNERABILITY: Remote Code Execution": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48838"}} {"text": "WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WebsiteBaker 2.13.0": [[0, 19]], "VULNERABILITY: Remote Code Execution (RCE)": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50310"}} {"text": "WebsiteBaker v2.13.3 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WebsiteBaker v2.13.3": [[0, 20]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[23, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51349"}} {"text": "WebsiteBaker v2.13.3 - Directory Traversal", "spans": {"SYSTEM: WebsiteBaker v2.13.3": [[0, 20]], "VULNERABILITY: Directory Traversal": [[23, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51554"}} {"text": "WebsiteBaker v2.13.3 - Stored XSS", "spans": {"SYSTEM: WebsiteBaker v2.13.3": [[0, 20]], "VULNERABILITY: XSS": [[30, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51553"}} {"text": "Websvn 2.6.0 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: Websvn 2.6.0": [[0, 12]], "VULNERABILITY: Remote Code Execution": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50042"}} {"text": "Webtareas 2.0 - 'id' SQL Injection", "spans": {"SYSTEM: Webtareas 2.0": [[0, 13]], "VULNERABILITY: SQL Injection": [[21, 34]]}, "info": {"source": "exploitdb", "exploit_id": "47959"}} {"text": "webTareas 2.0.p8 - Arbitrary File Deletion", "spans": {"SYSTEM: webTareas 2.0.p8": [[0, 16]], "VULNERABILITY: Arbitrary File Deletion": [[19, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48430"}} {"text": "Webtareas 2.1p - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: Webtareas 2.1p": [[0, 14]], "VULNERABILITY: Arbitrary File Upload": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48709"}} {"text": "WebTareas 2.4 - Blind SQLi (Authenticated)", "spans": {"SYSTEM: WebTareas 2.4": [[0, 13]], "VULNERABILITY: SQLi": [[22, 26]]}, "info": {"source": "exploitdb", "exploit_id": "50893"}} {"text": "WebTareas 2.4 - RCE (Authorized)", "spans": {"SYSTEM: WebTareas 2.4": [[0, 13]], "VULNERABILITY: RCE": [[16, 19]]}, "info": {"source": "exploitdb", "exploit_id": "51089"}} {"text": "WebTareas 2.4 - Reflected XSS (Unauthorised)", "spans": {"SYSTEM: WebTareas 2.4": [[0, 13]], "VULNERABILITY: XSS": [[26, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51088"}} {"text": "WebTareas 2.4 - SQL Injection (Unauthorised)", "spans": {"SYSTEM: WebTareas 2.4": [[0, 13]], "VULNERABILITY: SQL Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51087"}} {"text": "Webtateas 2.0 - Arbitrary File Read", "spans": {"SYSTEM: Webtateas 2.0": [[0, 13]], "VULNERABILITY: Arbitrary File Read": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48312"}} {"text": "Webutler v3.2 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Webutler v3.2": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51660"}} {"text": "WeGIA 3.5.0 - SQL Injection", "spans": {"SYSTEM: WeGIA 3.5.0": [[0, 11]], "VULNERABILITY: SQL Injection": [[14, 27]]}, "info": {"source": "exploitdb", "exploit_id": "52483"}} {"text": "Wifi Soft Unibox Administration 3.0 & 3.1 - SQL Injection", "spans": {"SYSTEM: Wifi Soft Unibox Administration 3.0 & 3.1": [[0, 41]], "VULNERABILITY: SQL Injection": [[44, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51610"}} {"text": "Wing FTP Server - Authenticated CSRF (Delete Admin)", "spans": {"SYSTEM: Wing FTP Server": [[0, 15]], "VULNERABILITY: CSRF": [[32, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48200"}} {"text": "Winter CMS 1.2.3 - Server-Side Template Injection (SSTI) (Authenticated)", "spans": {"SYSTEM: Winter CMS 1.2.3": [[0, 16]], "VULNERABILITY: SSTI": [[51, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51893"}} {"text": "WinterCMS < 1.2.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WinterCMS < 1.2.3": [[0, 17]], "VULNERABILITY: Persistent Cross-Site Scripting": [[20, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51591"}} {"text": "Wolf CMS 0.8.3.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Wolf CMS 0.8.3.1": [[0, 16]], "VULNERABILITY: Remote Code Execution (RCE)": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51421"}} {"text": "WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting", "spans": {"SYSTEM: WonderCMS 3.1.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49085"}} {"text": "WonderCMS 3.1.3 - 'Menu' Persistent Cross-Site Scripting", "spans": {"SYSTEM: WonderCMS 3.1.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[25, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49164"}} {"text": "WonderCMS 3.1.3 - 'page' Persistent Cross-Site Scripting", "spans": {"SYSTEM: WonderCMS 3.1.3": [[0, 15]], "VULNERABILITY: Persistent Cross-Site Scripting": [[25, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49102"}} {"text": "WonderCMS 3.1.3 - 'uploadFile' Stored Cross-Site Scripting", "spans": {"SYSTEM: WonderCMS 3.1.3": [[0, 15]], "VULNERABILITY: Stored Cross-Site Scripting": [[31, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49109"}} {"text": "WonderCMS 3.1.3 - Authenticated Remote Code Execution", "spans": {"SYSTEM: WonderCMS 3.1.3": [[0, 15]], "VULNERABILITY: Authenticated Remote Code Execution": [[18, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49155"}} {"text": "WonderCMS 3.1.3 - Authenticated SSRF to Remote Remote Code Execution", "spans": {"SYSTEM: WonderCMS 3.1.3": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49154"}} {"text": "WooCommerce v7.1.0 - Remote Code Execution(RCE)", "spans": {"SYSTEM: WooCommerce v7.1.0": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51156"}} {"text": "Wordpress 4.9.6 - Arbitrary File Deletion (Authenticated) (2)", "spans": {"SYSTEM: Wordpress 4.9.6": [[0, 15]], "VULNERABILITY: Arbitrary File Deletion": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50456"}} {"text": "WordPress 5.0.0 - Image Remote Code Execution", "spans": {"SYSTEM: WordPress 5.0.0": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49512"}} {"text": "WordPress 5.7 - 'Media Library' XML External Entity Injection (XXE) (Authenticated)", "spans": {"SYSTEM: WordPress 5.7": [[0, 13]], "VULNERABILITY: XML External Entity Injection": [[32, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50304"}} {"text": "WordPress adivaha Travel Plugin 2.3 - Reflected XSS", "spans": {"SYSTEM: WordPress adivaha Travel Plugin 2.3": [[0, 35]], "VULNERABILITY: XSS": [[48, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51663"}} {"text": "WordPress adivaha Travel Plugin 2.3 - SQL Injection", "spans": {"SYSTEM: WordPress adivaha Travel Plugin 2.3": [[0, 35]], "VULNERABILITY: SQL Injection": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51655"}} {"text": "Wordpress Augmented-Reality - Remote Code Execution Unauthenticated", "spans": {"SYSTEM: Wordpress Augmented-Reality": [[0, 27]], "VULNERABILITY: Remote Code Execution": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51788"}} {"text": "Wordpress Core 5.2.2 - 'post previews' XSS", "spans": {"SYSTEM: Wordpress Core 5.2.2": [[0, 20]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49338"}} {"text": "WordPress Core 5.8.2 - 'WP_Query' SQL Injection", "spans": {"SYSTEM: WordPress Core 5.8.2": [[0, 20]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50663"}} {"text": "WordPress Core 6.2 - Directory Traversal", "spans": {"SYSTEM: WordPress Core 6.2": [[0, 18]], "VULNERABILITY: Directory Traversal": [[21, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52274"}} {"text": "Wordpress Epsilon Framework Multiple Themes - Unauthenticated Function Injection", "spans": {"SYSTEM: Wordpress Epsilon Framework Multiple Themes": [[0, 43]], "VULNERABILITY: Unauthenticated Function Injection": [[46, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49327"}} {"text": "WordPress File Upload Plugin < 4.23.3 - Stored XSS", "spans": {"SYSTEM: WordPress File Upload Plugin < 4.23.3": [[0, 37]], "VULNERABILITY: XSS": [[47, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51899"}} {"text": "Wordpress Plugin - Membership For WooCommerce < v2.1.7 - Arbitrary File Upload to Shell (Unauthenticated)", "spans": {"SYSTEM: Wordpress Plugin - Membership For WooCommerce < v2.1.7": [[0, 54]], "VULNERABILITY: Arbitrary File Upload": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "51959"}} {"text": "Wordpress Plugin 3dady real-time web stats 1.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Wordpress Plugin 3dady real-time web stats 1.0": [[0, 46]], "VULNERABILITY: Stored Cross Site Scripting": [[49, 76]]}, "info": {"source": "exploitdb", "exploit_id": "51021"}} {"text": "Wordpress Plugin 3DPrint Lite 1.9.1.4 - Arbitrary File Upload", "spans": {"SYSTEM: Wordpress Plugin 3DPrint Lite 1.9.1.4": [[0, 37]], "VULNERABILITY: Arbitrary File Upload": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50321"}} {"text": "Wordpress Plugin 404 to 301 2.0.2 - SQL-Injection (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin 404 to 301 2.0.2": [[0, 33]], "VULNERABILITY: SQL-Injection": [[36, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50698"}} {"text": "WordPress Plugin AAWP 3.16 - 'tab' Reflected Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin AAWP 3.16": [[0, 26]], "VULNERABILITY: Cross Site Scripting": [[45, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50643"}} {"text": "WordPress Plugin AccessPress Social Icons 1.8.2 - 'icon title' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin AccessPress Social Icons 1.8.2": [[0, 47]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[63, 96]]}, "info": {"source": "exploitdb", "exploit_id": "50515"}} {"text": "WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - _Dashboard Redirect_ field Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8": [[0, 68]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[98, 131]]}, "info": {"source": "exploitdb", "exploit_id": "51831"}} {"text": "WordPress Plugin admin-word-count-column 2.2 - Local File Read", "spans": {"SYSTEM: WordPress Plugin admin-word-count-column 2.2": [[0, 44]], "VULNERABILITY: Local File Read": [[47, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50845"}} {"text": "WordPress Plugin Adning Advertising 1.5.5 - Arbitrary File Upload", "spans": {"SYSTEM: WordPress Plugin Adning Advertising 1.5.5": [[0, 41]], "VULNERABILITY: Arbitrary File Upload": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49332"}} {"text": "WordPress Plugin Advanced Order Export For WooCommerce 3.1.7 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Advanced Order Export For WooCommerce 3.1.7": [[0, 60]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[63, 99]]}, "info": {"source": "exploitdb", "exploit_id": "50324"}} {"text": "WordPress Plugin Advanced Uploader 4.2 - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Advanced Uploader 4.2": [[0, 38]], "VULNERABILITY: Arbitrary File Upload": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50895"}} {"text": "WordPress Plugin Ajax Load More 5.3.1 - '#1' Authenticated SQL Injection", "spans": {"SYSTEM: WordPress Plugin Ajax Load More 5.3.1": [[0, 37]], "VULNERABILITY: SQL Injection": [[59, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48475"}} {"text": "Wordpress Plugin Alemha Watermarker 1.3.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Wordpress Plugin Alemha Watermarker 1.3.1": [[0, 41]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[44, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51966"}} {"text": "WordPress Plugin All-in-One Video Gallery plugin 2.4.9 - Local File Inclusion (LFI)", "spans": {"SYSTEM: WordPress Plugin All-in-One Video Gallery plugin 2.4.9": [[0, 54]], "VULNERABILITY: Local File Inclusion": [[57, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50562"}} {"text": "WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated", "spans": {"SYSTEM: WordPress Plugin amministrazione-aperta 3.7.3": [[0, 45]], "VULNERABILITY: Local File Read - Unauthenticated": [[48, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50838"}} {"text": "WordPress Plugin Anti-Malware Security and Bruteforce Firewall 4.20.59 - Directory Traversal", "spans": {"SYSTEM: WordPress Plugin Anti-Malware Security and Bruteforce Firewall 4.20.59": [[0, 70]], "VULNERABILITY: Directory Traversal": [[73, 92]]}, "info": {"source": "exploitdb", "exploit_id": "50107"}} {"text": "WordPress Plugin AN_Gradebook 5.0.1 - SQLi", "spans": {"SYSTEM: WordPress Plugin AN_Gradebook 5.0.1": [[0, 35]], "VULNERABILITY: SQLi": [[38, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51632"}} {"text": "WordPress Plugin Appointment Booking Calendar 1.3.34 - CSV Injection", "spans": {"SYSTEM: WordPress Plugin Appointment Booking Calendar 1.3.34": [[0, 52]], "VULNERABILITY: CSV Injection": [[55, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48204"}} {"text": "Wordpress Plugin Autoptimize 2.7.6 - Arbitrary File Upload (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin Autoptimize 2.7.6": [[0, 34]], "VULNERABILITY: Arbitrary File Upload": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48770"}} {"text": "WordPress Plugin Autoptimize 2.7.6 - Authenticated Arbitrary File Upload (Metasploit)", "spans": {"SYSTEM: WordPress Plugin Autoptimize 2.7.6": [[0, 34]], "VULNERABILITY: Arbitrary File Upload": [[51, 72]], "TOOL: Metasploit": [[74, 84]]}, "info": {"source": "exploitdb", "exploit_id": "49399"}} {"text": "Wordpress Plugin Background Image Cropper v1.2 - Remote Code Execution", "spans": {"SYSTEM: Wordpress Plugin Background Image Cropper v1.2": [[0, 46]], "VULNERABILITY: Remote Code Execution": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51998"}} {"text": "WordPress Plugin Backup and Restore 1.0.3 - Arbitrary File Deletion", "spans": {"SYSTEM: WordPress Plugin Backup and Restore 1.0.3": [[0, 41]], "VULNERABILITY: Arbitrary File Deletion": [[44, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50503"}} {"text": "Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin Backup Guard 1.5.8": [[0, 35]], "VULNERABILITY: Remote Code Execution": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50093"}} {"text": "WordPress Plugin Backup Migration 1.2.8 - Unauthenticated Database Backup", "spans": {"SYSTEM: WordPress Plugin Backup Migration 1.2.8": [[0, 39]], "VULNERABILITY: Unauthenticated Database Backup": [[42, 73]]}, "info": {"source": "exploitdb", "exploit_id": "51445"}} {"text": "WordPress Plugin BBPress 2.5 - Unauthenticated Privilege Escalation", "spans": {"SYSTEM: WordPress Plugin BBPress 2.5": [[0, 28]], "VULNERABILITY: Privilege Escalation": [[47, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48534"}} {"text": "WordPress Plugin Blue Admin 21.06.01 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: WordPress Plugin Blue Admin 21.06.01": [[0, 36]], "VULNERABILITY: CSRF": [[67, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50925"}} {"text": "WordPress Plugin Buddypress 6.2.0 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin Buddypress 6.2.0": [[0, 33]], "VULNERABILITY: Persistent Cross-Site Scripting": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49061"}} {"text": "Wordpress Plugin BulletProof Security 5.1 - Sensitive Information Disclosure", "spans": {"SYSTEM: Wordpress Plugin BulletProof Security 5.1": [[0, 41]], "VULNERABILITY: Information Disclosure": [[54, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50382"}} {"text": "WordPress Plugin cab-fare-calculator 1.0.3 - Local File Inclusion", "spans": {"SYSTEM: WordPress Plugin cab-fare-calculator 1.0.3": [[0, 42]], "VULNERABILITY: Local File Inclusion": [[45, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50843"}} {"text": "Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)", "spans": {"SYSTEM: Wordpress Plugin Canto < 3.0.5": [[0, 30]], "VULNERABILITY: Remote Code Execution (RCE)": [[65, 92]]}, "info": {"source": "exploitdb", "exploit_id": "51826"}} {"text": "Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin Catch Themes Demo Import 1.6.1": [[0, 47]], "VULNERABILITY: Remote Code Execution (RCE)": [[50, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50580"}} {"text": "WordPress Plugin ChopSlider 3.4 - 'id' SQL Injection", "spans": {"SYSTEM: WordPress Plugin ChopSlider 3.4": [[0, 31]], "VULNERABILITY: SQL Injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48457"}} {"text": "WordPress Plugin Contact Form 1.7.14 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Contact Form 1.7.14": [[0, 36]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[39, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50344"}} {"text": "WordPress Plugin Contact Form Builder 1.6.1 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Contact Form Builder 1.6.1": [[0, 43]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[46, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50734"}} {"text": "WordPress Plugin Contact Form Check Tester 1.0.2 - Broken Access Control", "spans": {"SYSTEM: WordPress Plugin Contact Form Check Tester 1.0.2": [[0, 48]], "VULNERABILITY: Broken Access Control": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50703"}} {"text": "WordPress Plugin Contact Form Entries 1.1.6 - Cross Site Scripting (XSS) (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Contact Form Entries 1.1.6": [[0, 43]], "VULNERABILITY: Cross Site Scripting": [[46, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50617"}} {"text": "WordPress Plugin Contact Form to Email 1.3.24 - Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Contact Form to Email 1.3.24": [[0, 45]], "VULNERABILITY: Stored Cross Site Scripting": [[48, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50524"}} {"text": "WordPress Plugin contact-form-7 5.1.6 - Remote File Upload", "spans": {"SYSTEM: WordPress Plugin contact-form-7 5.1.6": [[0, 37]], "VULNERABILITY: File Upload": [[47, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48062"}} {"text": "WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Cookie Law Bar 1.2.1": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[54, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49905"}} {"text": "WordPress Plugin CP Blocks 1.0.14 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin CP Blocks 1.0.14": [[0, 33]], "VULNERABILITY: Stored Cross Site Scripting": [[36, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50724"}} {"text": "WordPress Plugin Current Book 1.0.1 - 'Book Title' Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin Current Book 1.0.1": [[0, 35]], "VULNERABILITY: Persistent Cross-Site Scripting": [[51, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50127"}} {"text": "WordPress Plugin Curtain 1.0.2 - Cross-site Request Forgery (CSRF)", "spans": {"SYSTEM: WordPress Plugin Curtain 1.0.2": [[0, 30]], "VULNERABILITY: CSRF": [[61, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50842"}} {"text": "WordPress Plugin Custom Global Variables 1.0.5 - 'name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Custom Global Variables 1.0.5": [[0, 46]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[56, 89]]}, "info": {"source": "exploitdb", "exploit_id": "49406"}} {"text": "WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification", "spans": {"SYSTEM: WordPress Plugin Custom Searchable Data System": [[0, 46]], "VULNERABILITY: Unauthenticated Data M]odification": [[49, 83]]}, "info": {"source": "exploitdb", "exploit_id": "48213"}} {"text": "WordPress Plugin Database Backups 1.2.2.6 - 'Database Backup Download' CSRF", "spans": {"SYSTEM: WordPress Plugin Database Backups 1.2.2.6": [[0, 41]], "VULNERABILITY: CSRF": [[71, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49984"}} {"text": "WordPress Plugin Delightful Downloads Jquery File Tree 1.6.6 - Path Traversal", "spans": {"SYSTEM: WordPress Plugin Delightful Downloads Jquery File Tree 1.6.6": [[0, 60]], "VULNERABILITY: Path Traversal": [[63, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49693"}} {"text": "WordPress Plugin Domain Check 1.0.16 - Reflected Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Domain Check 1.0.16": [[0, 36]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[39, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50697"}} {"text": "Wordpress Plugin Download From Files 1.48 - Arbitrary File Upload", "spans": {"SYSTEM: Wordpress Plugin Download From Files 1.48": [[0, 41]], "VULNERABILITY: Arbitrary File Upload": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50287"}} {"text": "Wordpress Plugin Download Monitor WordPress V 4.4.4 - SQL Injection (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin Download Monitor WordPress V 4.4.4": [[0, 51]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50695"}} {"text": "WordPress Plugin Drag and Drop File Upload Contact Form 1.3.3.2 - Remote Code Execution", "spans": {"SYSTEM: WordPress Plugin Drag and Drop File Upload Contact Form 1.3.3.2": [[0, 63]], "VULNERABILITY: Remote Code Execution": [[66, 87]]}, "info": {"source": "exploitdb", "exploit_id": "48520"}} {"text": "WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Duplicate Page 4.4.1": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[40, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50256"}} {"text": "Wordpress Plugin Duplicator 1.3.26 - Unauthenticated Arbitrary File Read", "spans": {"SYSTEM: Wordpress Plugin Duplicator 1.3.26": [[0, 34]], "VULNERABILITY: Arbitrary File Read": [[53, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50420"}} {"text": "Wordpress Plugin Duplicator 1.3.26 - Unauthenticated Arbitrary File Read (Metasploit)", "spans": {"SYSTEM: Wordpress Plugin Duplicator 1.3.26": [[0, 34]], "VULNERABILITY: Arbitrary File Read": [[53, 72]], "TOOL: Metasploit": [[74, 84]]}, "info": {"source": "exploitdb", "exploit_id": "49288"}} {"text": "WordPress Plugin Duplicator 1.4.6 - Unauthenticated Backup Download", "spans": {"SYSTEM: WordPress Plugin Duplicator 1.4.6": [[0, 33]], "VULNERABILITY: Unauthenticated Backup Download": [[36, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50992"}} {"text": "WordPress Plugin Duplicator 1.4.7 - Information Disclosure", "spans": {"SYSTEM: WordPress Plugin Duplicator 1.4.7": [[0, 33]], "VULNERABILITY: Information Disclosure": [[36, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50993"}} {"text": "WordPress Plugin Duplicator < 1.5.7.1 - Unauthenticated Sensitive Data Exposure to Account Takeover", "spans": {"SYSTEM: WordPress Plugin Duplicator < 1.5.7.1": [[0, 37]], "VULNERABILITY: Unauthenticated Sensitive Data Exposure to Account Takeover": [[40, 99]]}, "info": {"source": "exploitdb", "exploit_id": "51874"}} {"text": "WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin DZS Zoomsounds 6.45": [[0, 36]], "VULNERABILITY: Arbitrary File Read": [[39, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50564"}} {"text": "WordPress Plugin dzs-zoomsounds 6.60 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin dzs-zoomsounds 6.60": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50753"}} {"text": "WordPress Plugin Easy Contact Form 1.1.7 - 'Name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Easy Contact Form 1.1.7": [[0, 40]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[50, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49427"}} {"text": "WordPress Plugin Easy Cookie Policy 1.6.2 - Broken Access Control to Stored XSS", "spans": {"SYSTEM: WordPress Plugin Easy Cookie Policy 1.6.2": [[0, 41]], "VULNERABILITY: XSS": [[76, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50849"}} {"text": "Wordpress Plugin Elementor 3.5.5 - Iframe Injection", "spans": {"SYSTEM: Wordpress Plugin Elementor 3.5.5": [[0, 32]], "VULNERABILITY: Iframe Injection": [[35, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51716"}} {"text": "WordPress Plugin Elementor 3.6.2 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Elementor 3.6.2": [[0, 32]], "VULNERABILITY: Remote Code Execution (RCE)": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50882"}} {"text": "WordPress Plugin Email Subscribers & Newsletters 4.2.2 - 'hash' SQL Injection (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Email Subscribers & Newsletters 4.2.2": [[0, 54]], "VULNERABILITY: SQL Injection": [[64, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48699"}} {"text": "WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download", "spans": {"SYSTEM: WordPress Plugin Email Subscribers & Newsletters 4.2.2": [[0, 54]], "VULNERABILITY: Unauthenticated File Download": [[57, 86]]}, "info": {"source": "exploitdb", "exploit_id": "48698"}} {"text": "WordPress Plugin Error Log Viewer 1.1.1 - Arbitrary File Clearing (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Error Log Viewer 1.1.1": [[0, 39]], "VULNERABILITY: Arbitrary File Clearing": [[42, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50746"}} {"text": "Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: Wordpress Plugin EventON Calendar 3.0.5": [[0, 39]], "VULNERABILITY: Reflected Cross-Site Scripting": [[42, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49130"}} {"text": "Wordpress Plugin EventON Calendar 4.4 - Unauthenticated Event Access", "spans": {"SYSTEM: Wordpress Plugin EventON Calendar 4.4": [[0, 37]], "VULNERABILITY: Unauthenticated Event Access": [[40, 68]]}, "info": {"source": "exploitdb", "exploit_id": "51658"}} {"text": "Wordpress Plugin EventON Calendar 4.4 - Unauthenticated Post Access via IDOR", "spans": {"SYSTEM: Wordpress Plugin EventON Calendar 4.4": [[0, 37]], "VULNERABILITY: IDOR": [[72, 76]]}, "info": {"source": "exploitdb", "exploit_id": "51659"}} {"text": "WordPress Plugin Filterable Portfolio Gallery 1.0 - 'title' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Filterable Portfolio Gallery 1.0": [[0, 49]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[60, 93]]}, "info": {"source": "exploitdb", "exploit_id": "50458"}} {"text": "WordPress Plugin Fitness Calculators 1.9.5 - Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: WordPress Plugin Fitness Calculators 1.9.5": [[0, 42]], "VULNERABILITY: CSRF": [[73, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50325"}} {"text": "WordPress Plugin Form Maker 5.4.1 - 's' SQL Injection (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Form Maker 5.4.1": [[0, 33]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48509"}} {"text": "WordPress Plugin Forminator 1.24.6 - Unauthenticated Remote Command Execution", "spans": {"SYSTEM: WordPress Plugin Forminator 1.24.6": [[0, 34]], "VULNERABILITY: Remote Command Execution": [[53, 77]]}, "info": {"source": "exploitdb", "exploit_id": "51664"}} {"text": "WordPress Plugin Frontend Uploader 1.3.2 - Stored Cross Site Scripting (XSS) (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Frontend Uploader 1.3.2": [[0, 40]], "VULNERABILITY: Stored Cross Site Scripting": [[43, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50655"}} {"text": "Wordpress Plugin Good LMS 2.1.4 - 'id' Unauthenticated SQL Injection", "spans": {"SYSTEM: Wordpress Plugin Good LMS 2.1.4": [[0, 31]], "VULNERABILITY: SQL Injection": [[55, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49033"}} {"text": "WordPress Plugin Helpful 2.4.11 - SQL Injection", "spans": {"SYSTEM: WordPress Plugin Helpful 2.4.11": [[0, 31]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48307"}} {"text": "WordPress Plugin Hotel Listing 3 - 'Multiple' Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Hotel Listing 3": [[0, 32]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[46, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50476"}} {"text": "WordPress Plugin HS Brand Logo Slider 2.1 - 'logoupload' File Upload", "spans": {"SYSTEM: WordPress Plugin HS Brand Logo Slider 2.1": [[0, 41]], "VULNERABILITY: File Upload": [[57, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48913"}} {"text": "Wordpress Plugin ImageMagick-Engine 1.7.4 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin ImageMagick-Engine 1.7.4": [[0, 41]], "VULNERABILITY: Remote Code Execution (RCE)": [[44, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51025"}} {"text": "WordPress Plugin InfiniteWP - Client Authentication Bypass (Metasploit)", "spans": {"SYSTEM: WordPress Plugin InfiniteWP": [[0, 27]], "VULNERABILITY: Authentication Bypass": [[37, 58]], "TOOL: Metasploit": [[60, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48047"}} {"text": "WordPress Plugin InfiniteWP Client 1.9.4.5 - Authentication Bypass", "spans": {"SYSTEM: WordPress Plugin InfiniteWP Client 1.9.4.5": [[0, 42]], "VULNERABILITY: Authentication Bypass": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "47939"}} {"text": "WordPress Plugin International Sms For Contact Form 7 Integration V1.2 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin International Sms For Contact Form 7 Integration V1.2": [[0, 70]], "VULNERABILITY: Cross Site Scripting": [[73, 93]]}, "info": {"source": "exploitdb", "exploit_id": "50719"}} {"text": "WordPress Plugin IP2Location Country Blocker 2.26.7 - Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin IP2Location Country Blocker 2.26.7": [[0, 51]], "VULNERABILITY: Stored Cross Site Scripting": [[54, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50709"}} {"text": "Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin iQ Block Country 1.2.13": [[0, 40]], "VULNERABILITY: Arbitrary File Deletion": [[43, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50830"}} {"text": "WordPress Plugin Jetpack 9.1 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Jetpack 9.1": [[0, 28]], "VULNERABILITY: Cross Site Scripting": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50735"}} {"text": "WordPress Plugin KN Fix Your Title 1.0.1 - 'Separator' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin KN Fix Your Title 1.0.1": [[0, 40]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[55, 88]]}, "info": {"source": "exploitdb", "exploit_id": "50143"}} {"text": "WordPress Plugin LearnDash LMS 3.1.2 - Reflective Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin LearnDash LMS 3.1.2": [[0, 36]], "VULNERABILITY: Cross-Site Scripting": [[50, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48030"}} {"text": "WordPress Plugin LearnPress 3.2.6.7 - 'current_items' SQL Injection (Authenticated)", "spans": {"SYSTEM: WordPress Plugin LearnPress 3.2.6.7": [[0, 35]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50137"}} {"text": "WordPress Plugin LearnPress 3.2.6.8 - Privilege Escalation", "spans": {"SYSTEM: WordPress Plugin LearnPress 3.2.6.8": [[0, 35]], "VULNERABILITY: Privilege Escalation": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50138"}} {"text": "WordPress Plugin Learnpress 4.1.4.1 - Arbitrary Image Renaming", "spans": {"SYSTEM: WordPress Plugin Learnpress 4.1.4.1": [[0, 35]], "VULNERABILITY: Arbitrary Image Renaming": [[38, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50706"}} {"text": "WordPress Plugin LifterLMS 4.21.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin LifterLMS 4.21.0": [[0, 33]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[36, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49912"}} {"text": "WordPress Plugin litespeed cache 3.6 - 'server_ip' Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin litespeed cache 3.6": [[0, 36]], "VULNERABILITY: Cross-Site Scripting": [[51, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49374"}} {"text": "WordPress Plugin Mail Masta 1.0 - Local File Inclusion (2)", "spans": {"SYSTEM: WordPress Plugin Mail Masta 1.0": [[0, 31]], "VULNERABILITY: Local File Inclusion": [[34, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50226"}} {"text": "Wordpress Plugin Maintenance Mode by SeedProd 5.1.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Wordpress Plugin Maintenance Mode by SeedProd 5.1.1": [[0, 51]], "VULNERABILITY: Persistent Cross-Site Scripting": [[54, 85]]}, "info": {"source": "exploitdb", "exploit_id": "48724"}} {"text": "Wordpress Plugin Masterstudy LMS - 3.0.17 - Unauthenticated Instructor Account Creation", "spans": {"SYSTEM: Wordpress Plugin Masterstudy LMS": [[0, 32]], "VULNERABILITY: 3.0.17 - Unauthenticated Instructor Account Creation": [[35, 87]]}, "info": {"source": "exploitdb", "exploit_id": "51735"}} {"text": "WordPress Plugin MasterStudy LMS 2.7.5 - Unauthenticated Admin Account Creation", "spans": {"SYSTEM: WordPress Plugin MasterStudy LMS 2.7.5": [[0, 38]], "VULNERABILITY: Unauthenticated Admin Account Creation": [[41, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50752"}} {"text": "WordPress Plugin Media Library Assistant 2.81 - Local File Inclusion", "spans": {"SYSTEM: WordPress Plugin Media Library Assistant 2.81": [[0, 45]], "VULNERABILITY: Local File Inclusion": [[48, 68]]}, "info": {"source": "exploitdb", "exploit_id": "48315"}} {"text": "WordPress Plugin Media-Tags 3.2.0.2 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Media-Tags 3.2.0.2": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[38, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50454"}} {"text": "WordPress Plugin Mimetic Books 0.2.13 - 'Default Publisher ID field' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Mimetic Books 0.2.13": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[69, 102]]}, "info": {"source": "exploitdb", "exploit_id": "50139"}} {"text": "Wordpress Plugin Modern Events Calendar 5.16.2 - Event export (Unauthenticated)", "spans": {"SYSTEM: Wordpress Plugin Modern Events Calendar 5.16.2": [[0, 46]], "VULNERABILITY: Event export": [[49, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50084"}} {"text": "Wordpress Plugin Modern Events Calendar 5.16.2 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin Modern Events Calendar 5.16.2": [[0, 46]], "VULNERABILITY: Remote Code Execution": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50082"}} {"text": "WordPress Plugin Modern Events Calendar V 6.1 - SQL Injection (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Modern Events Calendar V 6.1": [[0, 45]], "VULNERABILITY: SQL Injection": [[48, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50687"}} {"text": "WordPress Plugin Mortgage Calculators WP 1.52 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Mortgage Calculators WP 1.52": [[0, 45]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[48, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50685"}} {"text": "WordPress Plugin Motopress Hotel Booking Lite 4.2.4 - SQL Injection", "spans": {"SYSTEM: WordPress Plugin Motopress Hotel Booking Lite 4.2.4": [[0, 51]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50869"}} {"text": "WordPress Plugin Motopress Hotel Booking Lite 4.2.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Motopress Hotel Booking Lite 4.2.4": [[0, 51]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[54, 87]]}, "info": {"source": "exploitdb", "exploit_id": "50951"}} {"text": "Wordpress Plugin MStore API 2.0.6 - Arbitrary File Upload", "spans": {"SYSTEM: Wordpress Plugin MStore API 2.0.6": [[0, 33]], "VULNERABILITY: Arbitrary File Upload": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50379"}} {"text": "WordPress Plugin Multi-Scheduler 1.0.0 - Cross-Site Request Forgery (Delete User)", "spans": {"SYSTEM: WordPress Plugin Multi-Scheduler 1.0.0": [[0, 38]], "VULNERABILITY: Cross-Site Request Forgery": [[41, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48532"}} {"text": "WordPress Plugin Netroics Blog Posts Grid 1.0 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Netroics Blog Posts Grid 1.0": [[0, 45]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[48, 81]]}, "info": {"source": "exploitdb", "exploit_id": "51008"}} {"text": "WordPress Plugin Ninja Forms 3.6.25 - Reflected XSS", "spans": {"SYSTEM: WordPress Plugin Ninja Forms 3.6.25": [[0, 35]], "VULNERABILITY: XSS": [[48, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51644"}} {"text": "WordPress Plugin Ninja Tables 4.1.7 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Ninja Tables 4.1.7": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[38, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50455"}} {"text": "WordPress Plugin Payments Plugin | GetPaid 2.4.6 - HTML Injection", "spans": {"SYSTEM: WordPress Plugin Payments Plugin | GetPaid 2.4.6": [[0, 48]], "VULNERABILITY: HTML Injection": [[51, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50246"}} {"text": "WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Perfect Survey - 1.5.1": [[0, 39]], "VULNERABILITY: SQLi": [[42, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50766"}} {"text": "WordPress Plugin Picture Gallery 1.4.2 - 'Edit Content URL' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Picture Gallery 1.4.2": [[0, 38]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[60, 93]]}, "info": {"source": "exploitdb", "exploit_id": "50187"}} {"text": "Wordpress Plugin PicUploader 1.0 - Remote File Upload", "spans": {"SYSTEM: Wordpress Plugin PicUploader 1.0": [[0, 32]], "VULNERABILITY: File Upload": [[42, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48238"}} {"text": "WordPress Plugin Pie Register 3.7.1.4 - Admin Privilege Escalation (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Pie Register 3.7.1.4": [[0, 37]], "VULNERABILITY: Privilege Escalation": [[46, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50395"}} {"text": "WordPress Plugin Plainview Activity Monitor 20161228 - Remote Code Execution (RCE) (Authenticated) (2)", "spans": {"SYSTEM: WordPress Plugin Plainview Activity Monitor 20161228": [[0, 52]], "VULNERABILITY: Remote Code Execution (RCE)": [[55, 82]]}, "info": {"source": "exploitdb", "exploit_id": "50110"}} {"text": "Wordpress Plugin Playlist for Youtube 1.32 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Wordpress Plugin Playlist for Youtube 1.32": [[0, 42]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[45, 78]]}, "info": {"source": "exploitdb", "exploit_id": "51981"}} {"text": "WordPress Plugin Poll_ Survey_ Questionnaire and Voting system 1.5.2 - 'date_answers' Blind SQL Injection", "spans": {"SYSTEM: WordPress Plugin Poll_ Survey_ Questionnaire and Voting system 1.5.2": [[0, 68]], "VULNERABILITY: SQL Injection": [[92, 105]]}, "info": {"source": "exploitdb", "exploit_id": "50052"}} {"text": "WordPress Plugin Popular Posts 5.3.2 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Popular Posts 5.3.2": [[0, 36]], "VULNERABILITY: Remote Code Execution (RCE)": [[39, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50129"}} {"text": "WordPress Plugin Popup 1.10.4 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Popup 1.10.4": [[0, 29]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[32, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50346"}} {"text": "WordPress Plugin Popup Anything 2.0.3 - 'Multiple' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Popup Anything 2.0.3": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[51, 84]]}, "info": {"source": "exploitdb", "exploit_id": "50479"}} {"text": "WordPress Plugin Popup Builder 3.69.6 - Multiple Stored Cross Site Scripting", "spans": {"SYSTEM: WordPress Plugin Popup Builder 3.69.6": [[0, 37]], "VULNERABILITY: Stored Cross Site Scripting": [[49, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49231"}} {"text": "WordPress Plugin Popup Maker 1.16.5 - Stored Cross-Site Scripting (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Popup Maker 1.16.5": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting": [[38, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50876"}} {"text": "WordPress Plugin Post Grid 2.1.1 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Post Grid 2.1.1": [[0, 32]], "VULNERABILITY: Cross Site Scripting": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50705"}} {"text": "WordPress Plugin Postie 1.9.40 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin Postie 1.9.40": [[0, 30]], "VULNERABILITY: Persistent Cross-Site Scripting": [[33, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47925"}} {"text": "Wordpress Plugin Powie's WHOIS Domain Check 0.9.31 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: Wordpress Plugin Powie's WHOIS Domain Check 0.9.31": [[0, 50]], "VULNERABILITY: Persistent Cross-Site Scripting": [[53, 84]]}, "info": {"source": "exploitdb", "exploit_id": "48656"}} {"text": "WordPress Plugin Product Slider for WooCommerce 1.13.21 - Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Product Slider for WooCommerce 1.13.21": [[0, 55]], "VULNERABILITY: Cross Site Scripting": [[58, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50704"}} {"text": "WordPress Plugin ProfilePress 3.1.3 - Privilege Escalation (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin ProfilePress 3.1.3": [[0, 35]], "VULNERABILITY: Privilege Escalation": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50242"}} {"text": "WordPress Plugin ReDi Restaurant Reservation 21.0307 - 'Comment' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin ReDi Restaurant Reservation 21.0307": [[0, 52]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[65, 98]]}, "info": {"source": "exploitdb", "exploit_id": "49903"}} {"text": "WordPress Plugin Redirect 404 to Parent 1.3.0 - Reflected Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin Redirect 404 to Parent 1.3.0": [[0, 45]], "VULNERABILITY: Reflected Cross-Site Scripting": [[48, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50350"}} {"text": "WordPress Plugin RegistrationMagic V 5.0.1.5 - SQL Injection (Authenticated)", "spans": {"SYSTEM: WordPress Plugin RegistrationMagic V 5.0.1.5": [[0, 44]], "VULNERABILITY: SQL Injection": [[47, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50686"}} {"text": "WordPress Plugin Rest Google Maps < 7.11.18 - SQL Injection", "spans": {"SYSTEM: WordPress Plugin Rest Google Maps < 7.11.18": [[0, 43]], "VULNERABILITY: SQL Injection": [[46, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48918"}} {"text": "WordPress Plugin RSS for Yandex Turbo 1.29 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin RSS for Yandex Turbo 1.29": [[0, 42]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[45, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49778"}} {"text": "WordPress Plugin Search Meter 2.13.2 - CSV injection", "spans": {"SYSTEM: WordPress Plugin Search Meter 2.13.2": [[0, 36]], "VULNERABILITY: CSV injection": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48197"}} {"text": "WordPress Plugin Secure Copy Content Protection and Content Locking 2.8.1 - SQL-Injection (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin Secure Copy Content Protection and Content Locking 2.8.1": [[0, 73]], "VULNERABILITY: SQL-Injection": [[76, 89]]}, "info": {"source": "exploitdb", "exploit_id": "50733"}} {"text": "WordPress Plugin Security Audit 1.0.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Security Audit 1.0.0": [[0, 37]], "VULNERABILITY: Stored Cross Site Scripting": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50723"}} {"text": "WordPress Plugin Select All Categories and Taxonomies 1.3.1 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Select All Categories and Taxonomies 1.3.1": [[0, 59]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[62, 98]]}, "info": {"source": "exploitdb", "exploit_id": "50349"}} {"text": "WordPress Plugin Simple File List 4.2.2 - Arbitrary File Upload", "spans": {"SYSTEM: WordPress Plugin Simple File List 4.2.2": [[0, 39]], "VULNERABILITY: Arbitrary File Upload": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48979"}} {"text": "WordPress Plugin Simple File List 4.2.2 - Remote Code Execution", "spans": {"SYSTEM: WordPress Plugin Simple File List 4.2.2": [[0, 39]], "VULNERABILITY: Remote Code Execution": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48449"}} {"text": "Wordpress Plugin Simple Job Board 2.9.3 - Authenticated File Read (Metasploit)", "spans": {"SYSTEM: Wordpress Plugin Simple Job Board 2.9.3": [[0, 39]], "VULNERABILITY: Authenticated File Read": [[42, 65]], "TOOL: Metasploit": [[67, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49450"}} {"text": "Wordpress Plugin Simple Job Board 2.9.3 - Local File Inclusion", "spans": {"SYSTEM: Wordpress Plugin Simple Job Board 2.9.3": [[0, 39]], "VULNERABILITY: Local File Inclusion": [[42, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50721"}} {"text": "WordPress Plugin Simple Post 1.1 - 'Text field' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Simple Post 1.1": [[0, 32]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[48, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50150"}} {"text": "WordPress Plugin Slider by Soliloquy 2.6.2 - 'title' Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Slider by Soliloquy 2.6.2": [[0, 42]], "VULNERABILITY: Stored Cross Site Scripting": [[53, 80]]}, "info": {"source": "exploitdb", "exploit_id": "50563"}} {"text": "Wordpress Plugin Smart Product Review 1.0.4 - Arbitrary File Upload", "spans": {"SYSTEM: Wordpress Plugin Smart Product Review 1.0.4": [[0, 43]], "VULNERABILITY: Arbitrary File Upload": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50533"}} {"text": "WordPress Plugin Smart Slider-3 3.5.0.8 - 'name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Smart Slider-3 3.5.0.8": [[0, 39]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49958"}} {"text": "Wordpress Plugin SP Project & Document Manager 4.21 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin SP Project & Document Manager 4.21": [[0, 51]], "VULNERABILITY: Remote Code Execution (RCE)": [[54, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50115"}} {"text": "WordPress Plugin stafflist 3.1.2 - SQLi (Authenticated)", "spans": {"SYSTEM: WordPress Plugin stafflist 3.1.2": [[0, 32]], "VULNERABILITY: SQLi": [[35, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50928"}} {"text": "WordPress Plugin Stop Spammers 2021.8 - 'log' Reflected Cross-site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Stop Spammers 2021.8": [[0, 37]], "VULNERABILITY: XSS": [[78, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49880"}} {"text": "WordPress Plugin Stripe Payments 2.0.39 - 'AcceptStripePayments-settings[currency_code]' Stored XSS", "spans": {"SYSTEM: WordPress Plugin Stripe Payments 2.0.39": [[0, 39]], "VULNERABILITY: XSS": [[96, 99]]}, "info": {"source": "exploitdb", "exploit_id": "49354"}} {"text": "WordPress Plugin Strong Testimonials 2.40.1 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin Strong Testimonials 2.40.1": [[0, 43]], "VULNERABILITY: Persistent Cross-Site Scripting": [[46, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48076"}} {"text": "WordPress Plugin SuperForms 4.9 - Arbitrary File Upload", "spans": {"SYSTEM: WordPress Plugin SuperForms 4.9": [[0, 31]], "VULNERABILITY: Arbitrary File Upload": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49490"}} {"text": "WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion", "spans": {"SYSTEM: WordPress Plugin Supsystic Backup 2.3.9": [[0, 39]], "VULNERABILITY: Local File Inclusion": [[42, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49545"}} {"text": "WordPress Plugin Supsystic Contact Form 1.7.18 - 'label' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Supsystic Contact Form 1.7.18": [[0, 47]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[58, 91]]}, "info": {"source": "exploitdb", "exploit_id": "50460"}} {"text": "WordPress Plugin Supsystic Contact Form 1.7.5 - Multiple Vulnerabilities", "spans": {"SYSTEM: WordPress Plugin Supsystic Contact Form 1.7.5": [[0, 45]], "VULNERABILITY: Multiple Vulnerabilities": [[48, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49544"}} {"text": "WordPress Plugin Supsystic Data Tables Generator 1.9.96 - Multiple Vulnerabilities", "spans": {"SYSTEM: WordPress Plugin Supsystic Data Tables Generator 1.9.96": [[0, 55]], "VULNERABILITY: Multiple Vulnerabilities": [[58, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49543"}} {"text": "WordPress Plugin Supsystic Digital Publications 1.6.9 - Multiple Vulnerabilities", "spans": {"SYSTEM: WordPress Plugin Supsystic Digital Publications 1.6.9": [[0, 53]], "VULNERABILITY: Multiple Vulnerabilities": [[56, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49542"}} {"text": "WordPress Plugin Supsystic Membership 1.4.7 - 'sidx' SQL injection", "spans": {"SYSTEM: WordPress Plugin Supsystic Membership 1.4.7": [[0, 43]], "VULNERABILITY: SQL injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49540"}} {"text": "WordPress Plugin Supsystic Newsletter 1.5.5 - 'sidx' SQL injection", "spans": {"SYSTEM: WordPress Plugin Supsystic Newsletter 1.5.5": [[0, 43]], "VULNERABILITY: SQL injection": [[53, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49539"}} {"text": "WordPress Plugin Supsystic Pricing Table 1.8.7 - Multiple Vulnerabilities", "spans": {"SYSTEM: WordPress Plugin Supsystic Pricing Table 1.8.7": [[0, 46]], "VULNERABILITY: Multiple Vulnerabilities": [[49, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49533"}} {"text": "WordPress Plugin Supsystic Ultimate Maps 1.1.12 - 'sidx' SQL injection", "spans": {"SYSTEM: WordPress Plugin Supsystic Ultimate Maps 1.1.12": [[0, 47]], "VULNERABILITY: SQL injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49532"}} {"text": "WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)", "spans": {"SYSTEM: WordPress Plugin Survey & Poll 1.5.7.3": [[0, 38]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50269"}} {"text": "WordPress Plugin TablePress 1.14 - CSV Injection", "spans": {"SYSTEM: WordPress Plugin TablePress 1.14": [[0, 32]], "VULNERABILITY: CSV Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50270"}} {"text": "WordPress Plugin TaxoPress 3.0.7.1 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin TaxoPress 3.0.7.1": [[0, 34]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[37, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50442"}} {"text": "WordPress Plugin Testimonial Slider and Showcase 2.2.6 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Testimonial Slider and Showcase 2.2.6": [[0, 54]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[57, 90]]}, "info": {"source": "exploitdb", "exploit_id": "51007"}} {"text": "WordPress Plugin The True Ranker 2.2.2 - Arbitrary File Read (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin The True Ranker 2.2.2": [[0, 38]], "VULNERABILITY: Arbitrary File Read": [[41, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50624"}} {"text": "Wordpress Plugin TheCartPress 1.5.3.6 - Privilege Escalation (Unauthenticated)", "spans": {"SYSTEM: Wordpress Plugin TheCartPress 1.5.3.6": [[0, 37]], "VULNERABILITY: Privilege Escalation": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50378"}} {"text": "WordPress Plugin Time Capsule 1.21.16 - Authentication Bypass", "spans": {"SYSTEM: WordPress Plugin Time Capsule 1.21.16": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "47941"}} {"text": "WordPress Plugin TranslatePress 2.0.8 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin TranslatePress 2.0.8": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[40, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50343"}} {"text": "WordPress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User)", "spans": {"SYSTEM: WordPress Plugin Tutor LMS 1.5.3": [[0, 32]], "VULNERABILITY: Cross-Site Request Forgery": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48151"}} {"text": "WordPress Plugin Tutor.1.5.3 - Local File Inclusion", "spans": {"SYSTEM: WordPress Plugin Tutor.1.5.3": [[0, 28]], "VULNERABILITY: Local File Inclusion": [[31, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48058"}} {"text": "WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin tutor.1.5.3": [[0, 28]], "VULNERABILITY: Persistent Cross-Site Scripting": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48059"}} {"text": "WordPress Plugin Typebot 1.4.3 - Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin Typebot 1.4.3": [[0, 30]], "VULNERABILITY: Stored Cross Site Scripting": [[33, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50593"}} {"text": "WordPress Plugin Ultimate Maps 1.2.4 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Ultimate Maps 1.2.4": [[0, 36]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[39, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50345"}} {"text": "WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion", "spans": {"SYSTEM: WordPress Plugin ultimate-member 2.1.3": [[0, 38]], "VULNERABILITY: Local File Inclusion": [[41, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48065"}} {"text": "WordPress Plugin video-synchro-pdf 1.7.4 - Local File Inclusion", "spans": {"SYSTEM: WordPress Plugin video-synchro-pdf 1.7.4": [[0, 40]], "VULNERABILITY: Local File Inclusion": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50844"}} {"text": "WordPress Plugin Videos sync PDF 1.7.4 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Videos sync PDF 1.7.4": [[0, 38]], "VULNERABILITY: Stored Cross Site Scripting": [[41, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50874"}} {"text": "WordPress Plugin visitors-app 0.3 - 'user-agent' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin visitors-app 0.3": [[0, 33]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[49, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49972"}} {"text": "WordPress Plugin Visual Slide Box Builder 3.2.9 - SQLi", "spans": {"SYSTEM: WordPress Plugin Visual Slide Box Builder 3.2.9": [[0, 47]], "VULNERABILITY: SQLi": [[50, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50980"}} {"text": "WordPress Plugin W3 Total Cache - Unauthenticated Arbitrary File Read (Metasploit)", "spans": {"SYSTEM: WordPress Plugin W3 Total Cache": [[0, 31]], "VULNERABILITY: Arbitrary File Read": [[50, 69]], "TOOL: Metasploit": [[71, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49317"}} {"text": "WordPress Plugin Wappointment 2.2.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin Wappointment 2.2.4": [[0, 35]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[38, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50333"}} {"text": "WordPress Plugin Weblizar 8.9 - Backdoor", "spans": {"SYSTEM: WordPress Plugin Weblizar 8.9": [[0, 29]], "VULNERABILITY: Backdoor": [[32, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50969"}} {"text": "WordPress Plugin Welcart e-Commerce 2.0.0 - 'search[order_column][0]' SQL injection", "spans": {"SYSTEM: WordPress Plugin Welcart e-Commerce 2.0.0": [[0, 41]], "VULNERABILITY: SQL injection": [[70, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49531"}} {"text": "WordPress Plugin WooCommerce Booster Plugin 5.4.3 - Authentication Bypass", "spans": {"SYSTEM: WordPress Plugin WooCommerce Booster Plugin 5.4.3": [[0, 49]], "VULNERABILITY: Authentication Bypass": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50299"}} {"text": "WordPress Plugin WooCommerce CardGate Payment Gateway 3.1.15 - Payment Process Bypass", "spans": {"SYSTEM: WordPress Plugin WooCommerce CardGate Payment Gateway 3.1.15": [[0, 60]], "VULNERABILITY: Payment Process Bypass": [[63, 85]]}, "info": {"source": "exploitdb", "exploit_id": "48134"}} {"text": "WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3": [[0, 59]], "VULNERABILITY: Persistent Cross-Site Scripting": [[62, 93]]}, "info": {"source": "exploitdb", "exploit_id": "48088"}} {"text": "WordPress Plugin Wordfence.7.4.5 - Local File Disclosure", "spans": {"SYSTEM: WordPress Plugin Wordfence.7.4.5": [[0, 32]], "VULNERABILITY: Local File Disclosure": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48061"}} {"text": "Wordpress Plugin WP Courses < 2.0.29 - Broken Access Controls leading to Courses Content Disclosure", "spans": {"SYSTEM: Wordpress Plugin WP Courses < 2.0.29": [[0, 36]], "VULNERABILITY: Broken Access Controls leading to Courses Content Disclosure": [[39, 99]]}, "info": {"source": "exploitdb", "exploit_id": "48910"}} {"text": "WordPress Plugin WP Customize Login 1.1 - 'Change Logo Title' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WP Customize Login 1.1": [[0, 39]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[62, 95]]}, "info": {"source": "exploitdb", "exploit_id": "50174"}} {"text": "WordPress Plugin WP Google Maps 8.1.11 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WP Google Maps 8.1.11": [[0, 38]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[41, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50051"}} {"text": "Wordpress Plugin WP Guppy 1.1 - WP-JSON API Sensitive Information Disclosure", "spans": {"SYSTEM: Wordpress Plugin WP Guppy 1.1": [[0, 29]], "VULNERABILITY: Information Disclosure": [[54, 76]]}, "info": {"source": "exploitdb", "exploit_id": "50540"}} {"text": "WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WP Learn Manager 1.1.2": [[0, 39]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[42, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50086"}} {"text": "WordPress Plugin WP Prayer version 1.6.1 - 'prayer_messages' Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WordPress Plugin WP Prayer version 1.6.1": [[0, 40]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[61, 94]]}, "info": {"source": "exploitdb", "exploit_id": "49921"}} {"text": "WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin WP Sitemap Page 1.6.2": [[0, 38]], "VULNERABILITY: Persistent Cross-Site Scripting": [[41, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48093"}} {"text": "WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WP Sitemap Page 1.6.4": [[0, 38]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[41, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50268"}} {"text": "WordPress Plugin WP Statistics 13.0.7 - Time-Based Blind SQL Injection (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin WP Statistics 13.0.7": [[0, 37]], "VULNERABILITY: SQL Injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49894"}} {"text": "WordPress Plugin WP Super Cache 1.7.1 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: WordPress Plugin WP Super Cache 1.7.1": [[0, 37]], "VULNERABILITY: Remote Code Execution": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49718"}} {"text": "Wordpress Plugin WP Super Edit 2.5.4 - Remote File Upload", "spans": {"SYSTEM: Wordpress Plugin WP Super Edit 2.5.4": [[0, 36]], "VULNERABILITY: File Upload": [[46, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49839"}} {"text": "WordPress Plugin WP Symposium Pro 2021.10 - 'wps_admin_forum_add_name' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WP Symposium Pro 2021.10": [[0, 41]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[71, 104]]}, "info": {"source": "exploitdb", "exploit_id": "50514"}} {"text": "WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)", "spans": {"SYSTEM: WordPress Plugin WP User Frontend 3.5.25": [[0, 40]], "VULNERABILITY: SQLi": [[43, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50772"}} {"text": "Wordpress Plugin WP Video Playlist 1.1.1 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Wordpress Plugin WP Video Playlist 1.1.1": [[0, 40]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[43, 76]]}, "info": {"source": "exploitdb", "exploit_id": "51987"}} {"text": "WordPress Plugin WP Visitor Statistics 4.7 - SQL Injection", "spans": {"SYSTEM: WordPress Plugin WP Visitor Statistics 4.7": [[0, 42]], "VULNERABILITY: SQL Injection": [[45, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50619"}} {"text": "WordPress Plugin Wp-FileManager 6.8 - RCE", "spans": {"SYSTEM: WordPress Plugin Wp-FileManager 6.8": [[0, 35]], "VULNERABILITY: RCE": [[38, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49178"}} {"text": "WordPress Plugin WP-Paginate 2.1.3 - 'preset' Stored XSS", "spans": {"SYSTEM: WordPress Plugin WP-Paginate 2.1.3": [[0, 34]], "VULNERABILITY: XSS": [[53, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49355"}} {"text": "WordPress Plugin WP-PostRatings 1.86 - 'postratings_image' Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin WP-PostRatings 1.86": [[0, 36]], "VULNERABILITY: Cross-Site Scripting": [[59, 79]]}, "info": {"source": "exploitdb", "exploit_id": "49333"}} {"text": "WordPress Plugin WP-UserOnline 2.87.6 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WP-UserOnline 2.87.6": [[0, 37]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[40, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50988"}} {"text": "Wordpress Plugin WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: Wordpress Plugin WP-UserOnline 2.88.0": [[0, 37]], "VULNERABILITY: Stored Cross Site Scripting": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "51020"}} {"text": "WordPress Plugin WP24 Domain Check 1.6.2 - 'fieldnameDomain' Stored Cross Site Scripting", "spans": {"SYSTEM: WordPress Plugin WP24 Domain Check 1.6.2": [[0, 40]], "VULNERABILITY: Stored Cross Site Scripting": [[61, 88]]}, "info": {"source": "exploitdb", "exploit_id": "49377"}} {"text": "Wordpress Plugin wpDiscuz 7.0.4 - Arbitrary File Upload (Unauthenticated)", "spans": {"SYSTEM: Wordpress Plugin wpDiscuz 7.0.4": [[0, 31]], "VULNERABILITY: Arbitrary File Upload": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49962"}} {"text": "WordPress Plugin wpDiscuz 7.0.4 - Remote Code Execution (Unauthenticated)", "spans": {"SYSTEM: WordPress Plugin wpDiscuz 7.0.4": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49967"}} {"text": "Wordpress Plugin wpDiscuz 7.0.4 - Unauthenticated Arbitrary File Upload (Metasploit)", "spans": {"SYSTEM: Wordpress Plugin wpDiscuz 7.0.4": [[0, 31]], "VULNERABILITY: Arbitrary File Upload": [[50, 71]], "TOOL: Metasploit": [[73, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49401"}} {"text": "WordPress Plugin WPForms 1.5.8.2 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Plugin WPForms 1.5.8.2": [[0, 32]], "VULNERABILITY: Persistent Cross-Site Scripting": [[35, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48245"}} {"text": "Wordpress Plugin WPForms 1.6.3.1 - Persistent Cross Site Scripting (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin WPForms 1.6.3.1": [[0, 32]], "VULNERABILITY: Cross Site Scripting": [[46, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49069"}} {"text": "WordPress Plugin WPFront Notification Bar 1.9.1.04012 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WPFront Notification Bar 1.9.1.04012": [[0, 53]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[56, 89]]}, "info": {"source": "exploitdb", "exploit_id": "50120"}} {"text": "WordPress Plugin WPSchoolPress 2.1.16 - 'Multiple' Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin WPSchoolPress 2.1.16": [[0, 37]], "VULNERABILITY: Cross Site Scripting": [[51, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50520"}} {"text": "Wordpress Plugin XCloner 4.2.12 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Wordpress Plugin XCloner 4.2.12": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50077"}} {"text": "WordPress Plugin YOP Polls 6.2.7 - Stored Cross Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Plugin YOP Polls 6.2.7": [[0, 32]], "VULNERABILITY: Stored Cross Site Scripting": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50066"}} {"text": "Wordpress Plugin Zephyr Project Manager 3.2.42 - Multiple SQLi", "spans": {"SYSTEM: Wordpress Plugin Zephyr Project Manager 3.2.42": [[0, 46]], "VULNERABILITY: SQLi": [[58, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51024"}} {"text": "Wordpress Seotheme - Remote Code Execution Unauthenticated", "spans": {"SYSTEM: Wordpress Seotheme": [[0, 18]], "VULNERABILITY: Remote Code Execution": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51789"}} {"text": "Wordpress Sonaar Music Plugin 4.7 - Stored XSS", "spans": {"SYSTEM: Wordpress Sonaar Music Plugin 4.7": [[0, 33]], "VULNERABILITY: XSS": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51739"}} {"text": "Wordpress Theme Accesspress Social Icons 1.7.9 - SQL injection (Authenticated)", "spans": {"SYSTEM: Wordpress Theme Accesspress Social Icons 1.7.9": [[0, 46]], "VULNERABILITY: SQL injection": [[49, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49115"}} {"text": "WordPress Theme Enfold 4.8.3 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WordPress Theme Enfold 4.8.3": [[0, 28]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[31, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50427"}} {"text": "WordPress Theme Fruitful 3.8 - Persistent Cross-Site Scripting", "spans": {"SYSTEM: WordPress Theme Fruitful 3.8": [[0, 28]], "VULNERABILITY: Persistent Cross-Site Scripting": [[31, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48083"}} {"text": "WordPress Theme Medic v1.0.0 - Weak Password Recovery Mechanism for Forgotten Password", "spans": {"SYSTEM: WordPress Theme Medic v1.0.0": [[0, 28]], "VULNERABILITY: Weak Password Recovery Mechanism for Forgotten Password": [[31, 86]]}, "info": {"source": "exploitdb", "exploit_id": "51531"}} {"text": "WordPress Theme NexosReal Estate 1.7 - 'search_order' SQL Injection", "spans": {"SYSTEM: WordPress Theme NexosReal Estate 1.7": [[0, 36]], "VULNERABILITY: SQL Injection": [[54, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48682"}} {"text": "Wordpress Theme Travelscape v1.0.3 - Arbitrary File Upload", "spans": {"SYSTEM: Wordpress Theme Travelscape v1.0.3": [[0, 34]], "VULNERABILITY: Arbitrary File Upload": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51969"}} {"text": "Wordpress Theme Wibar 1.1.8 - 'Brand Component' Stored Cross Site Scripting", "spans": {"SYSTEM: Wordpress Theme Wibar 1.1.8": [[0, 27]], "VULNERABILITY: Stored Cross Site Scripting": [[48, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49107"}} {"text": "WordPress Theme Workreap 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution", "spans": {"SYSTEM: WordPress Theme Workreap 2.2.2": [[0, 30]], "VULNERABILITY: Remote Code Execution": [[67, 88]]}, "info": {"source": "exploitdb", "exploit_id": "51510"}} {"text": "Wordpress Theme XStore 9.3.8 - SQLi", "spans": {"SYSTEM: Wordpress Theme XStore 9.3.8": [[0, 28]], "VULNERABILITY: SQLi": [[31, 35]]}, "info": {"source": "exploitdb", "exploit_id": "52019"}} {"text": "WorkOrder CMS 0.1.0 - SQL Injection", "spans": {"SYSTEM: WorkOrder CMS 0.1.0": [[0, 19]], "VULNERABILITY: SQL Injection": [[22, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51038"}} {"text": "Workout Journal App 1.0 - Stored XSS", "spans": {"SYSTEM: Workout Journal App 1.0": [[0, 23]], "VULNERABILITY: XSS": [[33, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51928"}} {"text": "WoWonder Social Network Platform 3.1 - 'event_id' SQL Injection", "spans": {"SYSTEM: WoWonder Social Network Platform 3.1": [[0, 36]], "VULNERABILITY: SQL Injection": [[50, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49657"}} {"text": "WoWonder Social Network Platform 3.1 - Authentication Bypass", "spans": {"SYSTEM: WoWonder Social Network Platform 3.1": [[0, 36]], "VULNERABILITY: Authentication Bypass": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49989"}} {"text": "WP All Import v3.6.7 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: WP All Import v3.6.7": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51122"}} {"text": "WP AutoComplete 1.0.4 - Unauthenticated SQLi", "spans": {"SYSTEM: WP AutoComplete 1.0.4": [[0, 21]], "VULNERABILITY: SQLi": [[40, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51560"}} {"text": "WP Fastest Cache 1.2.2 - Unauthenticated SQL Injection", "spans": {"SYSTEM: WP Fastest Cache 1.2.2": [[0, 22]], "VULNERABILITY: SQL Injection": [[41, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51835"}} {"text": "WP Rocket < 2.10.3 - Local File Inclusion (LFI)", "spans": {"SYSTEM: WP Rocket < 2.10.3": [[0, 18]], "VULNERABILITY: Local File Inclusion": [[21, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51830"}} {"text": "WP Statistics Plugin 13.1.5 current_page_id - Time based SQL injection (Unauthenticated)", "spans": {"SYSTEM: WP Statistics Plugin 13.1.5 current_page_id": [[0, 43]], "VULNERABILITY: SQL injection": [[57, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51711"}} {"text": "WP Sticky Social 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WP Sticky Social 1.0.1": [[0, 22]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[55, 88]]}, "info": {"source": "exploitdb", "exploit_id": "51533"}} {"text": "WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE", "spans": {"SYSTEM: WP-file-manager v6.9": [[0, 20]], "VULNERABILITY: Arbitrary File Upload": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51224"}} {"text": "WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: WP-UserOnline 2.88.0": [[0, 20]], "VULNERABILITY: Stored Cross Site Scripting": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52048"}} {"text": "Wp2Fac - OS Command Injection", "spans": {"SYSTEM: Wp2Fac": [[0, 6]], "VULNERABILITY: Command Injection": [[12, 29]]}, "info": {"source": "exploitdb", "exploit_id": "51717"}} {"text": "WPForms 1.7.8 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WPForms 1.7.8": [[0, 13]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51152"}} {"text": "WPN-XM Serverstack for Windows 0.8.6 - Multiple Vulnerabilities", "spans": {"SYSTEM: WPN-XM Serverstack for Windows 0.8.6": [[0, 36]], "VULNERABILITY: Multiple Vulnerabilities": [[39, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51075"}} {"text": "WSO2 Management Console (Multiple Products) - Unauthenticated Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: WSO2 Management Console (Multiple Products)": [[0, 43]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[62, 98]]}, "info": {"source": "exploitdb", "exploit_id": "50970"}} {"text": "X2CRM 8.5 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: X2CRM 8.5": [[0, 9]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[12, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52098"}} {"text": "X2CRM v6.6/6.9 - Reflected Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: X2CRM v6.6/6.9": [[0, 14]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[17, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51346"}} {"text": "X2CRM v6.6/6.9 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: X2CRM v6.6/6.9": [[0, 14]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[17, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51345"}} {"text": "xbtitFM 4.1.18 - Multiple Vulnerabilities", "spans": {"SYSTEM: xbtitFM 4.1.18": [[0, 14]], "VULNERABILITY: Multiple Vulnerabilities": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51909"}} {"text": "XCMS v1.83 - Remote Command Execution (RCE)", "spans": {"SYSTEM: XCMS v1.83": [[0, 10]], "VULNERABILITY: Remote Command Execution": [[13, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51184"}} {"text": "Xenforo Version 2.2.13 - Authenticated Stored XSS", "spans": {"SYSTEM: Xenforo Version 2.2.13": [[0, 22]], "VULNERABILITY: XSS": [[46, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51547"}} {"text": "Xeroneit Library Management System 3.0 - 'category' SQL Injection", "spans": {"SYSTEM: Xeroneit Library Management System 3.0": [[0, 38]], "VULNERABILITY: SQL Injection": [[52, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48328"}} {"text": "Xeroneit Library Management System 3.1 - _Add Book Category _ Stored XSS", "spans": {"SYSTEM: Xeroneit Library Management System 3.1": [[0, 38]], "VULNERABILITY: XSS": [[69, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49292"}} {"text": "Xerte 3.10.3 - Directory Traversal (Authenticated)", "spans": {"SYSTEM: Xerte 3.10.3": [[0, 12]], "VULNERABILITY: Directory Traversal": [[15, 34]]}, "info": {"source": "exploitdb", "exploit_id": "50794"}} {"text": "Xerte 3.9 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Xerte 3.9": [[0, 9]], "VULNERABILITY: Remote Code Execution (RCE)": [[12, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50795"}} {"text": "Xhibiter NFT Marketplace 1.10.2 - SQL Injection", "spans": {"SYSTEM: Xhibiter NFT Marketplace 1.10.2": [[0, 31]], "VULNERABILITY: SQL Injection": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "52060"}} {"text": "XMB 1.9.12.06 - Stored XSS", "spans": {"SYSTEM: XMB 1.9.12.06": [[0, 13]], "VULNERABILITY: XSS": [[23, 26]]}, "info": {"source": "exploitdb", "exploit_id": "52044"}} {"text": "Xoops CMS 2.5.10 - Stored Cross-Site Scripting (XSS) (Authenticated)", "spans": {"SYSTEM: Xoops CMS 2.5.10": [[0, 16]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[19, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51520"}} {"text": "XOS Shop 1.0.9 - 'Multiple' Arbitrary File Deletion (Authenticated)", "spans": {"SYSTEM: XOS Shop 1.0.9": [[0, 14]], "VULNERABILITY: Arbitrary File Deletion": [[28, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50155"}} {"text": "XWiki Standard 14.10 - Remote Code Execution (RCE)", "spans": {"SYSTEM: XWiki Standard 14.10": [[0, 20]], "VULNERABILITY: Remote Code Execution (RCE)": [[23, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52105"}} {"text": "Yahoo User Interface library (YUI2) TreeView v2.8.2 - Multiple Reflected Cross Site Scripting (XSS)", "spans": {"SYSTEM: Yahoo User Interface library (YUI2) TreeView v2.8.2": [[0, 51]], "VULNERABILITY: Cross Site Scripting": [[73, 93]]}, "info": {"source": "exploitdb", "exploit_id": "51198"}} {"text": "YesWiki cercopitheque 2020.04.18.1 - 'id' SQL Injection", "spans": {"SYSTEM: YesWiki cercopitheque 2020.04.18.1": [[0, 34]], "VULNERABILITY: SQL Injection": [[42, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48432"}} {"text": "YetiShare File Hosting Script 5.1.0 - 'url' Server-Side Request Forgery", "spans": {"SYSTEM: YetiShare File Hosting Script 5.1.0": [[0, 35]], "VULNERABILITY: Server-Side Request Forgery": [[44, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49534"}} {"text": "Yoga Class Registration System v1.0 - Multiple SQLi", "spans": {"SYSTEM: Yoga Class Registration System v1.0": [[0, 35]], "VULNERABILITY: SQLi": [[47, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51048"}} {"text": "Young Entrepreneur E-Negosyo System 1.0 - 'PRODESC' Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Young Entrepreneur E-Negosyo System 1.0": [[0, 39]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[52, 85]]}, "info": {"source": "exploitdb", "exploit_id": "50375"}} {"text": "Young Entrepreneur E-Negosyo System 1.0 - SQL Injection Authentication Bypass", "spans": {"SYSTEM: Young Entrepreneur E-Negosyo System 1.0": [[0, 39]], "VULNERABILITY: Authentication Bypass": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "50374"}} {"text": "YouPHPTube<= 7.8 - Multiple Vulnerabilities", "spans": {"SYSTEM: YouPHPTube<= 7.8": [[0, 16]], "VULNERABILITY: Multiple Vulnerabilities": [[19, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51101"}} {"text": "YzmCMS 5.5 - 'url' Persistent Cross-Site Scripting", "spans": {"SYSTEM: YzmCMS 5.5": [[0, 10]], "VULNERABILITY: Persistent Cross-Site Scripting": [[19, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48189"}} {"text": "Zabbix 3.4.7 - Stored XSS", "spans": {"SYSTEM: Zabbix 3.4.7": [[0, 12]], "VULNERABILITY: XSS": [[22, 25]]}, "info": {"source": "exploitdb", "exploit_id": "49729"}} {"text": "Zabbix 5.0.0 - Stored XSS via URL Widget Iframe", "spans": {"SYSTEM: Zabbix 5.0.0": [[0, 12]], "VULNERABILITY: XSS": [[22, 25]]}, "info": {"source": "exploitdb", "exploit_id": "49202"}} {"text": "Zabbix 5.0.17 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Zabbix 5.0.17": [[0, 13]], "VULNERABILITY: Remote Code Execution (RCE)": [[16, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50816"}} {"text": "Zabbix 7.0.0 - SQL Injection", "spans": {"SYSTEM: Zabbix 7.0.0": [[0, 12]], "VULNERABILITY: SQL Injection": [[15, 28]]}, "info": {"source": "exploitdb", "exploit_id": "52230"}} {"text": "Zen Cart 1.5.7b - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Zen Cart 1.5.7b": [[0, 15]], "VULNERABILITY: Remote Code Execution": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49608"}} {"text": "Zenario CMS 8.8.52729 - 'cID' SQL injection (Authenticated)", "spans": {"SYSTEM: Zenario CMS 8.8.52729": [[0, 21]], "VULNERABILITY: SQL injection": [[30, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49988"}} {"text": "Zenario CMS 8.8.53370 - 'id' Blind SQL Injection", "spans": {"SYSTEM: Zenario CMS 8.8.53370": [[0, 21]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49642"}} {"text": "Zenario CMS 9.0.54156 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Zenario CMS 9.0.54156": [[0, 21]], "VULNERABILITY: Remote Code Execution (RCE)": [[24, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50850"}} {"text": "Zenphoto 1.6 - Multiple stored XSS", "spans": {"SYSTEM: Zenphoto 1.6": [[0, 12]], "VULNERABILITY: XSS": [[31, 34]]}, "info": {"source": "exploitdb", "exploit_id": "51485"}} {"text": "ZenTao Pro 8.8.2 - Command Injection", "spans": {"SYSTEM: ZenTao Pro 8.8.2": [[0, 16]], "VULNERABILITY: Command Injection": [[19, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48633"}} {"text": "Zentao Project Management System 17.0 - Authenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: Zentao Project Management System 17.0": [[0, 37]], "VULNERABILITY: Authenticated Remote Code Execution": [[40, 75]]}, "info": {"source": "exploitdb", "exploit_id": "51069"}} {"text": "Zomplog 3.9 - Cross-site scripting (XSS)", "spans": {"SYSTEM: Zomplog 3.9": [[0, 11]], "VULNERABILITY: XSS": [[36, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51625"}} {"text": "zomplog 3.9 - Remote Code Execution (RCE)", "spans": {"SYSTEM: zomplog 3.9": [[0, 11]], "VULNERABILITY: Remote Code Execution (RCE)": [[14, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51624"}} {"text": "Zoneminder < v1.37.24 - Log Injection & Stored XSS & CSRF Bypass", "spans": {"SYSTEM: Zoneminder < v1.37.24": [[0, 21]], "VULNERABILITY: CSRF": [[53, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51071"}} {"text": "ZoneMinder Snapshots < 1.37.33 - Unauthenticated RCE", "spans": {"SYSTEM: ZoneMinder Snapshots < 1.37.33": [[0, 30]], "VULNERABILITY: RCE": [[49, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51902"}} {"text": "Zoo Management System 1.0 - 'anid' SQL Injection", "spans": {"SYSTEM: Zoo Management System 1.0": [[0, 25]], "VULNERABILITY: SQL Injection": [[35, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49501"}} {"text": "Zoo Management System 1.0 - 'Multiple' Persistent Cross-Site-Scripting (XSS)", "spans": {"SYSTEM: Zoo Management System 1.0": [[0, 25]], "VULNERABILITY: XSS": [[72, 75]]}, "info": {"source": "exploitdb", "exploit_id": "50117"}} {"text": "Zoo Management System 1.0 - Authentication Bypass", "spans": {"SYSTEM: Zoo Management System 1.0": [[0, 25]], "VULNERABILITY: Authentication Bypass": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48880"}} {"text": "Zoo Management System 1.0 - Unauthenticated RCE", "spans": {"SYSTEM: Zoo Management System 1.0": [[0, 25]], "VULNERABILITY: RCE": [[44, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51819"}} {"text": "Zstore 6.5.4 - Reflected Cross-Site Scripting (XSS)", "spans": {"SYSTEM: Zstore 6.5.4": [[0, 12]], "VULNERABILITY: Reflected Cross-Site Scripting (XSS)": [[15, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51207"}} {"text": "zstore 6.6.0 - Cross-Site Scripting (XSS)", "spans": {"SYSTEM: zstore 6.6.0": [[0, 12]], "VULNERABILITY: Cross-Site Scripting (XSS)": [[15, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51240"}} {"text": "dirsearch 0.4.1 - CSV Injection", "spans": {"SYSTEM: dirsearch 0.4.1": [[0, 15]], "VULNERABILITY: CSV Injection": [[18, 31]]}, "info": {"source": "exploitdb", "exploit_id": "49370"}} {"text": "Facebook ParlAI 1.0.0 - Deserialization of Untrusted Data in parlai", "spans": {"SYSTEM: Facebook ParlAI 1.0.0": [[0, 21]], "VULNERABILITY: Deserialization of Untrusted Data in parlai": [[25, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50289"}} {"text": "Knockpy 4.1.1 - CSV Injection", "spans": {"SYSTEM: Knockpy 4.1.1": [[0, 13]], "VULNERABILITY: CSV Injection": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "49342"}} {"text": "Binwalk v2.3.2 - Remote Command Execution (RCE)", "spans": {"SYSTEM: Binwalk v2.3.2": [[0, 14]], "VULNERABILITY: Remote Command Execution": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51249"}} {"text": "Gerapy 0.9.7 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Gerapy 0.9.7": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50640"}} {"text": "Hugging Face Transformers MobileViTV2 4.41.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Hugging Face Transformers MobileViTV2 4.41.1": [[0, 44]], "VULNERABILITY: Remote Code Execution (RCE)": [[47, 74]]}, "info": {"source": "exploitdb", "exploit_id": "52227"}} {"text": "Keras 2.15 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Keras 2.15": [[0, 10]], "VULNERABILITY: Remote Code Execution (RCE)": [[13, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52359"}} {"text": "NVFLARE < 2.1.4 - Unsafe Deserialization due to Pickle", "spans": {"SYSTEM: NVFLARE < 2.1.4": [[0, 15]], "VULNERABILITY: Unsafe Deserialization due to Pickle": [[18, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51051"}} {"text": "Pymatgen 2024.1 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Pymatgen 2024.1": [[0, 15]], "VULNERABILITY: Remote Code Execution (RCE)": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52205"}} {"text": "PyScript - Read Remote Python Source Code", "spans": {"SYSTEM: PyScript": [[0, 8]], "VULNERABILITY: Read Remote Python Source Code": [[11, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50918"}} {"text": "rpc.py 0.6.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: rpc.py 0.6.0": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50983"}} {"text": "_camp_ Raspberry Pi camera server 1.0 - Authentication Bypass", "spans": {"SYSTEM: _camp_ Raspberry Pi camera server 1.0": [[0, 37]], "VULNERABILITY: Authentication Bypass": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51041"}} {"text": "aaPanel 6.6.6 - Privilege Escalation & Remote Code Execution (Authenticated)", "spans": {"SYSTEM: aaPanel 6.6.6": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48886"}} {"text": "aiohttp 3.9.1 - directory traversal PoC", "spans": {"SYSTEM: aiohttp 3.9.1": [[0, 13]], "VULNERABILITY: directory traversal PoC": [[16, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52474"}} {"text": "Ajenti 2.1.36 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Ajenti 2.1.36": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48929"}} {"text": "Bitbucket v7.0.0 - RCE", "spans": {"SYSTEM: Bitbucket v7.0.0": [[0, 16]], "VULNERABILITY: RCE": [[20, 23]]}, "info": {"source": "exploitdb", "exploit_id": "51040"}} {"text": "copyparty 1.8.2 - Directory Traversal", "spans": {"SYSTEM: copyparty 1.8.2": [[0, 15]], "VULNERABILITY: Directory Traversal": [[18, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51636"}} {"text": "copyparty v1.8.6 - Reflected Cross Site Scripting (XSS)", "spans": {"SYSTEM: copyparty v1.8.6": [[0, 16]], "VULNERABILITY: Cross Site Scripting": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51635"}} {"text": "CVAT 2.0 - Server Side Request Forgery", "spans": {"SYSTEM: CVAT 2.0": [[0, 8]], "VULNERABILITY: Server Side Request Forgery": [[11, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51030"}} {"text": "Devika v1 - Path Traversal via 'snapshot_path'", "spans": {"SYSTEM: Devika v1": [[0, 9]], "VULNERABILITY: Path Traversal": [[12, 26]]}, "info": {"source": "exploitdb", "exploit_id": "52066"}} {"text": "django-unicorn 0.35.3 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: django-unicorn 0.35.3": [[0, 21]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[24, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50393"}} {"text": "djangorestframework-simplejwt 5.3.1 - Information Disclosure", "spans": {"SYSTEM: djangorestframework-simplejwt 5.3.1": [[0, 35]], "VULNERABILITY: Information Disclosure": [[38, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51992"}} {"text": "DocsGPT 0.12.0 - Remote Code Execution", "spans": {"SYSTEM: DocsGPT 0.12.0": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "52145"}} {"text": "ERPNext 14.82.1 - Account Takeover via Cross-Site Request Forgery (CSRF)", "spans": {"SYSTEM: ERPNext 14.82.1": [[0, 15]], "VULNERABILITY: CSRF": [[67, 71]]}, "info": {"source": "exploitdb", "exploit_id": "52283"}} {"text": "Frappe Framework (ERPNext) 13.4.0 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Frappe Framework (ERPNext) 13.4.0": [[0, 33]], "VULNERABILITY: Remote Code Execution": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51580"}} {"text": "Home Assistant Community Store (HACS) 1.10.0 - Directory Traversal", "spans": {"SYSTEM: Home Assistant Community Store (HACS) 1.10.0": [[0, 44]], "VULNERABILITY: Directory Traversal": [[47, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49495"}} {"text": "Invesalius3 - Remote Code Execution", "spans": {"SYSTEM: Invesalius3": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "52076"}} {"text": "Label Studio 1.5.0 - Authenticated Server Side Request Forgery (SSRF)", "spans": {"SYSTEM: Label Studio 1.5.0": [[0, 18]], "VULNERABILITY: Server Side Request Forgery": [[35, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51109"}} {"text": "modoboa 2.0.4 - Admin TakeOver", "spans": {"SYSTEM: modoboa 2.0.4": [[0, 14]], "VULNERABILITY: Admin TakeOver": [[17, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51276"}} {"text": "OpenPLC 3 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: OpenPLC 3": [[0, 9]], "VULNERABILITY: Remote Code Execution": [[12, 33]]}, "info": {"source": "exploitdb", "exploit_id": "49803"}} {"text": "Pallets Werkzeug 0.15.4 - Path Traversal", "spans": {"SYSTEM: Pallets Werkzeug 0.15.4": [[0, 23]], "VULNERABILITY: Path Traversal": [[26, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50101"}} {"text": "Pi-hole 4.3.2 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Pi-hole 4.3.2": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48727"}} {"text": "Products.PluggableAuthService 2.6.0 - Open Redirect", "spans": {"SYSTEM: Products.PluggableAuthService 2.6.0": [[0, 35]], "VULNERABILITY: Open Redirect": [[38, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49930"}} {"text": "PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)", "spans": {"SYSTEM: PyLoad 0.5.0": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[24, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51532"}} {"text": "Pyro CMS 3.9 - Server-Side Template Injection (SSTI) (Authenticated)", "spans": {"SYSTEM: Pyro CMS 3.9": [[0, 12]], "VULNERABILITY: SSTI": [[47, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51669"}} {"text": "Ray OS v2.6.3 - Command Injection RCE(Unauthorized)", "spans": {"SYSTEM: Ray OS v2.6.3": [[0, 13]], "VULNERABILITY: Command Injection": [[16, 33]]}, "info": {"source": "exploitdb", "exploit_id": "51978"}} {"text": "Roxy WI v6.1.0.0 - Improper Authentication Control", "spans": {"SYSTEM: Roxy WI v6.1.0.0": [[0, 16]], "VULNERABILITY: Improper Authentication Control": [[19, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51226"}} {"text": "Roxy WI v6.1.0.0 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: Roxy WI v6.1.0.0": [[0, 16]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[19, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51227"}} {"text": "Roxy WI v6.1.1.0 - Unauthenticated Remote Code Execution (RCE) via ssl_cert Upload", "spans": {"SYSTEM: Roxy WI v6.1.1.0": [[0, 16]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[19, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51228"}} {"text": "Sentry 8.2.0 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: Sentry 8.2.0": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50318"}} {"text": "pdfkit v0.8.7.2 - Command Injection", "spans": {"SYSTEM: pdfkit v0.8.7.2": [[0, 15]], "VULNERABILITY: Command Injection": [[18, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51293"}} {"text": "Camaleon CMS v2.7.0 - Server-Side Template Injection (SSTI)", "spans": {"SYSTEM: Camaleon CMS v2.7.0": [[0, 19]], "VULNERABILITY: SSTI": [[54, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51489"}} {"text": "Cameleon CMS 2.7.4 - Persistent Stored XSS in Post Title", "spans": {"SYSTEM: Cameleon CMS 2.7.4": [[0, 18]], "VULNERABILITY: XSS": [[39, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51446"}} {"text": "GitLab 11.4.7 - RCE (Authenticated) (2)", "spans": {"SYSTEM: GitLab 11.4.7": [[0, 13]], "VULNERABILITY: RCE": [[16, 19]]}, "info": {"source": "exploitdb", "exploit_id": "49334"}} {"text": "GitLab 11.4.7 - Remote Code Execution (Authenticated) (1)", "spans": {"SYSTEM: GitLab 11.4.7": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49257"}} {"text": "GitLab 12.9.0 - Arbitrary File Read", "spans": {"SYSTEM: GitLab 12.9.0": [[0, 13]], "VULNERABILITY: Arbitrary File Read": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48431"}} {"text": "Gitlab 12.9.0 - Arbitrary File Read (Authenticated)", "spans": {"SYSTEM: Gitlab 12.9.0": [[0, 13]], "VULNERABILITY: Arbitrary File Read": [[16, 35]]}, "info": {"source": "exploitdb", "exploit_id": "49076"}} {"text": "Gitlab 13.10.2 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Gitlab 13.10.2": [[0, 14]], "VULNERABILITY: Remote Code Execution": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "49951"}} {"text": "GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated)", "spans": {"SYSTEM: GitLab 13.10.2": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50532"}} {"text": "Gitlab 13.9.3 - Remote Code Execution (Authenticated)", "spans": {"SYSTEM: Gitlab 13.9.3": [[0, 13]], "VULNERABILITY: Remote Code Execution": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "49944"}} {"text": "Gitlab 14.9 - Authentication Bypass", "spans": {"SYSTEM: Gitlab 14.9": [[0, 11]], "VULNERABILITY: Authentication Bypass": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50888"}} {"text": "GitLab 14.9 - Stored Cross-Site Scripting (XSS)", "spans": {"SYSTEM: GitLab 14.9": [[0, 11]], "VULNERABILITY: Stored Cross-Site Scripting (XSS)": [[14, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50889"}} {"text": "GitLab Community Edition (CE) 13.10.3 - 'Sign_Up' User Enumeration", "spans": {"SYSTEM: GitLab Community Edition (CE) 13.10.3": [[0, 37]], "VULNERABILITY: User Enumeration": [[50, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49822"}} {"text": "GitLab Community Edition (CE) 13.10.3 - User Enumeration", "spans": {"SYSTEM: GitLab Community Edition (CE) 13.10.3": [[0, 37]], "VULNERABILITY: User Enumeration": [[40, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49821"}} {"text": "GitLab v15.3 - Remote Code Execution (RCE) (Authenticated)", "spans": {"SYSTEM: GitLab v15.3": [[0, 12]], "VULNERABILITY: Remote Code Execution (RCE)": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51181"}} {"text": "Rails 5.0.1 - Remote Code Execution", "spans": {"SYSTEM: Rails 5.0.1": [[0, 11]], "VULNERABILITY: Remote Code Execution": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48716"}} {"text": "STVS ProVision 5.9.10 - Cross-Site Request Forgery (Add Admin)", "spans": {"SYSTEM: STVS ProVision 5.9.10": [[0, 21]], "VULNERABILITY: Cross-Site Request Forgery": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49482"}} {"text": "STVS ProVision 5.9.10 - File Disclosure (Authenticated)", "spans": {"SYSTEM: STVS ProVision 5.9.10": [[0, 21]], "VULNERABILITY: File Disclosure": [[24, 39]]}, "info": {"source": "exploitdb", "exploit_id": "49481"}} {"text": "SCO Openserver 5.0.7 - 'outputform' Command Injection", "spans": {"SYSTEM: SCO Openserver 5.0.7": [[0, 20]], "VULNERABILITY: Command Injection": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49301"}} {"text": "SCO Openserver 5.0.7 - 'section' Reflected XSS", "spans": {"SYSTEM: SCO Openserver 5.0.7": [[0, 20]], "VULNERABILITY: XSS": [[43, 46]]}, "info": {"source": "exploitdb", "exploit_id": "49300"}} {"text": "Oracle Solaris Common Desktop Environment 1.6 - Local Privilege Escalation", "spans": {"SYSTEM: Oracle Solaris Common Desktop Environment 1.6": [[0, 45]], "VULNERABILITY: Local Privilege Escalation": [[48, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48359"}} {"text": "Solaris 10 (SPARC) - 'dtprintinfo' Local Privilege Escalation (3)", "spans": {"SYSTEM: Solaris 10 (SPARC)": [[0, 19]], "VULNERABILITY: Local Privilege Escalation": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49518"}} {"text": "Solaris 10 (Intel) - 'dtprintinfo' Local Privilege Escalation (2)", "spans": {"SYSTEM: Solaris 10 (Intel)": [[0, 18]], "VULNERABILITY: Local Privilege Escalation": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49514"}} {"text": "Solaris 10 (Intel) - 'dtprintinfo' Local Privilege Escalation (3)", "spans": {"SYSTEM: Solaris 10 (Intel)": [[0, 18]], "VULNERABILITY: Local Privilege Escalation": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49515"}} {"text": "Solaris 10 (SPARC) - 'dtprintinfo' Local Privilege Escalation (1)", "spans": {"SYSTEM: Solaris 10 (SPARC)": [[0, 18]], "VULNERABILITY: Local Privilege Escalation": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49516"}} {"text": "Solaris 10 (SPARC) - 'dtprintinfo' Local Privilege Escalation (2)", "spans": {"SYSTEM: Solaris 10 (SPARC)": [[0, 18]], "VULNERABILITY: Local Privilege Escalation": [[35, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49517"}} {"text": "Solaris 10 libXm - Buffer overflow Local privilege escalation", "spans": {"SYSTEM: Solaris 10 libXm": [[0, 16]], "VULNERABILITY: Buffer overflow Local privilege escalation": [[19, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51209"}} {"text": "SunOS 5.10 Generic_147148-26 - Local Privilege Escalation", "spans": {"SYSTEM: SunOS 5.10 Generic_147148-26": [[0, 28]], "VULNERABILITY: Local Privilege Escalation": [[31, 57]]}, "info": {"source": "exploitdb", "exploit_id": "47932"}} {"text": "Solaris SunSSH 11.0 x86 - libpam Remote Root", "spans": {"SYSTEM: Solaris SunSSH 11.0 x86": [[0, 23]], "VULNERABILITY: libpam Remote Root": [[26, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49261"}} {"text": "Solaris SunSSH 11.0 x86 - libpam Remote Root (2)", "spans": {"SYSTEM: Solaris SunSSH 11.0 x86": [[0, 23]], "VULNERABILITY: libpam Remote Root": [[26, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49896"}} {"text": "Solaris SunSSH 11.0 x86 - libpam Remote Root (3)", "spans": {"SYSTEM: Solaris SunSSH 11.0 x86": [[0, 23]], "VULNERABILITY: libpam Remote Root": [[26, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50039"}} {"text": "Client Management System 1.1 - 'Search' SQL Injection", "spans": {"SYSTEM: Client Management System 1.1": [[0, 28]], "VULNERABILITY: SQL Injection": [[40, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50008"}} {"text": "ever gauzy v0.281.9 - JWT weak HMAC secret", "spans": {"SYSTEM: ever gauzy v0.281.9": [[0, 19]], "VULNERABILITY: JWT weak HMAC secret": [[22, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51354"}} {"text": "Flowise 1.6.5 - Authentication Bypass", "spans": {"SYSTEM: Flowise 1.6.5": [[0, 13]], "VULNERABILITY: Authentication Bypass": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52001"}} {"text": "FUXA V.1.1.13-1186 - Unauthenticated Remote Code Execution (RCE)", "spans": {"SYSTEM: FUXA V.1.1.13-1186": [[0, 18]], "VULNERABILITY: Unauthenticated Remote Code Execution": [[21, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51385"}} {"text": "Grafana <=6.2.4 - HTML Injection", "spans": {"SYSTEM: Grafana <=6.2.4": [[0, 15]], "VULNERABILITY: HTML Injection": [[18, 32]]}, "info": {"source": "exploitdb", "exploit_id": "51073"}} {"text": "Rejetto HTTP File Server 2.3m - Remote Code Execution (RCE)", "spans": {"SYSTEM: Rejetto HTTP File Server 2.3m": [[0, 29]], "VULNERABILITY: Remote Code Execution (RCE)": [[32, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52102"}} {"text": "vsftpd 2.3.4 - Backdoor Command Execution", "spans": {"SYSTEM: vsftpd 2.3.4": [[0, 12]], "VULNERABILITY: Backdoor Command Execution": [[15, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49757"}} {"text": "AbsoluteTelnet 11.12 - _license name_ Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.12": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[38, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48005"}} {"text": "AbsoluteTelnet 11.12 - 'license name' Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.12": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[38, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48006"}} {"text": "AbsoluteTelnet 11.12 - 'SSH1/username' Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.12": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[39, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48305"}} {"text": "AbsoluteTelnet 11.12 - 'SSH2/username' Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.12": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[39, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48010"}} {"text": "AbsoluteTelnet 11.21 - 'Username' Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.21": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[34, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48493"}} {"text": "AbsoluteTelnet 11.24 - 'Phone' Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.24": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50511"}} {"text": "AbsoluteTelnet 11.24 - 'Username' Denial of Service (PoC)", "spans": {"SYSTEM: AbsoluteTelnet 11.24": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[34, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50510"}} {"text": "ACTi NVR3 Standard or Professional Server 3.0.12.42 - Denial of Service (PoC)", "spans": {"SYSTEM: ACTi NVR3 Standard or Professional Server 3.0.12.42": [[0, 51]], "VULNERABILITY: Denial of Service (PoC)": [[54, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48731"}} {"text": "AgataSoft PingMaster Pro 2.1 - Denial of Service (PoC)", "spans": {"SYSTEM: AgataSoft PingMaster Pro 2.1": [[0, 28]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49567"}} {"text": "AimOne Video Converter V2.04 Build 103 - Buffer Overflow (DoS)", "spans": {"SYSTEM: AimOne Video Converter V2.04 Build 103": [[0, 38]], "VULNERABILITY: Buffer Overflow": [[41, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51196"}} {"text": "APKF Product Key Finder 2.5.8.0 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: APKF Product Key Finder 2.5.8.0": [[0, 31]], "VULNERABILITY: Denial of Service (PoC)": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47937"}} {"text": "aSc TimeTables 2020.11.4 - Denial of Service (PoC)", "spans": {"SYSTEM: aSc TimeTables 2020.11.4": [[0, 24]], "VULNERABILITY: Denial of Service (PoC)": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48133"}} {"text": "Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: Backup Key Recovery 2.2.5": [[0, 25]], "VULNERABILITY: Denial of Service (PoC)": [[35, 58]]}, "info": {"source": "exploitdb", "exploit_id": "47909"}} {"text": "Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5": [[0, 62]], "VULNERABILITY: Denial of Service (PoC)": [[71, 94]]}, "info": {"source": "exploitdb", "exploit_id": "47864"}} {"text": "BACnet Test Server 1.01 - Remote Denial of Service (PoC)", "spans": {"SYSTEM: BACnet Test Server 1.01": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[33, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48860"}} {"text": "BlueAuditor 1.7.2.0 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: BlueAuditor 1.7.2.0": [[0, 19]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "47857"}} {"text": "BOOTP Turbo 2.0 - Denial of Service (SEH)(PoC)", "spans": {"SYSTEM: BOOTP Turbo 2.0": [[0, 15]], "VULNERABILITY: Denial of Service": [[18, 35]]}, "info": {"source": "exploitdb", "exploit_id": "47955"}} {"text": "Calavera UpLoader 3.5 - 'FTP Logi' Denial of Service (PoC + SEH Overwrite)", "spans": {"SYSTEM: Calavera UpLoader 3.5": [[0, 21]], "VULNERABILITY: Denial of Service": [[35, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48697"}} {"text": "Code Blocks 20.03 - Denial Of Service (PoC)", "spans": {"SYSTEM: Code Blocks 20.03": [[0, 17]], "VULNERABILITY: Denial Of Service": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48617"}} {"text": "Core FTP LE 2.2 - Denial of Service (PoC)", "spans": {"SYSTEM: Core FTP LE 2.2": [[0, 15]], "VULNERABILITY: Denial of Service (PoC)": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48137"}} {"text": "Core FTP Lite 1.3 - Denial of Service (PoC)", "spans": {"SYSTEM: Core FTP Lite 1.3": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "48100"}} {"text": "DiskBoss 7.7.14 - Denial of Service (PoC)", "spans": {"SYSTEM: DiskBoss 7.7.14": [[0, 15]], "VULNERABILITY: Denial of Service (PoC)": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48276"}} {"text": "Dnss Domain Name Search Software - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: Dnss Domain Name Search Software": [[0, 32]], "VULNERABILITY: Denial of Service (PoC)": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "47856"}} {"text": "Dnss Domain Name Search Software - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: Dnss Domain Name Search Software": [[0, 32]], "VULNERABILITY: Denial of Service (PoC)": [[42, 65]]}, "info": {"source": "exploitdb", "exploit_id": "47861"}} {"text": "Dota 2 7.23f - Denial of Service (PoC)", "spans": {"SYSTEM: Dota 2 7.23f": [[0, 12]], "VULNERABILITY: Denial of Service (PoC)": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48031"}} {"text": "Duplicate Cleaner Pro 4 - Denial of Service (PoC)", "spans": {"SYSTEM: Duplicate Cleaner Pro 4": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[26, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47873"}} {"text": "DupTerminator 1.4.5639.37199 - Denial of Service (PoC)", "spans": {"SYSTEM: DupTerminator 1.4.5639.37199": [[0, 28]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49917"}} {"text": "Easy CD & DVD Cover Creator 4.13 - Denial of Service (PoC)", "spans": {"SYSTEM: Easy CD & DVD Cover Creator 4.13": [[0, 32]], "VULNERABILITY: Denial of Service (PoC)": [[35, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49337"}} {"text": "Everest 5.50.2100 - 'Open File' Denial of Service (PoC)", "spans": {"SYSTEM: Everest 5.50.2100": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[32, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48259"}} {"text": "Filetto 1.0 - 'FEAT' Denial of Service (PoC)", "spans": {"SYSTEM: Filetto 1.0": [[0, 11]], "VULNERABILITY: Denial of Service (PoC)": [[21, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48503"}} {"text": "Fire Web Server 0.1 - Remote Denial of Service (PoC)", "spans": {"SYSTEM: Fire Web Server 0.1": [[0, 19]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48637"}} {"text": "FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)", "spans": {"SYSTEM: FlashFXP 4.2.0 Build 1730": [[0, 25]], "VULNERABILITY: Denial of Service (PoC)": [[28, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48269"}} {"text": "FlashGet 1.9.6 - Denial of Service (PoC)", "spans": {"SYSTEM: FlashGet 1.9.6": [[0, 14]], "VULNERABILITY: Denial of Service (PoC)": [[17, 40]]}, "info": {"source": "exploitdb", "exploit_id": "48434"}} {"text": "Frigate 2.02 - Denial Of Service (PoC)", "spans": {"SYSTEM: Frigate 2.02": [[0, 12]], "VULNERABILITY: Denial Of Service": [[15, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48613"}} {"text": "Frigate 3.36 - Denial of Service (PoC)", "spans": {"SYSTEM: Frigate 3.36": [[0, 12]], "VULNERABILITY: Denial of Service (PoC)": [[15, 38]]}, "info": {"source": "exploitdb", "exploit_id": "48287"}} {"text": "FTPGetter Professional 5.97.0.223 - Denial of Service (PoC)", "spans": {"SYSTEM: FTPGetter Professional 5.97.0.223": [[0, 33]], "VULNERABILITY: Denial of Service (PoC)": [[36, 59]]}, "info": {"source": "exploitdb", "exploit_id": "47871"}} {"text": "Google Chrome 80.0.3987.87 - Heap-Corruption Remote Denial of Service (PoC)", "spans": {"SYSTEM: Google Chrome 80.0.3987.87": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[52, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48237"}} {"text": "GTalk Password Finder 2.2.1 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: GTalk Password Finder 2.2.1": [[0, 27]], "VULNERABILITY: Denial of Service (PoC)": [[36, 59]]}, "info": {"source": "exploitdb", "exploit_id": "47942"}} {"text": "Hex Workshop v6.7 - Buffer overflow DoS", "spans": {"SYSTEM: Hex Workshop v6.7": [[0, 17]], "VULNERABILITY: Buffer overflow DoS": [[20, 39]]}, "info": {"source": "exploitdb", "exploit_id": "51080"}} {"text": "iDailyDiary 4.30 - Denial of Service (PoC)", "spans": {"SYSTEM: iDailyDiary 4.30": [[0, 16]], "VULNERABILITY: Denial of Service (PoC)": [[19, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49898"}} {"text": "Internet Download Manager 6.38.12 - Scheduler Downloads Scheduler Buffer Overflow (PoC)", "spans": {"SYSTEM: Internet Download Manager 6.38.12": [[0, 33]], "VULNERABILITY: Buffer Overflow": [[66, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49083"}} {"text": "Konica Minolta FTP Utility 1.0 - 'LIST' Denial of Service (PoC)", "spans": {"SYSTEM: Konica Minolta FTP Utility 1.0": [[0, 30]], "VULNERABILITY: Denial of Service (PoC)": [[40, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48501"}} {"text": "Konica Minolta FTP Utility 1.0 - 'NLST' Denial of Service (PoC)", "spans": {"SYSTEM: Konica Minolta FTP Utility 1.0": [[0, 30]], "VULNERABILITY: Denial of Service (PoC)": [[40, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48502"}} {"text": "Leawo Prof. Media 11.0.0.1 - Denial of Service (DoS) (PoC)", "spans": {"SYSTEM: Leawo Prof. Media 11.0.0.1": [[0, 26]], "VULNERABILITY: Denial of Service (DoS)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50153"}} {"text": "Managed Switch Port Mapping Tool 2.85.2 - Denial of Service (PoC)", "spans": {"SYSTEM: Managed Switch Port Mapping Tool 2.85.2": [[0, 39]], "VULNERABILITY: Denial of Service (PoC)": [[42, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49566"}} {"text": "Microsoft Outlook VCF cards - Denial of Service (PoC)", "spans": {"SYSTEM: Microsoft Outlook VCF cards": [[0, 27]], "VULNERABILITY: Denial of Service (PoC)": [[30, 53]]}, "info": {"source": "exploitdb", "exploit_id": "47878"}} {"text": "Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Buffer Overflow (PoC)", "spans": {"SYSTEM: Microsoft Windows 10 (1903/1909)": [[0, 32]], "VULNERABILITY: Buffer Overflow": [[87, 102]]}, "info": {"source": "exploitdb", "exploit_id": "48216"}} {"text": "Mocha Telnet Lite for iOS 4.2 - 'User' Denial of Service (PoC)", "spans": {"SYSTEM: Mocha Telnet Lite for iOS 4.2": [[0, 29]], "VULNERABILITY: Denial of Service (PoC)": [[39, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48728"}} {"text": "Modbus Slave 7.3.1 - Buffer Overflow (DoS)", "spans": {"SYSTEM: Modbus Slave 7.3.1": [[0, 18]], "VULNERABILITY: Buffer Overflow": [[21, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50536"}} {"text": "MSN Password Recovery 1.30 - Denial of Service (PoC)", "spans": {"SYSTEM: MSN Password Recovery 1.30": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "47839"}} {"text": "NBMonitor 1.6.6.0 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: NBMonitor 1.6.6.0": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[26, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47866"}} {"text": "NBMonitor 1.6.8 - Denial of Service (PoC)", "spans": {"SYSTEM: NBMonitor 1.6.8": [[0, 15]], "VULNERABILITY: Denial of Service (PoC)": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49964"}} {"text": "NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: NetShareWatcher 1.5.8.0": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[32, 55]]}, "info": {"source": "exploitdb", "exploit_id": "47860"}} {"text": "NetShareWatcher 1.5.8.0 - 'Name' Denial Of Service", "spans": {"SYSTEM: NetShareWatcher 1.5.8.0": [[0, 23]], "VULNERABILITY: Denial Of Service": [[33, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47848"}} {"text": "NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: NetworkSleuth 3.0.0.0": [[0, 21]], "VULNERABILITY: Denial of Service (PoC)": [[30, 53]]}, "info": {"source": "exploitdb", "exploit_id": "47853"}} {"text": "NIMax 5.3.1 - 'Remote VISA System' Denial of Service (PoC)", "spans": {"SYSTEM: NIMax 5.3.1": [[0, 11]], "VULNERABILITY: Denial of Service (PoC)": [[35, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50433"}} {"text": "NIMax 5.3.1f0 - 'VISA Alias' Denial of Service (PoC)", "spans": {"SYSTEM: NIMax 5.3.1f0": [[0, 13]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50434"}} {"text": "Nsasoft Hardware Software Inventory 1.6.4.0 - 'multiple' Denial of Service (PoC)", "spans": {"SYSTEM: Nsasoft Hardware Software Inventory 1.6.4.0": [[0, 43]], "VULNERABILITY: Denial of Service (PoC)": [[57, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49638"}} {"text": "Nsauditor 3.2.0.0 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: Nsauditor 3.2.0.0": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48286"}} {"text": "Nsauditor 3.2.2.0 - 'Event Description' Denial of Service (PoC)", "spans": {"SYSTEM: Nsauditor 3.2.2.0": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[40, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49568"}} {"text": "Nsauditor 3.2.3 - Denial of Service (PoC)", "spans": {"SYSTEM: Nsauditor 3.2.3": [[0, 15]], "VULNERABILITY: Denial of Service (PoC)": [[18, 41]]}, "info": {"source": "exploitdb", "exploit_id": "49965"}} {"text": "Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)", "spans": {"SYSTEM: Odin Secure FTP Expert 7.6.3": [[0, 28]], "VULNERABILITY: Denial of Service (PoC)": [[43, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48262"}} {"text": "Odin Secure FTP Expert 7.6.3 - Denial of Service (PoC)", "spans": {"SYSTEM: Odin Secure FTP Expert 7.6.3": [[0, 28]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48136"}} {"text": "Office Product Key Finder 1.5.4 - Denial of Service (PoC)", "spans": {"SYSTEM: Office Product Key Finder 1.5.4": [[0, 31]], "VULNERABILITY: Denial of Service (PoC)": [[34, 57]]}, "info": {"source": "exploitdb", "exploit_id": "47867"}} {"text": "Pinkie 2.15 - TFTP Remote Buffer Overflow (PoC)", "spans": {"SYSTEM: Pinkie 2.15": [[0, 11]], "VULNERABILITY: Remote Buffer Overflow": [[19, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50535"}} {"text": "Product Key Explorer 4.2.2.0 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: Product Key Explorer 4.2.2.0": [[0, 28]], "VULNERABILITY: Denial of Service (PoC)": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48284"}} {"text": "Product Key Explorer 4.2.7 - 'multiple' Denial of Service (PoC)", "spans": {"SYSTEM: Product Key Explorer 4.2.7": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[40, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49590"}} {"text": "QlikView 12.50.20000.0 - 'FTP Server Address' Denial of Service (PoC)", "spans": {"SYSTEM: QlikView 12.50.20000.0": [[0, 22]], "VULNERABILITY: Denial of Service (PoC)": [[46, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48732"}} {"text": "Quick N Easy Web Server 3.3.8 - Denial of Service (PoC)", "spans": {"SYSTEM: Quick N Easy Web Server 3.3.8": [[0, 29]], "VULNERABILITY: Denial of Service (PoC)": [[32, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48111"}} {"text": "RarmaRadio 2.72.4 - 'server' Denial of Service (PoC)", "spans": {"SYSTEM: RarmaRadio 2.72.4": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48015"}} {"text": "RarmaRadio 2.72.4 - 'username' Denial of Service (PoC)", "spans": {"SYSTEM: RarmaRadio 2.72.4": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48014"}} {"text": "RarmaRadio 2.72.5 - Denial of Service (PoC)", "spans": {"SYSTEM: RarmaRadio 2.72.5": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49207"}} {"text": "RarmaRadio 2.72.8 - Denial of Service (PoC)", "spans": {"SYSTEM: RarmaRadio 2.72.8": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49906"}} {"text": "Redragon Gaming Mouse - 'REDRAGON_MOUSE.sys' Denial of Service (PoC)", "spans": {"SYSTEM: Redragon Gaming Mouse": [[0, 21]], "VULNERABILITY: Denial of Service (PoC)": [[45, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50322"}} {"text": "Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC)", "spans": {"SYSTEM: Remote Desktop Gateway": [[0, 22]], "VULNERABILITY: Denial of Service (PoC)": [[36, 59]]}, "info": {"source": "exploitdb", "exploit_id": "47963"}} {"text": "RemShutdown 2.9.0.0 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: RemShutdown 2.9.0.0": [[0, 19]], "VULNERABILITY: Denial of Service (PoC)": [[28, 51]]}, "info": {"source": "exploitdb", "exploit_id": "47863"}} {"text": "RemShutdown 2.9.0.0 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: RemShutdown 2.9.0.0": [[0, 19]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "47865"}} {"text": "RTSP for iOS 1.0 - 'IP Address' Denial of Service (PoC)", "spans": {"SYSTEM: RTSP for iOS 1.0": [[0, 16]], "VULNERABILITY: Denial of Service (PoC)": [[32, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48729"}} {"text": "Sandboxie 5.49.7 - Denial of Service (PoC)", "spans": {"SYSTEM: Sandboxie 5.49.7": [[0, 16]], "VULNERABILITY: Denial of Service (PoC)": [[19, 42]]}, "info": {"source": "exploitdb", "exploit_id": "49844"}} {"text": "Scdbg 1.0 - Buffer overflow DoS", "spans": {"SYSTEM: Scdbg 1.0": [[0, 9]], "VULNERABILITY: Buffer overflow DoS": [[12, 31]]}, "info": {"source": "exploitdb", "exploit_id": "51081"}} {"text": "ShareAlarmPro Advanced Network Access Control - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: ShareAlarmPro Advanced Network Access Control": [[0, 45]], "VULNERABILITY: Denial of Service (PoC)": [[54, 77]]}, "info": {"source": "exploitdb", "exploit_id": "47859"}} {"text": "SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service (PoC)", "spans": {"SYSTEM: SmartFTP Client 10.0.2909.0": [[0, 27]], "VULNERABILITY: Denial of Service (PoC)": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50266"}} {"text": "SpotAuditor 5.3.4 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: SpotAuditor 5.3.4": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48285"}} {"text": "SpotAuditor 5.3.5 - 'multiple' Denial Of Service (PoC)", "spans": {"SYSTEM: SpotAuditor 5.3.5": [[0, 17]], "VULNERABILITY: Denial Of Service": [[31, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49589"}} {"text": "SpotDialup 1.6.7 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: SpotDialup 1.6.7": [[0, 16]], "VULNERABILITY: Denial of Service (PoC)": [[25, 48]]}, "info": {"source": "exploitdb", "exploit_id": "47872"}} {"text": "SpotDialup 1.6.7 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: SpotDialup 1.6.7": [[0, 16]], "VULNERABILITY: Denial of Service (PoC)": [[26, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47904"}} {"text": "SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: SpotFTP FTP Password Recovery 3.0.0.0": [[0, 37]], "VULNERABILITY: Denial of Service (PoC)": [[46, 69]]}, "info": {"source": "exploitdb", "exploit_id": "47849"}} {"text": "SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: SpotFTP FTP Password Recovery 3.0.0.0": [[0, 37]], "VULNERABILITY: Denial of Service (PoC)": [[47, 70]]}, "info": {"source": "exploitdb", "exploit_id": "47868"}} {"text": "SpotFTP-FTP Password Recover 2.4.8 - Denial of Service (PoC)", "spans": {"SYSTEM: SpotFTP-FTP Password Recover 2.4.8": [[0, 34]], "VULNERABILITY: Denial of Service (PoC)": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48132"}} {"text": "SpotIE 2.9.5 - 'Key' Denial of Service (PoC)", "spans": {"SYSTEM: SpotIE 2.9.5": [[0, 12]], "VULNERABILITY: Denial of Service (PoC)": [[21, 44]]}, "info": {"source": "exploitdb", "exploit_id": "47855"}} {"text": "SpotIM 2.2 - 'Name' Denial Of Service", "spans": {"SYSTEM: SpotIM 2.2": [[0, 10]], "VULNERABILITY: Denial Of Service": [[20, 37]]}, "info": {"source": "exploitdb", "exploit_id": "47870"}} {"text": "SpotMSN 2.4.6 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: SpotMSN 2.4.6": [[0, 13]], "VULNERABILITY: Denial of Service (PoC)": [[23, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47869"}} {"text": "SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)", "spans": {"SYSTEM: SpotOutlook 1.2.6": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[27, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47906"}} {"text": "SuperMailer v11.20 - Buffer overflow DoS", "spans": {"SYSTEM: SuperMailer v11.20": [[0, 18]], "VULNERABILITY: Buffer overflow DoS": [[21, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51102"}} {"text": "SyncBreeze 15.2.24 - 'login' Denial of Service", "spans": {"SYSTEM: SyncBreeze 15.2.24": [[0, 18]], "VULNERABILITY: Denial of Service": [[29, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51725"}} {"text": "Sysax Multi Server 5.50 - Denial of Service (PoC)", "spans": {"SYSTEM: Sysax Multi Server 5.50": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[26, 49]]}, "info": {"source": "exploitdb", "exploit_id": "47947"}} {"text": "Sysax Multi Server 6.95 - 'Password' Denial of Service (PoC)", "spans": {"SYSTEM: Sysax Multi Server 6.95": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[37, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51066"}} {"text": "TapinRadio 2.12.3 - 'address' Denial of Service (PoC)", "spans": {"SYSTEM: TapinRadio 2.12.3": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[30, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48011"}} {"text": "TapinRadio 2.12.3 - 'username' Denial of Service (PoC)", "spans": {"SYSTEM: TapinRadio 2.12.3": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48013"}} {"text": "TapinRadio 2.13.7 - Denial of Service (PoC)", "spans": {"SYSTEM: TapinRadio 2.13.7": [[0, 17]], "VULNERABILITY: Denial of Service (PoC)": [[20, 43]]}, "info": {"source": "exploitdb", "exploit_id": "49206"}} {"text": "TaskCanvas 1.4.0 - 'Registration' Denial Of Service", "spans": {"SYSTEM: TaskCanvas 1.4.0": [[0, 16]], "VULNERABILITY: Denial Of Service": [[34, 51]]}, "info": {"source": "exploitdb", "exploit_id": "47911"}} {"text": "Telegram Desktop 2.9.2 - Denial of Service (PoC)", "spans": {"SYSTEM: Telegram Desktop 2.9.2": [[0, 22]], "VULNERABILITY: Denial of Service (PoC)": [[25, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50247"}} {"text": "TextCrawler Pro3.1.1 - Denial of Service (PoC)", "spans": {"SYSTEM: TextCrawler Pro3.1.1": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[23, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47862"}} {"text": "Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC)", "spans": {"SYSTEM: Top Password Firefox Password Recovery 2.8": [[0, 42]], "VULNERABILITY: Denial of Service (PoC)": [[45, 68]]}, "info": {"source": "exploitdb", "exploit_id": "47912"}} {"text": "Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC)", "spans": {"SYSTEM: Top Password Software Dialup Password Recovery 1.30": [[0, 51]], "VULNERABILITY: Denial of Service (PoC)": [[54, 77]]}, "info": {"source": "exploitdb", "exploit_id": "47907"}} {"text": "Tunnel Interface Driver - Denial of Service", "spans": {"SYSTEM: Tunnel Interface Driver": [[0, 23]], "VULNERABILITY: Denial of Service": [[26, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51114"}} {"text": "UltraVNC Launcher 1.2.4.0 - 'Password' Denial of Service (PoC)", "spans": {"SYSTEM: UltraVNC Launcher 1.2.4.0": [[0, 25]], "VULNERABILITY: Denial of Service (PoC)": [[39, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48290"}} {"text": "UltraVNC Launcher 1.2.4.0 - 'RepeaterHost' Denial of Service (PoC)", "spans": {"SYSTEM: UltraVNC Launcher 1.2.4.0": [[0, 25]], "VULNERABILITY: Denial of Service (PoC)": [[43, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48288"}} {"text": "UltraVNC Viewer 1.2.4.0 - 'VNCServer' Denial of Service (PoC)", "spans": {"SYSTEM: UltraVNC Viewer 1.2.4.0": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[38, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48291"}} {"text": "VirtualTablet Server 3.0.2 - Denial of Service (PoC)", "spans": {"SYSTEM: VirtualTablet Server 3.0.2": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[29, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48402"}} {"text": "VMware Workstation 15 Pro - Denial of Service", "spans": {"SYSTEM: VMware Workstation 15 Pro": [[0, 25]], "VULNERABILITY: Denial of Service": [[28, 45]]}, "info": {"source": "exploitdb", "exploit_id": "51100"}} {"text": "Windows TCP/IP - RCE Checker and Denial of Service", "spans": {"SYSTEM: Windows TCP/IP": [[0, 14]], "VULNERABILITY: Denial of Service": [[33, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52075"}} {"text": "XAMPP - Buffer Overflow POC", "spans": {"SYSTEM: XAMPP": [[0, 5]], "VULNERABILITY: Buffer Overflow": [[8, 23]]}, "info": {"source": "exploitdb", "exploit_id": "51800"}} {"text": "Xlight FTP 3.9.3.1 - Buffer Overflow (PoC)", "spans": {"SYSTEM: Xlight FTP 3.9.3.1": [[0, 18]], "VULNERABILITY: Buffer Overflow": [[21, 36]]}, "info": {"source": "exploitdb", "exploit_id": "50516"}} {"text": "Xlight FTP Server 3.9.3.6 - 'Stack Buffer Overflow' (DOS)", "spans": {"SYSTEM: Xlight FTP Server 3.9.3.6": [[0, 25]], "VULNERABILITY: 'Stack Buffer Overflow'": [[28, 51]]}, "info": {"source": "exploitdb", "exploit_id": "51665"}} {"text": "XWorm Trojan 2.1 - Null Pointer Derefernce DoS", "spans": {"SYSTEM: XWorm Trojan 2.1": [[0, 16]], "VULNERABILITY: Null Pointer Derefernce DoS": [[19, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51265"}} {"text": "Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC)", "spans": {"SYSTEM: Yenkee Hornet Gaming Mouse": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[45, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50311"}} {"text": "ZIP Password Recovery 2.30 - 'ZIP File' Denial of Service (PoC)", "spans": {"SYSTEM: ZIP Password Recovery 2.30": [[0, 26]], "VULNERABILITY: Denial of Service (PoC)": [[40, 63]]}, "info": {"source": "exploitdb", "exploit_id": "47894"}} {"text": "ZOC Terminal 7.25.5 - 'Script' Denial of Service (PoC)", "spans": {"SYSTEM: ZOC Terminal 7.25.5": [[0, 19]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48302"}} {"text": "ZOC Terminal v7.25.5 - 'Private key file' Denial of Service (PoC)", "spans": {"SYSTEM: ZOC Terminal v7.25.5": [[0, 20]], "VULNERABILITY: Denial of Service (PoC)": [[42, 65]]}, "info": {"source": "exploitdb", "exploit_id": "48292"}} {"text": "10-Strike Bandwidth Monitor 3.9 - Buffer Overflow (SEH) (ASLR + DEP Bypass)", "spans": {"SYSTEM: 10-Strike Bandwidth Monitor 3.9": [[0, 31]], "VULNERABILITY: Buffer Overflow": [[34, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48570"}} {"text": "10-Strike Network Inventory Explorer - 'srvInventoryWebServer' Unquoted Service Path", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer": [[0, 36]], "VULNERABILITY: Unquoted Service Path": [[63, 84]]}, "info": {"source": "exploitdb", "exploit_id": "48251"}} {"text": "10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer 8.54": [[0, 41]], "VULNERABILITY: Buffer Overflow": [[56, 71]]}, "info": {"source": "exploitdb", "exploit_id": "48253"}} {"text": "10-Strike Network Inventory Explorer 8.65 - Buffer Overflow (SEH)", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer 8.65": [[0, 41]], "VULNERABILITY: Buffer Overflow": [[44, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49134"}} {"text": "10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH) (ROP)", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer 9.03": [[0, 41]], "VULNERABILITY: Buffer Overflow": [[61, 76]]}, "info": {"source": "exploitdb", "exploit_id": "48264"}} {"text": "10-Strike Network Inventory Explorer Pro 9.05 - Buffer Overflow (SEH)", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer Pro 9.05": [[0, 45]], "VULNERABILITY: Buffer Overflow": [[48, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49322"}} {"text": "10-Strike Network Inventory Explorer Pro 9.31 - 'srvInventoryWebServer' Unquoted Service Path", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer Pro 9.31": [[0, 45]], "VULNERABILITY: Unquoted Service Path": [[72, 93]]}, "info": {"source": "exploitdb", "exploit_id": "50494"}} {"text": "10-Strike Network Inventory Explorer Pro 9.31 - Buffer Overflow (SEH)", "spans": {"SYSTEM: 10-Strike Network Inventory Explorer Pro 9.31": [[0, 45]], "VULNERABILITY: Buffer Overflow": [[48, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50472"}} {"text": "10Strike LANState 9.32 - 'Force Check' Buffer Overflow (SEH)", "spans": {"SYSTEM: 10Strike LANState 9.32": [[0, 22]], "VULNERABILITY: Buffer Overflow": [[39, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48277"}} {"text": "7 Sticky Notes v1.9 - OS Command Injection", "spans": {"SYSTEM: 7 Sticky Notes v1.9": [[0, 19]], "VULNERABILITY: Command Injection": [[25, 42]]}, "info": {"source": "exploitdb", "exploit_id": "51748"}} {"text": "Acer Updater Service 1.2.3500.0 - 'UpdaterService.exe' Unquoted Service Path", "spans": {"SYSTEM: Acer Updater Service 1.2.3500.0": [[0, 31]], "VULNERABILITY: Unquoted Service Path": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49890"}} {"text": "ActFax 10.10 - Unquoted Path Services", "spans": {"SYSTEM: ActFax 10.10": [[0, 12]], "VULNERABILITY: Unquoted Path Services": [[15, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51332"}} {"text": "Active WebCam 11.5 - Unquoted Service Path", "spans": {"SYSTEM: Active WebCam 11.5": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50273"}} {"text": "ActivIdentity 8.2 - 'ac.sharedstore' Unquoted Service Path", "spans": {"SYSTEM: ActivIdentity 8.2": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49703"}} {"text": "Adaware Web Companion 4.9.2159 - 'WCAssistantService' Unquoted Service Path", "spans": {"SYSTEM: Adaware Web Companion 4.9.2159": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "47852"}} {"text": "Advanced Host Monitor v12.56 - Unquoted Service Path", "spans": {"SYSTEM: Advanced Host Monitor v12.56": [[0, 28]], "VULNERABILITY: Unquoted Service Path": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51412"}} {"text": "Advanced System Care Service 13 - 'AdvancedSystemCareService13' Unquoted Service Path", "spans": {"SYSTEM: Advanced System Care Service 13": [[0, 31]], "VULNERABILITY: Unquoted Service Path": [[64, 85]]}, "info": {"source": "exploitdb", "exploit_id": "49049"}} {"text": "Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions", "spans": {"SYSTEM: Advanced System Repair Pro 1.9.1.7": [[0, 34]], "VULNERABILITY: Insecure File Permissions": [[37, 62]]}, "info": {"source": "exploitdb", "exploit_id": "47905"}} {"text": "AIDA64 Engineer 6.20.5300 - 'Report File' filename Buffer Overflow (SEH)", "spans": {"SYSTEM: AIDA64 Engineer 6.20.5300": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[51, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48281"}} {"text": "Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH)", "spans": {"SYSTEM: Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217": [[0, 48]], "VULNERABILITY: Stack Overflow": [[51, 65]]}, "info": {"source": "exploitdb", "exploit_id": "47910"}} {"text": "Allok Video Converter 4.6.1217 - Stack Overflow (SEH)", "spans": {"SYSTEM: Allok Video Converter 4.6.1217": [[0, 30]], "VULNERABILITY: Stack Overflow": [[33, 47]]}, "info": {"source": "exploitdb", "exploit_id": "47908"}} {"text": "Amarok 2.8.0 - Denial-of-Service", "spans": {"SYSTEM: Amarok 2.8.0": [[0, 12]], "VULNERABILITY: Denial-of-Service": [[15, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48993"}} {"text": "AMD Fuel Service - 'Fuel.service' Unquote Service Path", "spans": {"SYSTEM: AMD Fuel Service": [[0, 16]], "VULNERABILITY: Unquote Service Path": [[34, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49535"}} {"text": "Amica Prodigy 1.7 - Privilege Escalation", "spans": {"SYSTEM: Amica Prodigy 1.7": [[0, 17]], "VULNERABILITY: Privilege Escalation": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50184"}} {"text": "Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path", "spans": {"SYSTEM: Andrea ST Filters Service 1.0.64.7": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[66, 87]]}, "info": {"source": "exploitdb", "exploit_id": "48396"}} {"text": "AnyBurn 4.8 - Buffer Overflow (SEH)", "spans": {"SYSTEM: AnyBurn 4.8": [[0, 11]], "VULNERABILITY: Buffer Overflow": [[14, 29]]}, "info": {"source": "exploitdb", "exploit_id": "48211"}} {"text": "AnyDesk 5.4.0 - Unquoted Service Path", "spans": {"SYSTEM: AnyDesk 5.4.0": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "47883"}} {"text": "AnyDesk 7.0.15 - Unquoted Service Path", "spans": {"SYSTEM: AnyDesk 7.0.15": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51968"}} {"text": "AnyDesk 9.0.1 - Unquoted Service Path", "spans": {"SYSTEM: AnyDesk 9.0.1": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "52258"}} {"text": "AnyTXT Searcher 1.2.394 - 'ATService' Unquoted Service Path", "spans": {"SYSTEM: AnyTXT Searcher 1.2.394": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49549"}} {"text": "Arcsoft PhotoStudio 6.0.0.172 - Unquoted Service Path", "spans": {"SYSTEM: Arcsoft PhotoStudio 6.0.0.172": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51393"}} {"text": "Argus Surveillance DVR 4.0 - Unquoted Service Path", "spans": {"SYSTEM: Argus Surveillance DVR 4.0": [[0, 26]], "VULNERABILITY: Unquoted Service Path": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50261"}} {"text": "Argus Surveillance DVR 4.0 - Weak Password Encryption", "spans": {"SYSTEM: Argus Surveillance DVR 4.0": [[0, 26]], "VULNERABILITY: Weak Password Encryption": [[29, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50130"}} {"text": "aSc TimeTables 2021.6.2 - Denial of Service (PoC)", "spans": {"SYSTEM: aSc TimeTables 2021.6.2": [[0, 23]], "VULNERABILITY: Denial of Service (PoC)": [[26, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49147"}} {"text": "AspEmail v5.6.0.2 - Local Privilege Escalation", "spans": {"SYSTEM: AspEmail v5.6.0.2": [[0, 17]], "VULNERABILITY: Local Privilege Escalation": [[20, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51380"}} {"text": "ASUS AAHM 1.00.22 - 'asHmComSvc' Unquoted Service Path", "spans": {"SYSTEM: ASUS AAHM 1.00.22": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48206"}} {"text": "ASUS AXSP 1.02.00 - 'asComSvc' Unquoted Service Path", "spans": {"SYSTEM: ASUS AXSP 1.02.00": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48193"}} {"text": "ASUS Control Center Express 01.06.15 - Unquoted Service Path", "spans": {"SYSTEM: ASUS Control Center Express 01.06.15": [[0, 36]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51939"}} {"text": "Asus GameSDK v1.0.0.4 - 'GameSDK.exe' Unquoted Service Path", "spans": {"SYSTEM: Asus GameSDK v1.0.0.4": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50985"}} {"text": "ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path", "spans": {"SYSTEM: ASUS GiftBox Desktop 1.1.1.127": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48173"}} {"text": "ASUS HID Access Service 1.0.94.0 - 'AsHidSrv.exe' Unquoted Service Path", "spans": {"SYSTEM: ASUS HID Access Service 1.0.94.0": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49888"}} {"text": "ASX to MP3 converter 3.1.3.7.2010.11.05 - '.wax' Local Buffer Overflow (DEP_ASLR Bypass) (PoC)", "spans": {"SYSTEM: ASX to MP3 converter 3.1.3.7.2010.11.05": [[0, 39]], "VULNERABILITY: Buffer Overflow": [[55, 70]]}, "info": {"source": "exploitdb", "exploit_id": "48769"}} {"text": "Atheros Coex Service Application 8.0.0.255 - 'ZAtheros Bt&Wlan Coex Agent' Unquoted Service Path", "spans": {"SYSTEM: Atheros Coex Service Application 8.0.0.255": [[0, 42]], "VULNERABILITY: Unquoted Service Path": [[75, 96]]}, "info": {"source": "exploitdb", "exploit_id": "49053"}} {"text": "Atomic Alarm Clock 6.3 - Stack Overflow (Unicode+SEH)", "spans": {"SYSTEM: Atomic Alarm Clock 6.3": [[0, 22]], "VULNERABILITY: Stack Overflow": [[25, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48346"}} {"text": "Audio Conversion Wizard v2.01 - Buffer Overflow", "spans": {"SYSTEM: Audio Conversion Wizard v2.01": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[32, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50811"}} {"text": "Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)", "spans": {"SYSTEM: Audio Playback Recorder 3.2.2": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48796"}} {"text": "Automox Agent 32 - Local Privilege Escalation", "spans": {"SYSTEM: Automox Agent 32": [[0, 16]], "VULNERABILITY: Local Privilege Escalation": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50642"}} {"text": "AVAST Antivirus 25.11 - Unquoted Service Path", "spans": {"SYSTEM: AVAST Antivirus 25.11": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "52510"}} {"text": "AVAST SecureLine 5.5.522.0 - 'SecureLine' Unquoted Service Path", "spans": {"SYSTEM: AVAST SecureLine 5.5.522.0": [[0, 26]], "VULNERABILITY: Unquoted Service Path": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48249"}} {"text": "AVG Anti Spyware 7.5 - Unquoted Service Path _AVG Anti-Spyware Guard_", "spans": {"SYSTEM: AVG Anti Spyware 7.5": [[0, 20]], "VULNERABILITY: Unquoted Service Path _AVG Anti-Spyware Guard_": [[23, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51583"}} {"text": "AVS Audio Converter 10.3 - Stack Overflow (SEH)", "spans": {"SYSTEM: AVS Audio Converter 10.3": [[0, 24]], "VULNERABILITY: Stack Overflow": [[27, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51090"}} {"text": "B64dec 1.1.2 - Buffer Overflow (SEH Overflow + EggHunter)", "spans": {"SYSTEM: B64dec 1.1.2": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[15, 30]]}, "info": {"source": "exploitdb", "exploit_id": "48317"}} {"text": "BacklinkSpeed 2.4 - Buffer Overflow PoC (SEH)", "spans": {"SYSTEM: BacklinkSpeed 2.4": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[20, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48726"}} {"text": "Backup Key Recovery 2.2.7 - Denial of Service (PoC)", "spans": {"SYSTEM: Backup Key Recovery 2.2.7": [[0, 25]], "VULNERABILITY: Denial of Service (PoC)": [[28, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49966"}} {"text": "Backup Manager Module 3.0.0.99 - 'IScheduleSvc.exe' Unquoted Service Path", "spans": {"SYSTEM: Backup Manager Module 3.0.0.99": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49889"}} {"text": "Bandwidth Monitor 3.9 - 'Svc10StrikeBandMontitor' Unquoted Service Path", "spans": {"SYSTEM: Bandwidth Monitor 3.9": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "48591"}} {"text": "BarcodeOCR 19.3.6 - 'BarcodeOCR' Unquoted Service Path", "spans": {"SYSTEM: BarcodeOCR 19.3.6": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48740"}} {"text": "BarracudaDrive v6.5 - Insecure Folder Permissions", "spans": {"SYSTEM: BarracudaDrive v6.5": [[0, 19]], "VULNERABILITY: Insecure Folder Permissions": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48789"}} {"text": "Battle.Net 1.27.1.12428 - Insecure File Permissions", "spans": {"SYSTEM: Battle.Net 1.27.1.12428": [[0, 23]], "VULNERABILITY: Insecure File Permissions": [[26, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48873"}} {"text": "BattlEye 0.9 - 'BEService' Unquoted Service Path", "spans": {"SYSTEM: BattlEye 0.9": [[0, 12]], "VULNERABILITY: Unquoted Service Path": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50815"}} {"text": "BearShare Lite 5.2.5 - 'Advanced Search'Buffer Overflow in (PoC)", "spans": {"SYSTEM: BearShare Lite 5.2.5": [[0, 20]], "VULNERABILITY: Buffer Overflow": [[40, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48839"}} {"text": "BlazeDVD 7.0 Professional - '.plf' Local Buffer Overflow (SEH_ASLR_DEP)", "spans": {"SYSTEM: BlazeDVD 7.0 Professional": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[41, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48776"}} {"text": "BlazeDVD 7.0.2 - Buffer Overflow (SEH)", "spans": {"SYSTEM: BlazeDVD 7.0.2": [[0, 14]], "VULNERABILITY: Buffer Overflow": [[17, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48329"}} {"text": "Bluetooth Application 5.4.277 - 'BlueSoleilCS' Unquoted Service Path", "spans": {"SYSTEM: Bluetooth Application 5.4.277": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50761"}} {"text": "Bonjour Service 'mDNSResponder.exe' - Unquoted Service Path Privilege Escalation", "spans": {"SYSTEM: Bonjour Service 'mDNSResponder.exe'": [[0, 35]], "VULNERABILITY: Privilege Escalation": [[60, 80]]}, "info": {"source": "exploitdb", "exploit_id": "52061"}} {"text": "BOOTP Turbo 2.0.0.1253 - 'bootpt.exe' Unquoted Service Path", "spans": {"SYSTEM: BOOTP Turbo 2.0.0.1253": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49851"}} {"text": "BOOTP Turbo 2.0.1214 - 'BOOTP Turbo' Unquoted Service Path", "spans": {"SYSTEM: BOOTP Turbo 2.0.1214": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48078"}} {"text": "Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH)", "spans": {"SYSTEM: Boxoft Audio Converter 2.3.0": [[0, 28]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49089"}} {"text": "Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit", "spans": {"SYSTEM: Boxoft Convert Master 1.3.0": [[0, 27]], "VULNERABILITY: SEH Local Exploit": [[36, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49088"}} {"text": "BRAdmin Professional 3.75 - 'BRA_Scheduler' Unquoted Service Path", "spans": {"SYSTEM: BRAdmin Professional 3.75": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49671"}} {"text": "Brother BRAgent 1.38 - 'WBA_Agent_Client' Unquoted Service Path", "spans": {"SYSTEM: Brother BRAgent 1.38": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50010"}} {"text": "Brother BRPrint Auditor - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: Brother BRPrint Auditor": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50005"}} {"text": "bVPN 2.5.1 - 'waselvpnserv' Unquoted Service Path", "spans": {"SYSTEM: bVPN 2.5.1": [[0, 10]], "VULNERABILITY: Unquoted Service Path": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49632"}} {"text": "Cain & Abel 4.9.56 - Unquoted Service Path", "spans": {"SYSTEM: Cain & Abel 4.9.56": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50728"}} {"text": "Canon Inkjet Extended Survey Program 5.1.0.8 - 'IJPLMSVC.EXE' - Unquoted Service Path", "spans": {"SYSTEM: Canon Inkjet Extended Survey Program 5.1.0.8": [[0, 44]], "VULNERABILITY: - Unquoted Service Path": [[63, 86]]}, "info": {"source": "exploitdb", "exploit_id": "49019"}} {"text": "Chromacam 4.0.3.0 - PsyFrameGrabberService Unquoted Service Path", "spans": {"SYSTEM: Chromacam 4.0.3.0": [[0, 17]], "VULNERABILITY: PsyFrameGrabberService Unquoted Service Path": [[20, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51210"}} {"text": "Cloudflare WARP 1.4 - Unquoted Service Path", "spans": {"SYSTEM: Cloudflare WARP 1.4": [[0, 19]], "VULNERABILITY: Unquoted Service Path": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50805"}} {"text": "CloudMe 1.11.2 - Buffer Overflow (SEH_DEP_ASLR)", "spans": {"SYSTEM: CloudMe 1.11.2": [[0, 14]], "VULNERABILITY: Buffer Overflow": [[17, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48499"}} {"text": "CloudMe 1.11.2 - Buffer Overflow ROP (DEP_ASLR)", "spans": {"SYSTEM: CloudMe 1.11.2": [[0, 14]], "VULNERABILITY: Buffer Overflow": [[17, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48840"}} {"text": "Cmder Console Emulator 1.3.18 - 'Cmder.exe' Denial of Service (PoC)", "spans": {"SYSTEM: Cmder Console Emulator 1.3.18": [[0, 29]], "VULNERABILITY: Denial of Service (PoC)": [[44, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50401"}} {"text": "Cobian Backup 0.9 - Unquoted Service Path", "spans": {"SYSTEM: Cobian Backup 0.9": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50810"}} {"text": "Cobian Backup 11 Gravity 11.2.0.582 - 'Password' Denial of Service (PoC)", "spans": {"SYSTEM: Cobian Backup 11 Gravity 11.2.0.582": [[0, 35]], "VULNERABILITY: Denial of Service (PoC)": [[49, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50790"}} {"text": "Cobian Backup Gravity 11.2.0.582 - 'CobianBackup11' Unquoted Service Path", "spans": {"SYSTEM: Cobian Backup Gravity 11.2.0.582": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50791"}} {"text": "Cobian Reflector 0.9.93 RC1 - 'Password' Denial of Service (PoC)", "spans": {"SYSTEM: Cobian Reflector 0.9.93 RC1": [[0, 27]], "VULNERABILITY: Denial of Service (PoC)": [[41, 64]]}, "info": {"source": "exploitdb", "exploit_id": "50789"}} {"text": "Code Blocks 16.01 - Buffer Overflow (SEH) UNICODE", "spans": {"SYSTEM: Code Blocks 16.01": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[20, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48344"}} {"text": "Code Blocks 17.12 - 'File Name' Local Buffer Overflow (Unicode) (SEH) (PoC)", "spans": {"SYSTEM: Code Blocks 17.12": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48594"}} {"text": "CodeMeter 6.60 - 'CodeMeter.exe' Unquoted Service Path", "spans": {"SYSTEM: CodeMeter 6.60": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48735"}} {"text": "Configuration Tool 1.6.53 - 'OpLclSrv' Unquoted Service Path", "spans": {"SYSTEM: Configuration Tool 1.6.53": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49624"}} {"text": "Connectify Hotspot 2018 'ConnectifyService' - Unquoted Service Path", "spans": {"SYSTEM: Connectify Hotspot 2018 'ConnectifyService'": [[0, 43]], "VULNERABILITY: Unquoted Service Path": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50764"}} {"text": "CONTPAQi(R) AdminPAQ 14.0.0 - Unquoted Service Path", "spans": {"SYSTEM: CONTPAQi(R) AdminPAQ 14.0.0": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[30, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50690"}} {"text": "CoolerMaster MasterPlus 1.8.5 - 'MPService' Unquoted Service Path", "spans": {"SYSTEM: CoolerMaster MasterPlus 1.8.5": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51159"}} {"text": "CrowdStrike Falcon AGENT 6.44.15806 - Uninstall without Installation Token", "spans": {"SYSTEM: CrowdStrike Falcon AGENT 6.44.15806": [[0, 36]], "VULNERABILITY: Uninstall without Installation Token": [[40, 76]]}, "info": {"source": "exploitdb", "exploit_id": "51146"}} {"text": "Cuckoo Clock v5.0 - Buffer Overflow", "spans": {"SYSTEM: Cuckoo Clock v5.0": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[20, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48087"}} {"text": "Cyberfox Web Browser 52.9.1 - Denial of Service (PoC)", "spans": {"SYSTEM: Cyberfox Web Browser 52.9.1": [[0, 27]], "VULNERABILITY: Denial of Service (PoC)": [[30, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50336"}} {"text": "Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Cyberoam Authentication Client 2.1.2.7": [[0, 38]], "VULNERABILITY: Buffer Overflow": [[41, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48148"}} {"text": "Dameware Remote Support 12.1.1.273 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Dameware Remote Support 12.1.1.273": [[0, 34]], "VULNERABILITY: Buffer Overflow": [[37, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48469"}} {"text": "dataSIMS Avionics ARINC 664-1 - Local Buffer Overflow (PoC)", "spans": {"SYSTEM: dataSIMS Avionics ARINC 664-1": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49577"}} {"text": "Deep Instinct Windows Agent 1.2.24.0 - 'DeepNetworkService' Unquoted Service Path", "spans": {"SYSTEM: Deep Instinct Windows Agent 1.2.24.0": [[0, 36]], "VULNERABILITY: Unquoted Service Path": [[60, 81]]}, "info": {"source": "exploitdb", "exploit_id": "49020"}} {"text": "Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path", "spans": {"SYSTEM: Deep Instinct Windows Agent 1.2.29.0": [[0, 36]], "VULNERABILITY: Unquoted Service Path": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48174"}} {"text": "DELL dbutil_2_3.sys 2.3 - Arbitrary Write to Local Privilege Escalation (LPE)", "spans": {"SYSTEM: DELL dbutil_2_3.sys 2.3": [[0, 23]], "VULNERABILITY: Local Privilege Escalation": [[45, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49893"}} {"text": "Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation", "spans": {"SYSTEM: Desktop Window Manager Core Library 10.0.10240.0": [[0, 48]], "VULNERABILITY: Privilege Escalation": [[51, 71]]}, "info": {"source": "exploitdb", "exploit_id": "52493"}} {"text": "DHCP Broadband 4.1.0.1503 - 'dhcpt.exe' Unquoted Service Path", "spans": {"SYSTEM: DHCP Broadband 4.1.0.1503": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49850"}} {"text": "DHCP Turbo 4.61298 - 'DHCP Turbo 4' Unquoted Service Path", "spans": {"SYSTEM: DHCP Turbo 4.61298": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48080"}} {"text": "DigitalPersona 4.5.0.2213 - 'DpHostW' Unquoted Service Path", "spans": {"SYSTEM: DigitalPersona 4.5.0.2213": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49008"}} {"text": "DigitalPersona 5.1.0.656 'DpHostW' - Unquoted Service Path", "spans": {"SYSTEM: DigitalPersona 5.1.0.656 'DpHostW'": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49041"}} {"text": "Disk Savvy 13.6.14 - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: Disk Savvy 13.6.14": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50024"}} {"text": "Disk Savvy Enterprise 12.3.18 - Unquoted Service Path", "spans": {"SYSTEM: Disk Savvy Enterprise 12.3.18": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48049"}} {"text": "Disk Sorter Enterprise 12.4.16 - 'Disk Sorter Enterprise' Unquoted Service Path", "spans": {"SYSTEM: Disk Sorter Enterprise 12.4.16": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[58, 79]]}, "info": {"source": "exploitdb", "exploit_id": "48048"}} {"text": "Disk Sorter Enterprise 13.6.12 - 'Disk Sorter Enterprise' Unquoted Service Path", "spans": {"SYSTEM: Disk Sorter Enterprise 13.6.12": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[58, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50014"}} {"text": "Disk Sorter Server 13.6.12 - 'Disk Sorter Server' Unquoted Service Path", "spans": {"SYSTEM: Disk Sorter Server 13.6.12": [[0, 26]], "VULNERABILITY: Unquoted Service Path": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "50013"}} {"text": "DiskBoss 7.7.14 - 'Input Directory' Local Buffer Overflow (PoC)", "spans": {"SYSTEM: DiskBoss 7.7.14": [[0, 15]], "VULNERABILITY: Buffer Overflow": [[42, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48279"}} {"text": "DiskBoss 7.7.14 - 'Reports and Data Directory' Buffer Overflow (SEH Egghunter)", "spans": {"SYSTEM: DiskBoss 7.7.14": [[0, 15]], "VULNERABILITY: Buffer Overflow": [[47, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48689"}} {"text": "DiskBoss Service 12.2.18 - 'diskbsa.exe' Unquoted Service Path", "spans": {"SYSTEM: DiskBoss Service 12.2.18": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49899"}} {"text": "DiskBoss v11.7.28 - Multiple Services Unquoted Service Path", "spans": {"SYSTEM: DiskBoss v11.7.28": [[0, 17]], "VULNERABILITY: Multiple Services Unquoted Service Path": [[20, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49022"}} {"text": "DiskPulse 13.6.14 - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: DiskPulse 13.6.14": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50012"}} {"text": "Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Docker-Credential-Wincred.exe": [[0, 29]], "VULNERABILITY: Privilege Escalation": [[32, 52]], "TOOL: Metasploit": [[54, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48388"}} {"text": "docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter)", "spans": {"SYSTEM: docPrint Pro 8.0": [[0, 16]], "VULNERABILITY: Buffer Overflow": [[29, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49100"}} {"text": "Dr. Fone 4.0.8 - 'net_updater32.exe' Unquoted Service Path", "spans": {"SYSTEM: Dr. Fone 4.0.8": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50977"}} {"text": "Druva inSync Windows Client 6.5.2 - Local Privilege Escalation", "spans": {"SYSTEM: Druva inSync Windows Client 6.5.2": [[0, 33]], "VULNERABILITY: Local Privilege Escalation": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48400"}} {"text": "Druva inSync Windows Client 6.6.3 - Local Privilege Escalation", "spans": {"SYSTEM: Druva inSync Windows Client 6.6.3": [[0, 33]], "VULNERABILITY: Local Privilege Escalation": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48505"}} {"text": "Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell)", "spans": {"SYSTEM: Druva inSync Windows Client 6.6.3": [[0, 33]], "VULNERABILITY: Local Privilege Escalation": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49211"}} {"text": "Dup Scout 13.5.28 - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: Dup Scout 13.5.28": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50025"}} {"text": "DVD Photo Slideshow Professional 8.07 - 'Key' Buffer Overflow", "spans": {"SYSTEM: DVD Photo Slideshow Professional 8.07": [[0, 37]], "VULNERABILITY: Buffer Overflow": [[46, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48041"}} {"text": "DVD Photo Slideshow Professional 8.07 - 'Name' Buffer Overflow", "spans": {"SYSTEM: DVD Photo Slideshow Professional 8.07": [[0, 37]], "VULNERABILITY: Buffer Overflow": [[47, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48046"}} {"text": "Dynojet Power Core 2.3.0 - Unquoted Service Path", "spans": {"SYSTEM: Dynojet Power Core 2.3.0": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50466"}} {"text": "EaseUS Data Recovery - 'ensserver.exe' Unquoted Service Path", "spans": {"SYSTEM: EaseUS Data Recovery": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50886"}} {"text": "Easy MPEG to DVD Burner 1.7.11 - Buffer Overflow (SEH + DEP)", "spans": {"SYSTEM: Easy MPEG to DVD Burner 1.7.11": [[0, 30]], "VULNERABILITY: Buffer Overflow": [[33, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48339"}} {"text": "Easy RM to MP3 Converter 2.7.3.700 - 'Input' Local Buffer Overflow (SEH)", "spans": {"SYSTEM: Easy RM to MP3 Converter 2.7.3.700": [[0, 34]], "VULNERABILITY: Buffer Overflow": [[51, 66]]}, "info": {"source": "exploitdb", "exploit_id": "48257"}} {"text": "eBeam education suite 2.5.0.9 - 'eBeam Device Service' Unquoted Service Path", "spans": {"SYSTEM: eBeam education suite 2.5.0.9": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49647"}} {"text": "Eclipse Mosquitto MQTT broker 2.0.9 - 'mosquitto' Unquoted Service Path", "spans": {"SYSTEM: Eclipse Mosquitto MQTT broker 2.0.9": [[0, 35]], "VULNERABILITY: Unquoted Service Path": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49673"}} {"text": "ELAN Smart-Pad 11.10.15.1 - 'ETDService' Unquoted Service Path", "spans": {"SYSTEM: ELAN Smart-Pad 11.10.15.1": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48009"}} {"text": "ELAN Touchpad 15.2.13.1_X64_WHQL - 'ETDService' Unquoted Service Path", "spans": {"SYSTEM: ELAN Touchpad 15.2.13.1_X64_WHQL": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49702"}} {"text": "Elodea Event Collector 4.9.3 - 'ElodeaEventCollectorService' Unquoted Service Path", "spans": {"SYSTEM: Elodea Event Collector 4.9.3": [[0, 28]], "VULNERABILITY: Unquoted Service Path": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "49704"}} {"text": "EmEditor 19.8 - Insecure File Permissions", "spans": {"SYSTEM: EmEditor 19.8": [[0, 13]], "VULNERABILITY: Insecure File Permissions": [[16, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48398"}} {"text": "Emerson PAC Machine Edition 9.80 Build 8695 - 'TrapiServer' Unquoted Service Path", "spans": {"SYSTEM: Emerson PAC Machine Edition 9.80 Build 8695": [[0, 43]], "VULNERABILITY: Unquoted Service Path": [[60, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50745"}} {"text": "Epic Games Easy Anti-Cheat 4.0 - Local Privilege Escalation", "spans": {"SYSTEM: Epic Games Easy Anti-Cheat 4.0": [[0, 30]], "VULNERABILITY: Local Privilege Escalation": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49841"}} {"text": "Epic Games Rocket League 1.95 - Stack Buffer Overrun", "spans": {"SYSTEM: Epic Games Rocket League 1.95": [[0, 29]], "VULNERABILITY: Stack Buffer Overrun": [[32, 52]]}, "info": {"source": "exploitdb", "exploit_id": "49848"}} {"text": "ePowerSvc 6.0.3008.0 - 'ePowerSvc.exe' Unquoted Service Path", "spans": {"SYSTEM: ePowerSvc 6.0.3008.0": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49900"}} {"text": "EPSON EasyMP Network Projection 2.81 - 'EMP_NSWLSV' Unquoted Service Path", "spans": {"SYSTEM: EPSON EasyMP Network Projection 2.81": [[0, 36]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48069"}} {"text": "EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path", "spans": {"SYSTEM: EPSON Status Monitor 3 'EPSON_PM_RPCV4_06'": [[0, 42]], "VULNERABILITY: Unquoted Service Path": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49141"}} {"text": "Epson USB Display 1.6.0.0 - 'EMP_UDSA' Unquoted Service Path", "spans": {"SYSTEM: Epson USB Display 1.6.0.0": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49548"}} {"text": "ESET NOD32 Antivirus 17.0.16.0 - Unquoted Service Path", "spans": {"SYSTEM: ESET NOD32 Antivirus 17.0.16.0": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51964"}} {"text": "ESET Service 16.0.26.0 - 'Service ekrn' Unquoted Service Path", "spans": {"SYSTEM: ESET Service 16.0.26.0": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51351"}} {"text": "Ether_MP3_CD_Burner 1.3.8 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Ether_MP3_CD_Burner 1.3.8": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[28, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50332"}} {"text": "Exploit - EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path", "spans": {"SYSTEM: Exploit": [[0, 7]], "VULNERABILITY: EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path": [[10, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48965"}} {"text": "Explorer32++ v1.3.5.531 - Buffer overflow", "spans": {"SYSTEM: Explorer32++ v1.3.5.531": [[0, 23]], "VULNERABILITY: Buffer overflow": [[26, 41]]}, "info": {"source": "exploitdb", "exploit_id": "51077"}} {"text": "Ext2Fsd v0.68 - 'Ext2Srv' Unquoted Service Path", "spans": {"SYSTEM: Ext2Fsd v0.68": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[26, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49706"}} {"text": "FastStone Image Viewer 7.5 - .cur BITMAPINFOHEADER 'BitCount' Stack Based Buffer Overflow (ASLR & DEP Bypass)", "spans": {"SYSTEM: FastStone Image Viewer 7.5": [[0, 26]], "VULNERABILITY: Buffer Overflow": [[74, 89]]}, "info": {"source": "exploitdb", "exploit_id": "49660"}} {"text": "File Replication Pro 7.5.0 - Privilege Escalation/Password reset due Incorrect Access Control", "spans": {"SYSTEM: File Replication Pro 7.5.0": [[0, 26]], "VULNERABILITY: Privilege Escalation": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51375"}} {"text": "File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path", "spans": {"SYSTEM: File Sanitizer for HP ProtectTools 5.0.1.3": [[0, 42]], "VULNERABILITY: Unquoted Service Path": [[59, 80]]}, "info": {"source": "exploitdb", "exploit_id": "50763"}} {"text": "FileZilla Client 3.63.1 - 'TextShaping.dl' DLL Hijacking", "spans": {"SYSTEM: FileZilla Client 3.63.1": [[0, 23]], "VULNERABILITY: DLL Hijacking": [[43, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51267"}} {"text": "Filmora 12 version ( Build 1.0.0.7) - Unquoted Service Paths Privilege Escalation", "spans": {"SYSTEM: Filmora 12 version ( Build 1.0.0.7)": [[0, 35]], "VULNERABILITY: Privilege Escalation": [[61, 81]]}, "info": {"source": "exploitdb", "exploit_id": "51483"}} {"text": "FLAME II MODEM USB - Unquoted Service Path", "spans": {"SYSTEM: FLAME II MODEM USB": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50708"}} {"text": "Fluentd TD-agent plugin 4.0.1 - Insecure Folder Permission", "spans": {"SYSTEM: Fluentd TD-agent plugin 4.0.1": [[0, 29]], "VULNERABILITY: Insecure Folder Permission": [[32, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49363"}} {"text": "ForensiTAppxService 2.2.0.4 - 'ForensiTAppxService.exe' Unquoted Service Path", "spans": {"SYSTEM: ForensiTAppxService 2.2.0.4": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "48821"}} {"text": "Foxit PDF Reader 11.0 - Unquoted Service Path", "spans": {"SYSTEM: Foxit PDF Reader 11.0": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[24, 45]]}, "info": {"source": "exploitdb", "exploit_id": "50807"}} {"text": "Foxit Reader 9.0.1.1049 - Arbitrary Code Execution", "spans": {"SYSTEM: Foxit Reader 9.0.1.1049": [[0, 23]], "VULNERABILITY: Arbitrary Code Execution": [[26, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49116"}} {"text": "Foxit Reader 9.7.1 - Remote Command Execution (Javascript API)", "spans": {"SYSTEM: Foxit Reader 9.7.1": [[0, 18]], "VULNERABILITY: Remote Command Execution": [[21, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48982"}} {"text": "Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit)", "spans": {"SYSTEM: Free MP3 CD Ripper 2.8": [[0, 22]], "VULNERABILITY: Buffer Overflow": [[39, 54]], "TOOL: Metasploit": [[56, 66]]}, "info": {"source": "exploitdb", "exploit_id": "49087"}} {"text": "Free MP3 CD Ripper 2.8 - Stack Buffer Overflow (SEH + Egghunter)", "spans": {"SYSTEM: Free MP3 CD Ripper 2.8": [[0, 22]], "VULNERABILITY: Buffer Overflow": [[31, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48696"}} {"text": "Freefloat FTP Server 1.0 - 'PWD' Remote Buffer Overflow", "spans": {"SYSTEM: Freefloat FTP Server 1.0": [[0, 24]], "VULNERABILITY: Remote Buffer Overflow": [[33, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51706"}} {"text": "freeFTPd v1.0.13 - 'freeFTPdService' Unquoted Service Path", "spans": {"SYSTEM: freeFTPd v1.0.13": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48043"}} {"text": "FreeLAN 2.2 - 'FreeLAN Service' Unquoted Service Path", "spans": {"SYSTEM: FreeLAN 2.2": [[0, 11]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49630"}} {"text": "FreeSSHd 1.3.1 - 'FreeSSHDService' Unquoted Service Path", "spans": {"SYSTEM: FreeSSHd 1.3.1": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "48044"}} {"text": "Frhed (Free hex editor) v1.6.0 - Buffer overflow", "spans": {"SYSTEM: Frhed (Free hex editor) v1.6.0": [[0, 30]], "VULNERABILITY: Buffer overflow": [[33, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51078"}} {"text": "Frigate 3.36 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Frigate 3.36": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[15, 30]]}, "info": {"source": "exploitdb", "exploit_id": "48415"}} {"text": "Frigate 3.36.0.9 - 'Command Line' Local Buffer Overflow (SEH) (PoC)", "spans": {"SYSTEM: Frigate 3.36.0.9": [[0, 16]], "VULNERABILITY: Buffer Overflow": [[40, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48563"}} {"text": "Frigate Professional 3.36.0.9 - 'Find Computer' Local Buffer Overflow (SEH) (PoC)", "spans": {"SYSTEM: Frigate Professional 3.36.0.9": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[54, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48579"}} {"text": "Frigate Professional 3.36.0.9 - 'Pack File' Buffer Overflow (SEH Egghunter)", "spans": {"SYSTEM: Frigate Professional 3.36.0.9": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[44, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48688"}} {"text": "FTPDummy 4.80 - Local Buffer Overflow (SEH)", "spans": {"SYSTEM: FTPDummy 4.80": [[0, 13]], "VULNERABILITY: Buffer Overflow": [[22, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48685"}} {"text": "Game Jackal Server v5 - Unquoted Service Path _GJServiceV5_", "spans": {"SYSTEM: Game Jackal Server v5": [[0, 21]], "VULNERABILITY: Unquoted Service Path _GJServiceV5_": [[24, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51584"}} {"text": "General Device Manager 2.5.2.2 - Buffer Overflow (SEH)", "spans": {"SYSTEM: General Device Manager 2.5.2.2": [[0, 30]], "VULNERABILITY: Buffer Overflow": [[33, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51641"}} {"text": "Genexus Protection Server 9.6.4.2 - 'protsrvservice' Unquoted Service Path", "spans": {"SYSTEM: Genexus Protection Server 9.6.4.2": [[0, 33]], "VULNERABILITY: Unquoted Service Path": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49007"}} {"text": "Genexus Protection Server 9.7.2.10 - 'protsrvservice' Unquoted Service Path", "spans": {"SYSTEM: Genexus Protection Server 9.7.2.10": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "52065"}} {"text": "GeoGebra CAS Calculato‪r‬ 6.0.631.0 - Denial of Service (PoC)", "spans": {"SYSTEM: GeoGebra CAS Calculato‪r‬ 6.0.631.0": [[0, 35]], "VULNERABILITY: Denial of Service (PoC)": [[38, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49655"}} {"text": "GeoGebra Classic 5.0.631.0-d - Denial of Service (PoC)", "spans": {"SYSTEM: GeoGebra Classic 5.0.631.0-d": [[0, 28]], "VULNERABILITY: Denial of Service (PoC)": [[31, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49654"}} {"text": "GeoGebra Graphing Calculato‪r‬ 6.0.631.0 - Denial Of Service (PoC)", "spans": {"SYSTEM: GeoGebra Graphing Calculato‪r‬ 6.0.631.0": [[0, 40]], "VULNERABILITY: Denial Of Service": [[43, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49653"}} {"text": "GeoVision ASManager Windows Application 6.1.2.0 - Credentials Disclosure", "spans": {"SYSTEM: GeoVision ASManager Windows Application 6.1.2.0": [[0, 47]], "VULNERABILITY: Credentials Disclosure": [[50, 72]]}, "info": {"source": "exploitdb", "exploit_id": "52423"}} {"text": "Gestionale Open 11.00.00 - Local Privilege Escalation", "spans": {"SYSTEM: Gestionale Open 11.00.00": [[0, 24]], "VULNERABILITY: Local Privilege Escalation": [[27, 53]]}, "info": {"source": "exploitdb", "exploit_id": "50449"}} {"text": "Gestionale Open 12.00.00 - 'DB_GO_80' Unquoted Service Path", "spans": {"SYSTEM: Gestionale Open 12.00.00": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51065"}} {"text": "Global Registration Service 1.0.0.3 - 'GREGsvc.exe' Unquoted Service Path", "spans": {"SYSTEM: Global Registration Service 1.0.0.3": [[0, 35]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49142"}} {"text": "GoldWave - Buffer Overflow (SEH Unicode)", "spans": {"SYSTEM: GoldWave": [[0, 8]], "VULNERABILITY: Buffer Overflow": [[11, 26]]}, "info": {"source": "exploitdb", "exploit_id": "48510"}} {"text": "GOM Player 2.3.90.5360 - Buffer Overflow (PoC)", "spans": {"SYSTEM: GOM Player 2.3.90.5360": [[0, 22]], "VULNERABILITY: Buffer Overflow": [[25, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51724"}} {"text": "Grand Theft Auto III/Vice City Skin File v1.1 - Buffer Overflow", "spans": {"SYSTEM: Grand Theft Auto III/Vice City Skin File v1.1": [[0, 45]], "VULNERABILITY: Buffer Overflow": [[48, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51223"}} {"text": "GreenShot 1.2.10 - Insecure Deserialization Arbitrary Code Execution", "spans": {"SYSTEM: GreenShot 1.2.10": [[0, 17]], "VULNERABILITY: Arbitrary Code Execution": [[45, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51633"}} {"text": "Guild Wars 2 - Insecure Folder Permissions", "spans": {"SYSTEM: Guild Wars 2": [[0, 12]], "VULNERABILITY: Insecure Folder Permissions": [[15, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48876"}} {"text": "HCL Lotus Notes V12 - Unquoted Service Path", "spans": {"SYSTEM: HCL Lotus Notes V12": [[0, 19]], "VULNERABILITY: Unquoted Service Path": [[22, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50566"}} {"text": "HDD Health 4.2.0.112 - 'HDDHealth' Unquoted Service Path", "spans": {"SYSTEM: HDD Health 4.2.0.112": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51105"}} {"text": "Hi-Rez Studios 5.1.6.3 - 'HiPatchService' Unquoted Service Path", "spans": {"SYSTEM: Hi-Rez Studios 5.1.6.3": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49701"}} {"text": "HMA VPN 5.3 - Unquoted Service Path", "spans": {"SYSTEM: HMA VPN 5.3": [[0, 11]], "VULNERABILITY: Unquoted Service Path": [[14, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50765"}} {"text": "HomeGuard Pro 9.3.1 - Insecure Folder Permissions", "spans": {"SYSTEM: HomeGuard Pro 9.3.1": [[0, 19]], "VULNERABILITY: Insecure Folder Permissions": [[22, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48068"}} {"text": "HotKey Clipboard 2.1.0.6 - Privilege Escalation Unquoted Service Path", "spans": {"SYSTEM: HotKey Clipboard 2.1.0.6": [[0, 24]], "VULNERABILITY: Privilege Escalation": [[27, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51206"}} {"text": "HP Display Assistant x64 Edition 3.20 - 'DTSRVC' Unquoted Service Path", "spans": {"SYSTEM: HP Display Assistant x64 Edition 3.20": [[0, 37]], "VULNERABILITY: Unquoted Service Path": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "49002"}} {"text": "HP LaserJet Professional M1210 MFP Series Receive Fax Service - Unquoted Service Path", "spans": {"SYSTEM: HP LaserJet Professional M1210 MFP Series Receive Fax Service": [[0, 61]], "VULNERABILITY: Unquoted Service Path": [[64, 85]]}, "info": {"source": "exploitdb", "exploit_id": "50959"}} {"text": "HP System Event 1.2.9.0 - 'HPWMISVC' Unquoted Service Path", "spans": {"SYSTEM: HP System Event 1.2.9.0": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48075"}} {"text": "HP System Event Utility - Local Privilege Escalation", "spans": {"SYSTEM: HP System Event Utility": [[0, 23]], "VULNERABILITY: Local Privilege Escalation": [[26, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48057"}} {"text": "HP WMI Service 1.4.8.0 - 'HPWMISVC.exe' Unquoted Service Path", "spans": {"SYSTEM: HP WMI Service 1.4.8.0": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49010"}} {"text": "HTTPDebuggerPro 9.11 - Unquoted Service Path", "spans": {"SYSTEM: HTTPDebuggerPro 9.11": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50545"}} {"text": "Hubstaff 1.6.14-61e5e22e - 'wow64log' DLL Search Order Hijacking", "spans": {"SYSTEM: Hubstaff 1.6.14-61e5e22e": [[0, 24]], "VULNERABILITY: DLL Search Order Hijacking": [[38, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51461"}} {"text": "IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow", "spans": {"SYSTEM: IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1": [[0, 72]], "VULNERABILITY: Buffer Overflow": [[97, 112]]}, "info": {"source": "exploitdb", "exploit_id": "49086"}} {"text": "IcoFX 2.6 - '.ico' Buffer Overflow SEH + DEP Bypass using JOP", "spans": {"SYSTEM: IcoFX 2.6": [[0, 9]], "VULNERABILITY: Buffer Overflow": [[19, 34]]}, "info": {"source": "exploitdb", "exploit_id": "49959"}} {"text": "iDeskService 3.0.2.1 - 'iDeskService' Unquoted Service Path", "spans": {"SYSTEM: iDeskService 3.0.2.1": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49018"}} {"text": "IDT PC Audio 1.0.6425.0 - 'STacSV' Unquoted Service Path", "spans": {"SYSTEM: IDT PC Audio 1.0.6425.0": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49043"}} {"text": "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path", "spans": {"SYSTEM: IDT PC Audio 1.0.6433.0": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49157"}} {"text": "IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path", "spans": {"SYSTEM: IDT PC Audio 1.0.6499.0": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49191"}} {"text": "iFunbox 4.2 - 'Apple Mobile Device Service' Unquoted Service Path", "spans": {"SYSTEM: iFunbox 4.2": [[0, 11]], "VULNERABILITY: Unquoted Service Path": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50040"}} {"text": "Inosoft VisiWin 7 2022-2.1 - Insecure Folders Permissions", "spans": {"SYSTEM: Inosoft VisiWin 7 2022-2.1": [[0, 26]], "VULNERABILITY: Insecure Folders Permissions": [[29, 57]]}, "info": {"source": "exploitdb", "exploit_id": "51682"}} {"text": "Input Director 1.4.3 - 'Input Director' Unquoted Service Path", "spans": {"SYSTEM: Input Director 1.4.3": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48795"}} {"text": "Intel(R) Audio Service x64 01.00.1080.0 - 'IntelAudioService' Unquoted Service Path", "spans": {"SYSTEM: Intel(R) Audio Service x64 01.00.1080.0": [[0, 39]], "VULNERABILITY: Unquoted Service Path": [[62, 83]]}, "info": {"source": "exploitdb", "exploit_id": "49929"}} {"text": "Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path", "spans": {"SYSTEM: Intel(r) Management and Security Application 5.2": [[0, 48]], "VULNERABILITY: User Notification Service Unquoted Service Path": [[51, 98]]}, "info": {"source": "exploitdb", "exploit_id": "49144"}} {"text": "Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path", "spans": {"SYSTEM: Intel(R) Management Engine Components 6.0.0.1189": [[0, 48]], "VULNERABILITY: Unquoted Service Path": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "50762"}} {"text": "Intel(R) Matrix Storage Event Monitor x86 8.0.0.1039 - 'IAANTMON' Unquoted Service Path", "spans": {"SYSTEM: Intel(R) Matrix Storage Event Monitor x86 8.0.0.1039": [[0, 52]], "VULNERABILITY: Unquoted Service Path": [[66, 87]]}, "info": {"source": "exploitdb", "exploit_id": "49350"}} {"text": "Interactive Suite 3.6 - 'eBeam Stylus Driver' Unquoted Service Path", "spans": {"SYSTEM: Interactive Suite 3.6": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49648"}} {"text": "Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)", "spans": {"SYSTEM: Internet Download Manager 6.37.11.1": [[0, 35]], "VULNERABILITY: Buffer Overflow": [[44, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48397"}} {"text": "IObit Uninstaller 10 Pro - Unquoted Service Path", "spans": {"SYSTEM: IObit Uninstaller 10 Pro": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "49371"}} {"text": "IObit Uninstaller 9.5.0.15 - 'IObit Uninstaller Service' Unquoted Service Path", "spans": {"SYSTEM: IObit Uninstaller 9.5.0.15": [[0, 26]], "VULNERABILITY: Unquoted Service Path": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48543"}} {"text": "IOTransfer V4 - Unquoted Service Path", "spans": {"SYSTEM: IOTransfer V4": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[16, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51029"}} {"text": "IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path", "spans": {"SYSTEM: IP Watcher v3.0.0.30": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48968"}} {"text": "IPTInstaller 4.0.9 - 'PassThru Service' Unquoted Service Path", "spans": {"SYSTEM: IPTInstaller 4.0.9": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49006"}} {"text": "Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path", "spans": {"SYSTEM: Iskysoft Application Framework Service 2.4.3.241": [[0, 48]], "VULNERABILITY: Unquoted Service Path": [[66, 87]]}, "info": {"source": "exploitdb", "exploit_id": "48171"}} {"text": "Kingdia CD Extractor 3.0.2 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Kingdia CD Extractor 3.0.2": [[0, 26]], "VULNERABILITY: Buffer Overflow": [[29, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50470"}} {"text": "Kingo ROOT 1.5.8 - Unquoted Service Path", "spans": {"SYSTEM: Kingo ROOT 1.5.8": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51707"}} {"text": "Kite 1.2020.1119.0 - 'KiteService' Unquoted Service Path", "spans": {"SYSTEM: Kite 1.2020.1119.0": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49205"}} {"text": "Kite 1.2021.610.0 - Unquoted Service Path", "spans": {"SYSTEM: Kite 1.2021.610.0": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "50975"}} {"text": "KiteService 1.2020.1113.1 - 'KiteService.exe' Unquoted Service Path", "spans": {"SYSTEM: KiteService 1.2020.1113.1": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49047"}} {"text": "KiteService 1.2020.618.0 - Unquoted Service Path", "spans": {"SYSTEM: KiteService 1.2020.618.0": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48625"}} {"text": "KiTTY 0.76.1.13 - 'Start Duplicated Session Hostname' Buffer Overflow", "spans": {"SYSTEM: KiTTY 0.76.1.13": [[0, 15]], "VULNERABILITY: Buffer Overflow": [[54, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51890"}} {"text": "KiTTY 0.76.1.13 - 'Start Duplicated Session Username' Buffer Overflow", "spans": {"SYSTEM: KiTTY 0.76.1.13": [[0, 15]], "VULNERABILITY: Buffer Overflow": [[54, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51891"}} {"text": "KiTTY 0.76.1.13 - Command Injection", "spans": {"SYSTEM: KiTTY 0.76.1.13": [[0, 15]], "VULNERABILITY: Command Injection": [[18, 35]]}, "info": {"source": "exploitdb", "exploit_id": "51892"}} {"text": "KMSpico 17.1.0.0 - 'Service KMSELDI' Unquoted Service Path", "spans": {"SYSTEM: KMSpico 17.1.0.0": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49003"}} {"text": "LaborOfficeFree 19.10 - MySQL Root Password Calculator", "spans": {"SYSTEM: LaborOfficeFree 19.10": [[0, 21]], "VULNERABILITY: MySQL Root Password Calculator": [[24, 54]]}, "info": {"source": "exploitdb", "exploit_id": "51894"}} {"text": "LanSend 3.2 - Buffer Overflow (SEH)", "spans": {"SYSTEM: LanSend 3.2": [[0, 11]], "VULNERABILITY: Buffer Overflow": [[14, 29]]}, "info": {"source": "exploitdb", "exploit_id": "48461"}} {"text": "Lansweeper 7.2 - Incorrect Access Control", "spans": {"SYSTEM: Lansweeper 7.2": [[0, 14]], "VULNERABILITY: Incorrect Access Control": [[17, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48618"}} {"text": "Lavasoft web companion 4.1.0.409 - 'DCIservice' Unquoted Service Path", "spans": {"SYSTEM: Lavasoft web companion 4.1.0.409": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51143"}} {"text": "LCD_Service 1.0.1.0 - 'LCD_Service' Unquote Service Path", "spans": {"SYSTEM: LCD_Service 1.0.1.0": [[0, 19]], "VULNERABILITY: Unquote Service Path": [[36, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49066"}} {"text": "Lexmark Printer Software G2 Installation Package 1.8.0.0 - 'LM__bdsvc' Unquoted Service Path", "spans": {"SYSTEM: Lexmark Printer Software G2 Installation Package 1.8.0.0": [[0, 56]], "VULNERABILITY: Unquoted Service Path": [[71, 92]]}, "info": {"source": "exploitdb", "exploit_id": "50045"}} {"text": "Logitech Solar Keyboard Service - 'L4301_Solar' Unquoted Service Path", "spans": {"SYSTEM: Logitech Solar Keyboard Service": [[0, 31]], "VULNERABILITY: Unquoted Service Path": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49050"}} {"text": "LogonExpert 8.1 - 'LogonExpertSvc' Unquoted Service Path", "spans": {"SYSTEM: LogonExpert 8.1": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49586"}} {"text": "MacPaw Encrypto 1.0.1 - 'Encrypto Service' Unquoted Service Path", "spans": {"SYSTEM: MacPaw Encrypto 1.0.1": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49694"}} {"text": "Macro Expert 4.7 - Unquoted Service Path", "spans": {"SYSTEM: Macro Expert 4.7": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50431"}} {"text": "Macro Expert 4.9 - Unquoted Service Path", "spans": {"SYSTEM: Macro Expert 4.9": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "51506"}} {"text": "Magic Mouse 2 utilities 2.20 - 'magicmouse2service' Unquoted Service Path", "spans": {"SYSTEM: Magic Mouse 2 utilities 2.20": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49017"}} {"text": "Malwarebytes 4.5 - Unquoted Service Path", "spans": {"SYSTEM: Malwarebytes 4.5": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50806"}} {"text": "McAfee(R) Safe Connect VPN - Unquoted Service Path Elevation Of Privilege", "spans": {"SYSTEM: McAfee(R) Safe Connect VPN": [[0, 26]], "VULNERABILITY: Unquoted Service Path Elevation Of Privilege": [[29, 73]]}, "info": {"source": "exploitdb", "exploit_id": "50814"}} {"text": "Mediconta 3.7.27 - 'servermedicontservice' Unquoted Service Path", "spans": {"SYSTEM: Mediconta 3.7.27": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "51064"}} {"text": "MEMU PLAY 3.7.0 - 'MEmusvc' Unquoted Service Path", "spans": {"SYSTEM: MEMU PLAY 3.7.0": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49016"}} {"text": "Memu Play 7.1.3 - Insecure Folder Permissions", "spans": {"SYSTEM: Memu Play 7.1.3": [[0, 15]], "VULNERABILITY: Insecure Folder Permissions": [[18, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48283"}} {"text": "Microsoft - NTLM Hash Disclosure Spoofing (library-ms)", "spans": {"SYSTEM: Microsoft": [[0, 9]], "VULNERABILITY: NTLM Hash Disclosure Spoofing": [[12, 41]]}, "info": {"source": "exploitdb", "exploit_id": "52280"}} {"text": "Microsoft Brokering File System Windows 11 Version 22H2 - Elevation of Privilege", "spans": {"SYSTEM: Microsoft Brokering File System Windows 11 Version 22H2": [[0, 55]], "VULNERABILITY: Elevation of Privilege": [[58, 80]]}, "info": {"source": "exploitdb", "exploit_id": "52360"}} {"text": "Microsoft Excel LTSC 2024 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Microsoft Excel LTSC 2024": [[0, 25]], "VULNERABILITY: Remote Code Execution (RCE)": [[28, 55]]}, "info": {"source": "exploitdb", "exploit_id": "52337"}} {"text": "Microsoft Excel Use After Free - Local Code Execution", "spans": {"SYSTEM: Microsoft Excel Use After Free": [[0, 30]], "VULNERABILITY: Local Code Execution": [[33, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52332"}} {"text": "Microsoft Exchange Active Directory Topology 15.0.847.40 - 'Service MSExchangeADTopology' Unquoted Service Path", "spans": {"SYSTEM: Microsoft Exchange Active Directory Topology 15.0.847.40": [[0, 56]], "VULNERABILITY: Unquoted Service Path": [[90, 111]]}, "info": {"source": "exploitdb", "exploit_id": "50868"}} {"text": "Microsoft Exchange Active Directory Topology 15.02.1118.007 - 'Service MSExchangeADTopology' Unquoted Service Path", "spans": {"SYSTEM: Microsoft Exchange Active Directory Topology 15.02.1118.007": [[0, 59]], "VULNERABILITY: Unquoted Service Path": [[93, 114]]}, "info": {"source": "exploitdb", "exploit_id": "51212"}} {"text": "Microsoft Exchange Mailbox Assistants 15.0.847.40 - 'Service MSExchangeMailboxAssistants' Unquoted Service Path", "spans": {"SYSTEM: Microsoft Exchange Mailbox Assistants 15.0.847.40": [[0, 49]], "VULNERABILITY: Unquoted Service Path": [[90, 111]]}, "info": {"source": "exploitdb", "exploit_id": "50867"}} {"text": "Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path", "spans": {"SYSTEM: Microsoft Gaming Services 2.52.13001.0": [[0, 38]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50776"}} {"text": "Microsoft GamingServices 2.47.10001.0 - 'GamingServices' Unquoted Service Path", "spans": {"SYSTEM: Microsoft GamingServices 2.47.10001.0": [[0, 37]], "VULNERABILITY: Unquoted Service Path": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49214"}} {"text": "Microsoft Graphics Component Windows 11 Pro (Build 26100+) - Local Elevation of Privileges", "spans": {"SYSTEM: Microsoft Graphics Component Windows 11 Pro (Build 26100+)": [[0, 58]], "VULNERABILITY: Local Elevation of Privileges": [[61, 90]]}, "info": {"source": "exploitdb", "exploit_id": "52362"}} {"text": "Microsoft Internet Explorer / ActiveX Control - Security Bypass", "spans": {"SYSTEM: Microsoft Internet Explorer / ActiveX Control": [[0, 45]], "VULNERABILITY: Security Bypass": [[48, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50598"}} {"text": "Microsoft Internet Explorer 11 - Use-After-Free", "spans": {"SYSTEM: Microsoft Internet Explorer 11": [[0, 30]], "VULNERABILITY: Use-After-Free": [[33, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49062"}} {"text": "Microsoft Internet Explorer 11 32-bit - Use-After-Free", "spans": {"SYSTEM: Microsoft Internet Explorer 11 32-bit": [[0, 37]], "VULNERABILITY: Use-After-Free": [[40, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49541"}} {"text": "Microsoft Internet Explorer 8 - 'SetMouseCapture ' Use After Free", "spans": {"SYSTEM: Microsoft Internet Explorer 8": [[0, 29]], "VULNERABILITY: Use After Free": [[51, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49872"}} {"text": "Microsoft MMC MSC EvilTwin - Local Admin Creation", "spans": {"SYSTEM: Microsoft MMC MSC EvilTwin": [[0, 26]], "VULNERABILITY: Local Admin Creation": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "52498"}} {"text": "Microsoft NET USE win10 - Insufficient Authentication Logic", "spans": {"SYSTEM: Microsoft NET USE win10": [[0, 23]], "VULNERABILITY: Insufficient Authentication Logic": [[26, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48299"}} {"text": "Microsoft Virtual Hard Disk (VHDX) 11 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Microsoft Virtual Hard Disk (VHDX) 11": [[0, 37]], "VULNERABILITY: Remote Code Execution (RCE)": [[40, 67]]}, "info": {"source": "exploitdb", "exploit_id": "52394"}} {"text": "Microsoft Windows - 'WizardOpium' Local Privilege Escalation", "spans": {"SYSTEM: Microsoft Windows": [[0, 17]], "VULNERABILITY: Local Privilege Escalation": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48180"}} {"text": "Microsoft Windows - CryptoAPI (Crypt32.dll) Elliptic Curve Cryptography (ECC) Spoof Code-Signing Certificate", "spans": {"SYSTEM: Microsoft Windows": [[0, 17]]}, "info": {"source": "exploitdb", "exploit_id": "47933"}} {"text": "Microsoft Windows - Shell COM Server Registrar Local Privilege Escalation", "spans": {"SYSTEM: Microsoft Windows": [[0, 17]], "VULNERABILITY: Local Privilege Escalation": [[47, 73]]}, "info": {"source": "exploitdb", "exploit_id": "47880"}} {"text": "Microsoft Windows - Storage QoS Filter Driver Checker", "spans": {"SYSTEM: Microsoft Windows": [[0, 17]], "VULNERABILITY: Storage QoS Filter Driver Checker": [[20, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52399"}} {"text": "Microsoft Windows - Win32k Elevation of Privilege", "spans": {"SYSTEM: Microsoft Windows": [[0, 17]], "VULNERABILITY: Win32k Elevation of Privilege": [[20, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49179"}} {"text": "Microsoft Windows - XRM-MS File NTLM Information Disclosure Spoofing", "spans": {"SYSTEM: Microsoft Windows": [[0, 17]], "VULNERABILITY: Information Disclosure": [[37, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52277"}} {"text": "Microsoft Windows .Group File - Code Execution", "spans": {"SYSTEM: Microsoft Windows .Group File": [[0, 29]], "VULNERABILITY: Code Execution": [[32, 46]]}, "info": {"source": "exploitdb", "exploit_id": "47838"}} {"text": "Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass", "spans": {"SYSTEM: Microsoft Windows .Reg File": [[0, 27]], "VULNERABILITY: Dialog Spoof / Mitigation Bypass": [[30, 62]]}, "info": {"source": "exploitdb", "exploit_id": "50653"}} {"text": "Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Local Privilege Escalation", "spans": {"SYSTEM: Microsoft Windows 10 (1903/1909)": [[0, 32]], "VULNERABILITY: Local Privilege Escalation": [[87, 113]]}, "info": {"source": "exploitdb", "exploit_id": "48267"}} {"text": "Microsoft Windows 10 - Theme API 'ThemePack' File Parsing", "spans": {"SYSTEM: Microsoft Windows 10": [[0, 20]], "VULNERABILITY: Theme API 'ThemePack' File Parsing": [[23, 57]]}, "info": {"source": "exploitdb", "exploit_id": "47975"}} {"text": "Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass)", "spans": {"SYSTEM: Microsoft Windows 10 build 1809": [[0, 31]], "VULNERABILITY: Local Privilege Escalation": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "47915"}} {"text": "Microsoft Windows 10.0.17763.5458 - Kernel Privilege Escalation", "spans": {"SYSTEM: Microsoft Windows 10.0.17763.5458": [[0, 33]], "VULNERABILITY: Privilege Escalation": [[43, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51946"}} {"text": "Microsoft Windows 11 - 'apds.dll' DLL hijacking (Forced)", "spans": {"SYSTEM: Microsoft Windows 11": [[0, 20]], "VULNERABILITY: DLL hijacking": [[34, 47]]}, "info": {"source": "exploitdb", "exploit_id": "51733"}} {"text": "Microsoft Windows 11 - Kernel Privilege Escalation", "spans": {"SYSTEM: Microsoft Windows 11": [[0, 20]], "VULNERABILITY: Privilege Escalation": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "52275"}} {"text": "Microsoft Windows 11 23h2 - CLFS.sys Elevation of Privilege", "spans": {"SYSTEM: Microsoft Windows 11 23h2": [[0, 25]], "VULNERABILITY: CLFS.sys Elevation of Privilege": [[28, 59]]}, "info": {"source": "exploitdb", "exploit_id": "52270"}} {"text": "Microsoft Windows 11 Pro 23H2 - Ancillary Function Driver for WinSock Privilege Escalation", "spans": {"SYSTEM: Microsoft Windows 11 Pro 23H2": [[0, 29]], "VULNERABILITY: Privilege Escalation": [[70, 90]]}, "info": {"source": "exploitdb", "exploit_id": "52284"}} {"text": "Microsoft Windows 11 Version 24H2 Cross Device Service - Elevation of Privilege", "spans": {"SYSTEM: Microsoft Windows 11 Version 24H2 Cross Device Service": [[0, 54]], "VULNERABILITY: Elevation of Privilege": [[57, 79]]}, "info": {"source": "exploitdb", "exploit_id": "52320"}} {"text": "Microsoft Windows cmd.exe - Stack Buffer Overflow", "spans": {"SYSTEM: Microsoft Windows cmd.exe": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[34, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50331"}} {"text": "Microsoft Windows Defender - Detection Mitigation Bypass TrojanWin32Powessere.G", "spans": {"SYSTEM: Microsoft Windows Defender": [[0, 26]], "VULNERABILITY: Detection Mitigation Bypass TrojanWin32Powessere.G": [[29, 79]]}, "info": {"source": "exploitdb", "exploit_id": "51960"}} {"text": "Microsoft Windows Defender - Detections Bypass", "spans": {"SYSTEM: Microsoft Windows Defender": [[0, 26]], "VULNERABILITY: Detections Bypass": [[29, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50654"}} {"text": "Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass", "spans": {"SYSTEM: Microsoft Windows Defender / Trojan.Win32/Powessere.G": [[0, 53]], "VULNERABILITY: Detection Mitigation Bypass": [[56, 83]]}, "info": {"source": "exploitdb", "exploit_id": "51873"}} {"text": "Microsoft Windows Kernel - Information Disclosure", "spans": {"SYSTEM: Microsoft Windows Kernel": [[0, 24]], "VULNERABILITY: Information Disclosure": [[27, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48071"}} {"text": "Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution", "spans": {"SYSTEM: Microsoft Windows Media Center WMV / WMA 6.3.9600.16384": [[0, 55]], "VULNERABILITY: Code Execution": [[58, 72]]}, "info": {"source": "exploitdb", "exploit_id": "47981"}} {"text": "Microsoft Windows Server 2016 - Win32k Elevation of Privilege", "spans": {"SYSTEM: Microsoft Windows Server 2016": [[0, 29]], "VULNERABILITY: Win32k Elevation of Privilege": [[32, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52301"}} {"text": "Microsoft Windows Server 2025 Hyper-V NT Kernel Integration VSP - Elevation of Privilege", "spans": {"SYSTEM: Microsoft Windows Server 2025 Hyper-V NT Kernel Integration VSP": [[0, 63]], "VULNERABILITY: Elevation of Privilege": [[66, 88]]}, "info": {"source": "exploitdb", "exploit_id": "52436"}} {"text": "MilleGPG5 5.7.2 Luglio 2021 - Local Privilege Escalation", "spans": {"SYSTEM: MilleGPG5 5.7.2 Luglio 2021": [[0, 27]], "VULNERABILITY: Local Privilege Escalation": [[30, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50558"}} {"text": "MilleGPG5 5.9.2 (Gennaio 2023) - Local Privilege Escalation / Incorrect Access Control", "spans": {"SYSTEM: MilleGPG5 5.9.2 (Gennaio 2023)": [[0, 30]], "VULNERABILITY: Local Privilege Escalation": [[33, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51410"}} {"text": "Millewin 13.39.146.1 - Local Privilege Escalation", "spans": {"SYSTEM: Millewin 13.39.146.1": [[0, 20]], "VULNERABILITY: Local Privilege Escalation": [[23, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49530"}} {"text": "MiniTool Partition Wizard - Unquoted Service Path", "spans": {"SYSTEM: MiniTool Partition Wizard": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50859"}} {"text": "MiniTool Partition Wizard ShadowMaker v.12.7 - Unquoted Service Path _MTAgentService_", "spans": {"SYSTEM: MiniTool Partition Wizard ShadowMaker v.12.7": [[0, 44]], "VULNERABILITY: Unquoted Service Path _MTAgentService_": [[47, 85]]}, "info": {"source": "exploitdb", "exploit_id": "51578"}} {"text": "MiniTool Partition Wizard ShadowMaker v.12.7 - Unquoted Service Path _MTSchedulerService_", "spans": {"SYSTEM: MiniTool Partition Wizard ShadowMaker v.12.7": [[0, 44]], "VULNERABILITY: Unquoted Service Path _MTSchedulerService_": [[47, 89]]}, "info": {"source": "exploitdb", "exploit_id": "51579"}} {"text": "MiniTool ShadowMaker 3.2 - 'MTAgentService' Unquoted Service Path", "spans": {"SYSTEM: MiniTool ShadowMaker 3.2": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49336"}} {"text": "MobileTrans 4.0.11 - Weak Service Privilege Escalation", "spans": {"SYSTEM: MobileTrans 4.0.11": [[0, 19]], "VULNERABILITY: Privilege Escalation": [[35, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51479"}} {"text": "Motorola Device Manager 2.4.5 - 'ForwardDaemon.exe ' Unquoted Service Path", "spans": {"SYSTEM: Motorola Device Manager 2.4.5": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49011"}} {"text": "Motorola Device Manager 2.5.4 - 'ForwardDaemon.exe ' Unquoted Service Path", "spans": {"SYSTEM: Motorola Device Manager 2.5.4": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49013"}} {"text": "Motorola Device Manager 2.5.4 - 'MotoHelperService.exe' Unquoted Service Path", "spans": {"SYSTEM: Motorola Device Manager 2.5.4": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49012"}} {"text": "Mozilla Firefox 67 - Array.pop JIT Type Confusion", "spans": {"SYSTEM: Mozilla Firefox 67": [[0, 18]], "VULNERABILITY: Type Confusion": [[35, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50691"}} {"text": "Mozilla Firefox 88.0.1 - File Extension Execution of Arbitrary Code", "spans": {"SYSTEM: Mozilla Firefox 88.0.1": [[0, 22]], "VULNERABILITY: File Extension Execution of Arbitrary Code": [[25, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49892"}} {"text": "mRemoteNG v1.77.3.1784-NB - Cleartext Storage of Sensitive Information in Memory", "spans": {"SYSTEM: mRemoteNG v1.77.3.1784-NB": [[0, 25]], "VULNERABILITY: Cleartext Storage of Sensitive Information in Memory": [[28, 80]]}, "info": {"source": "exploitdb", "exploit_id": "51637"}} {"text": "MSI Ambient Link Driver 1.0.0.8 - Local Privilege Escalation", "spans": {"SYSTEM: MSI Ambient Link Driver 1.0.0.8": [[0, 31]], "VULNERABILITY: Local Privilege Escalation": [[34, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48836"}} {"text": "MSI Packages Symbolic Links Processing - Windows 10 Privilege Escalation", "spans": {"SYSTEM: MSI Packages Symbolic Links Processing": [[0, 38]], "VULNERABILITY: Privilege Escalation": [[52, 72]]}, "info": {"source": "exploitdb", "exploit_id": "48079"}} {"text": "MTPutty 1.0.1.21 - SSH Password Disclosure", "spans": {"SYSTEM: MTPutty 1.0.1.21": [[0, 16]], "VULNERABILITY: Password Disclosure": [[23, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50574"}} {"text": "MyVideoConverter Pro 3.14 - 'Movie' Buffer Overflow", "spans": {"SYSTEM: MyVideoConverter Pro 3.14": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[36, 51]]}, "info": {"source": "exploitdb", "exploit_id": "48054"}} {"text": "MyVideoConverter Pro 3.14 - 'Output Folder' Buffer Overflow", "spans": {"SYSTEM: MyVideoConverter Pro 3.14": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[44, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48055"}} {"text": "MyVideoConverter Pro 3.14 - 'TVSeries' Buffer Overflow", "spans": {"SYSTEM: MyVideoConverter Pro 3.14": [[0, 25]], "VULNERABILITY: Buffer Overflow": [[39, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48056"}} {"text": "NCH Express Invoice - Clear Text Password Storage and Account Takeover", "spans": {"SYSTEM: NCH Express Invoice": [[0, 19]], "VULNERABILITY: Clear Text Password Storage and Account Takeover": [[22, 70]]}, "info": {"source": "exploitdb", "exploit_id": "51540"}} {"text": "NEOWISE CARBONFTP 1.4 - Weak Password Encryption", "spans": {"SYSTEM: NEOWISE CARBONFTP 1.4": [[0, 21]], "VULNERABILITY: Weak Password Encryption": [[24, 48]]}, "info": {"source": "exploitdb", "exploit_id": "47950"}} {"text": "NetBackup 7.0 - 'NetBackup INET Daemon' Unquoted Service Path", "spans": {"SYSTEM: NetBackup 7.0": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48227"}} {"text": "Netgear Genie 2.4.64 - Unquoted Service Path", "spans": {"SYSTEM: Netgear Genie 2.4.64": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[23, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50443"}} {"text": "NetIQ/Microfocus Performance Endpoint v5.1 - remote root/SYSTEM exploit", "spans": {"SYSTEM: NetIQ/Microfocus Performance Endpoint v5.1": [[0, 42]], "VULNERABILITY: remote root/SYSTEM exploit": [[45, 71]]}, "info": {"source": "exploitdb", "exploit_id": "51199"}} {"text": "NetPCLinker 1.0.0.0 - Buffer Overflow (SEH Egghunter)", "spans": {"SYSTEM: NetPCLinker 1.0.0.0": [[0, 19]], "VULNERABILITY: Buffer Overflow": [[22, 37]]}, "info": {"source": "exploitdb", "exploit_id": "48680"}} {"text": "Nidesoft 3GP Video Converter 2.6.18 - Local Stack Buffer Overflow", "spans": {"SYSTEM: Nidesoft 3GP Video Converter 2.6.18": [[0, 35]], "VULNERABILITY: Buffer Overflow": [[50, 65]]}, "info": {"source": "exploitdb", "exploit_id": "49034"}} {"text": "Nidesoft DVD Ripper 5.2.18 - Local Buffer Overflow (SEH)", "spans": {"SYSTEM: Nidesoft DVD Ripper 5.2.18": [[0, 26]], "VULNERABILITY: Buffer Overflow": [[35, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48687"}} {"text": "Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path", "spans": {"SYSTEM: Nord VPN-6.31.13.0": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48790"}} {"text": "Nsauditor 3.2.1.0 - Buffer Overflow (SEH+ASLR bypass (3 bytes overwrite))", "spans": {"SYSTEM: Nsauditor 3.2.1.0": [[0, 17]], "VULNERABILITY: Buffer Overflow": [[20, 35]]}, "info": {"source": "exploitdb", "exploit_id": "48350"}} {"text": "NVClient v5.0 - Stack Buffer Overflow (DoS)", "spans": {"SYSTEM: NVClient v5.0": [[0, 13]], "VULNERABILITY: Buffer Overflow": [[22, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51700"}} {"text": "NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path", "spans": {"SYSTEM: NVIDIA Update Service Daemon 1.0.21": [[0, 35]], "VULNERABILITY: Unquoted Service Path": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "48391"}} {"text": "OCS Inventory NG 2.3.0.0 - Unquoted Service Path", "spans": {"SYSTEM: OCS Inventory NG 2.3.0.0": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[27, 48]]}, "info": {"source": "exploitdb", "exploit_id": "51389"}} {"text": "Odoo 12.0.20190101 - 'nssm.exe' Unquoted Service Path", "spans": {"SYSTEM: Odoo 12.0.20190101": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49857"}} {"text": "OKI sPSV Port Manager 1.0.41 - 'sPSVOpLclSrv' Unquoted Service Path", "spans": {"SYSTEM: OKI sPSV Port Manager 1.0.41": [[0, 28]], "VULNERABILITY: Unquoted Service Path": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "49005"}} {"text": "OpenClinic GA 5.194.18 - Local Privilege Escalation", "spans": {"SYSTEM: OpenClinic GA 5.194.18": [[0, 22]], "VULNERABILITY: Local Privilege Escalation": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50448"}} {"text": "OpenTFTP 1.66 - Local Privilege Escalation", "spans": {"SYSTEM: OpenTFTP 1.66": [[0, 13]], "VULNERABILITY: Local Privilege Escalation": [[16, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48060"}} {"text": "Oracle Database 11g Release 2 - 'OracleDBConsoleorcl' Unquoted Service Path", "spans": {"SYSTEM: Oracle Database 11g Release 2": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48418"}} {"text": "Oracle Database 12c Release 1 - Unquoted Service Path", "spans": {"SYSTEM: Oracle Database 12c Release 1": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "52063"}} {"text": "OSAS Traverse Extension 11 - 'travextensionhostsvc' Unquoted Service Path", "spans": {"SYSTEM: OSAS Traverse Extension 11": [[0, 26]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49698"}} {"text": "Outline Service 1.3.3 - 'Outline Service ' Unquoted Service Path", "spans": {"SYSTEM: Outline Service 1.3.3": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "48414"}} {"text": "Outline V1.6.0 - Unquoted Service Path", "spans": {"SYSTEM: Outline V1.6.0": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[17, 38]]}, "info": {"source": "exploitdb", "exploit_id": "51128"}} {"text": "OutSystems Service Studio 11.53.30 - DLL Hijacking", "spans": {"SYSTEM: OutSystems Service Studio 11.53.30": [[0, 34]], "VULNERABILITY: DLL Hijacking": [[37, 50]]}, "info": {"source": "exploitdb", "exploit_id": "51678"}} {"text": "PaperStream IP (TWAIN) 1.42.0.5685 - Local Privilege Escalation", "spans": {"SYSTEM: PaperStream IP (TWAIN) 1.42.0.5685": [[0, 34]], "VULNERABILITY: Local Privilege Escalation": [[37, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49382"}} {"text": "PDF Complete 3.5.310.2002 - 'pdfsvc.exe' Unquoted Service Path", "spans": {"SYSTEM: PDF Complete 3.5.310.2002": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49226"}} {"text": "PDFCOMPLETE Corporate Edition 4.1.45 - 'pdfcDispatcher' Unquoted Service Path", "spans": {"SYSTEM: PDFCOMPLETE Corporate Edition 4.1.45": [[0, 36]], "VULNERABILITY: Unquoted Service Path": [[56, 77]]}, "info": {"source": "exploitdb", "exploit_id": "49558"}} {"text": "Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path", "spans": {"SYSTEM: Pearson Vue VTS 2.3.1911 Installer": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "48810"}} {"text": "Pearson Vue VTS 2.3.1911 Installer - VUEApplicationWrapper Unquoted Service Path", "spans": {"SYSTEM: Pearson Vue VTS 2.3.1911 Installer": [[0, 34]], "VULNERABILITY: VUEApplicationWrapper Unquoted Service Path": [[37, 80]]}, "info": {"source": "exploitdb", "exploit_id": "49143"}} {"text": "Pingzapper 2.3.1 - 'PingzapperSvc' Unquoted Service Path", "spans": {"SYSTEM: Pingzapper 2.3.1": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49626"}} {"text": "Plantronics Hub 3.13.2 - Local Privilege Escalation", "spans": {"SYSTEM: Plantronics Hub 3.13.2": [[0, 22]], "VULNERABILITY: Local Privilege Escalation": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "47845"}} {"text": "Plantronics Hub 3.13.2 - SpokesUpdateService Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Plantronics Hub 3.13.2": [[0, 22]], "VULNERABILITY: Privilege Escalation": [[45, 65]], "TOOL: Metasploit": [[67, 77]]}, "info": {"source": "exploitdb", "exploit_id": "47944"}} {"text": "Plantronics Hub 3.25.1 - Arbitrary File Read", "spans": {"SYSTEM: Plantronics Hub 3.25.1": [[0, 22]], "VULNERABILITY: Arbitrary File Read": [[25, 44]]}, "info": {"source": "exploitdb", "exploit_id": "52011"}} {"text": "Popcorn Time 6.2 - 'Update service' Unquoted Service Path", "spans": {"SYSTEM: Popcorn Time 6.2": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48378"}} {"text": "Port Forwarding Wizard 4.8.0 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Port Forwarding Wizard 4.8.0": [[0, 28]], "VULNERABILITY: Buffer Overflow": [[31, 46]]}, "info": {"source": "exploitdb", "exploit_id": "48695"}} {"text": "PortableKanban 4.3.6578.38136 - Encrypted Password Retrieval", "spans": {"SYSTEM: PortableKanban 4.3.6578.38136": [[0, 29]], "VULNERABILITY: Encrypted Password Retrieval": [[32, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49409"}} {"text": "Prey 1.9.6 - _CronService_ Unquoted Service Path", "spans": {"SYSTEM: Prey 1.9.6": [[0, 10]], "VULNERABILITY: _CronService_ Unquoted Service Path": [[13, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48967"}} {"text": "Print Job Accounting 4.4.10 - 'OkiJaSvc' Unquoted Service Path", "spans": {"SYSTEM: Print Job Accounting 4.4.10": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49623"}} {"text": "Printix Client 1.3.1106.0 - Privilege Escalation", "spans": {"SYSTEM: Printix Client 1.3.1106.0": [[0, 25]], "VULNERABILITY: Privilege Escalation": [[28, 48]]}, "info": {"source": "exploitdb", "exploit_id": "50812"}} {"text": "Privacy Drive v3.17.0 - 'pdsvc.exe' Unquoted Service Path", "spans": {"SYSTEM: Privacy Drive v3.17.0": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49023"}} {"text": "Private Internet Access 3.3 - 'pia-service' Unquoted Service Path", "spans": {"SYSTEM: Private Internet Access 3.3": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[44, 65]]}, "info": {"source": "exploitdb", "exploit_id": "50804"}} {"text": "Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path", "spans": {"SYSTEM: Program Access Controller v1.2.0.0": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[54, 75]]}, "info": {"source": "exploitdb", "exploit_id": "48966"}} {"text": "ProtonVPN 1.26.0 - Unquoted Service Path", "spans": {"SYSTEM: ProtonVPN 1.26.0": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[19, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50837"}} {"text": "PTPublisher v2.3.4 - Unquoted Service Path", "spans": {"SYSTEM: PTPublisher v2.3.4": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50885"}} {"text": "QNAP QVR Client 5.0.0.13230 - 'QVRService' Unquoted Service Path", "spans": {"SYSTEM: QNAP QVR Client 5.0.0.13230": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[43, 64]]}, "info": {"source": "exploitdb", "exploit_id": "49645"}} {"text": "Quick N Easy FTP Service 3.2 - Unquoted Service Path", "spans": {"SYSTEM: Quick N Easy FTP Service 3.2": [[0, 28]], "VULNERABILITY: Unquoted Service Path": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "48983"}} {"text": "Quick Player 1.3 - '.m3l' Buffer Overflow (Unicode & SEH)", "spans": {"SYSTEM: Quick Player 1.3": [[0, 16]], "VULNERABILITY: Buffer Overflow": [[26, 41]]}, "info": {"source": "exploitdb", "exploit_id": "48564"}} {"text": "RaidenFTPD 2.4.4005 - Buffer Overflow (SEH)", "spans": {"SYSTEM: RaidenFTPD 2.4.4005": [[0, 19]], "VULNERABILITY: Buffer Overflow": [[22, 37]]}, "info": {"source": "exploitdb", "exploit_id": "51611"}} {"text": "Rapid7 nexpose - 'nexposeconsole' Unquoted Service Path", "spans": {"SYSTEM: Rapid7 nexpose": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51941"}} {"text": "Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path", "spans": {"SYSTEM: Rapid7 Nexpose Installer 6.6.39": [[0, 31]], "VULNERABILITY: Unquoted Service Path": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "48808"}} {"text": "RDP Manager 4.9.9.3 - Denial-of-Service (PoC)", "spans": {"SYSTEM: RDP Manager 4.9.9.3": [[0, 19]], "VULNERABILITY: Denial-of-Service": [[22, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50484"}} {"text": "Real Player 16.0.3.51 - 'external::Import()' Directory Traversal to Remote Code Execution (RCE)", "spans": {"SYSTEM: Real Player 16.0.3.51": [[0, 21]], "VULNERABILITY: Remote Code Execution (RCE)": [[68, 95]]}, "info": {"source": "exploitdb", "exploit_id": "50954"}} {"text": "Real Player v.20.0.8.310 G2 Control - 'DoGoToURL()' Remote Code Execution (RCE)", "spans": {"SYSTEM: Real Player v.20.0.8.310 G2 Control": [[0, 35]], "VULNERABILITY: Remote Code Execution (RCE)": [[52, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50953"}} {"text": "Realtek Andrea RT Filters 1.0.64.10 - 'AERTSr64.EXE' Unquoted Service Path", "spans": {"SYSTEM: Realtek Andrea RT Filters 1.0.64.10": [[0, 35]], "VULNERABILITY: Unquoted Service Path": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "49014"}} {"text": "Realtek Andrea RT Filters 1.0.64.7 - 'AERTSr64.EXE' Unquoted Service Path", "spans": {"SYSTEM: Realtek Andrea RT Filters 1.0.64.7": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49158"}} {"text": "Realtek Audio Service 1.0.0.55 - 'RtkAudioService64.exe' Unquoted Service Path", "spans": {"SYSTEM: Realtek Audio Service 1.0.0.55": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[57, 78]]}, "info": {"source": "exploitdb", "exploit_id": "49015"}} {"text": "Realtek Wireless LAN Utility 700.1631 - 'Realtek11nSU' Unquoted Service Path", "spans": {"SYSTEM: Realtek Wireless LAN Utility 700.1631": [[0, 37]], "VULNERABILITY: Unquoted Service Path": [[55, 76]]}, "info": {"source": "exploitdb", "exploit_id": "49646"}} {"text": "RealTimes Desktop Service 18.1.4 - 'rpdsvc.exe' Unquoted Service Path", "spans": {"SYSTEM: RealTimes Desktop Service 18.1.4": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[48, 69]]}, "info": {"source": "exploitdb", "exploit_id": "49021"}} {"text": "Remote Desktop Audit 2.3.0.157 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Remote Desktop Audit 2.3.0.157": [[0, 30]], "VULNERABILITY: Buffer Overflow": [[33, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48465"}} {"text": "Remote Mouse 4.002 - Unquoted Service Path", "spans": {"SYSTEM: Remote Mouse 4.002": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[21, 42]]}, "info": {"source": "exploitdb", "exploit_id": "50258"}} {"text": "Remote Mouse GUI 3.008 - Local Privilege Escalation", "spans": {"SYSTEM: Remote Mouse GUI 3.008": [[0, 22]], "VULNERABILITY: Local Privilege Escalation": [[25, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50047"}} {"text": "Resource Hacker v3.6.0.92 - Buffer overflow", "spans": {"SYSTEM: Resource Hacker v3.6.0.92": [[0, 25]], "VULNERABILITY: Buffer overflow": [[28, 43]]}, "info": {"source": "exploitdb", "exploit_id": "51079"}} {"text": "Ricoh Driver - Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Ricoh Driver": [[0, 12]], "VULNERABILITY: Privilege Escalation": [[15, 35]], "TOOL: Metasploit": [[37, 47]]}, "info": {"source": "exploitdb", "exploit_id": "48036"}} {"text": "Ricoh Printer Drivers - Local Privilege Escalation", "spans": {"SYSTEM: Ricoh Printer Drivers": [[0, 21]], "VULNERABILITY: Local Privilege Escalation": [[24, 50]]}, "info": {"source": "exploitdb", "exploit_id": "47962"}} {"text": "RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)", "spans": {"SYSTEM: RM Downloader 2.50.60 2006.06.23": [[0, 32]], "VULNERABILITY: Buffer Overflow": [[48, 63]]}, "info": {"source": "exploitdb", "exploit_id": "48628"}} {"text": "RM Downloader 3.1.3.2.2010.06.13 - 'Load' Buffer Overflow (SEH)", "spans": {"SYSTEM: RM Downloader 3.1.3.2.2010.06.13": [[0, 32]], "VULNERABILITY: Buffer Overflow": [[42, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48364"}} {"text": "Rockstar Service - Insecure File Permissions", "spans": {"SYSTEM: Rockstar Service": [[0, 16]], "VULNERABILITY: Insecure File Permissions": [[19, 44]]}, "info": {"source": "exploitdb", "exploit_id": "49739"}} {"text": "RSA NetWitness Platform 12.2 - Incorrect Access Control / Code Execution", "spans": {"SYSTEM: RSA NetWitness Platform 12.2": [[0, 28]], "VULNERABILITY: Incorrect Access Control / Code Execution": [[31, 72]]}, "info": {"source": "exploitdb", "exploit_id": "51336"}} {"text": "Rubo DICOM Viewer 2.0 - Buffer Overflow (SEH)", "spans": {"SYSTEM: Rubo DICOM Viewer 2.0": [[0, 21]], "VULNERABILITY: Buffer Overflow": [[24, 39]]}, "info": {"source": "exploitdb", "exploit_id": "48351"}} {"text": "Rumble Mail Server 0.51.3135 - 'rumble_win32.exe' Unquoted Service Path", "spans": {"SYSTEM: Rumble Mail Server 0.51.3135": [[0, 28]], "VULNERABILITY: Unquoted Service Path": [[50, 71]]}, "info": {"source": "exploitdb", "exploit_id": "49203"}} {"text": "Sandboxie Plus 0.7.4 - 'SbieSvc' Unquoted Service Path", "spans": {"SYSTEM: Sandboxie Plus 0.7.4": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49842"}} {"text": "Sandboxie Plus v0.7.2 - 'SbieSvc' Unquoted Service Path", "spans": {"SYSTEM: Sandboxie Plus v0.7.2": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49631"}} {"text": "Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path", "spans": {"SYSTEM: Sandboxie-Plus 5.50.2": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50819"}} {"text": "SAntivirus IC 10.0.21.61 - 'SAntivirusIC' Unquoted Service Path", "spans": {"SYSTEM: SAntivirus IC 10.0.21.61": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49042"}} {"text": "SAPSetup Automatic Workstation Update Service 750 - 'NWSAPAutoWorkstationUpdateSvc' Unquoted Service Path", "spans": {"SYSTEM: SAPSetup Automatic Workstation Update Service 750": [[0, 49]], "VULNERABILITY: Unquoted Service Path": [[84, 105]]}, "info": {"source": "exploitdb", "exploit_id": "49689"}} {"text": "SAPSprint 7.60 - 'SAPSprint' Unquoted Service Path", "spans": {"SYSTEM: SAPSprint 7.60": [[0, 14]], "VULNERABILITY: Unquoted Service Path": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50061"}} {"text": "Selea CarPlateServer (CPS) 4.0.1.6 - Local Privilege Escalation", "spans": {"SYSTEM: Selea CarPlateServer (CPS) 4.0.1.6": [[0, 34]], "VULNERABILITY: Local Privilege Escalation": [[37, 63]]}, "info": {"source": "exploitdb", "exploit_id": "49453"}} {"text": "ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path", "spans": {"SYSTEM: ShareMouse 5.0.43": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48794"}} {"text": "Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path", "spans": {"SYSTEM: Sherpa Connector Service v2020.2.20328.2050": [[0, 43]], "VULNERABILITY: Unquoted Service Path": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50852"}} {"text": "Simple Startup Manager 1.17 - 'File' Local Buffer Overflow (PoC)", "spans": {"SYSTEM: Simple Startup Manager 1.17": [[0, 27]], "VULNERABILITY: Buffer Overflow": [[43, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48678"}} {"text": "Snes9K 0.09z - 'Port Number' Buffer Overflow (SEH)", "spans": {"SYSTEM: Snes9K 0.09z": [[0, 12]], "VULNERABILITY: Buffer Overflow": [[29, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48686"}} {"text": "Socusoft Photo to Video Converter Professional 8.07 - 'Output Folder' Buffer Overflow (SEH Egghunter)", "spans": {"SYSTEM: Socusoft Photo to Video Converter Professional 8.07": [[0, 51]], "VULNERABILITY: Buffer Overflow": [[70, 85]]}, "info": {"source": "exploitdb", "exploit_id": "48691"}} {"text": "Softros LAN Messenger 9.6.4 - 'SoftrosSpellChecker' Unquoted Service Path", "spans": {"SYSTEM: Softros LAN Messenger 9.6.4": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49588"}} {"text": "SolarWinds Kiwi CatTools 3.11.8 - Unquoted Service Path", "spans": {"SYSTEM: SolarWinds Kiwi CatTools 3.11.8": [[0, 31]], "VULNERABILITY: Unquoted Service Path": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50416"}} {"text": "SolarWinds Kiwi Syslog Server 9.6.7.1 - Unquoted Service Path", "spans": {"SYSTEM: SolarWinds Kiwi Syslog Server 9.6.7.1": [[0, 37]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "52064"}} {"text": "SolarWinds MSP PME Cache Service 1.1.14 - Insecure File Permissions", "spans": {"SYSTEM: SolarWinds MSP PME Cache Service 1.1.14": [[0, 39]], "VULNERABILITY: Insecure File Permissions": [[42, 67]]}, "info": {"source": "exploitdb", "exploit_id": "48448"}} {"text": "Solstice Pod 6.2 - API Session Key Extraction via API Endpoint", "spans": {"SYSTEM: Solstice Pod 6.2": [[0, 16]], "VULNERABILITY: API Session Key Extraction via API Endpoint": [[19, 62]]}, "info": {"source": "exploitdb", "exploit_id": "52104"}} {"text": "Sonar Qube 8.3.1 - 'SonarQube Service' Unquoted Service Path", "spans": {"SYSTEM: Sonar Qube 8.3.1": [[0, 16]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48677"}} {"text": "SonicWall NetExtender 10.2.0.300 - Unquoted Service Path", "spans": {"SYSTEM: SonicWall NetExtender 10.2.0.300": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "50212"}} {"text": "Sony playmemories home - 'PMBDeviceInfoProvider' Unquoted Service Path", "spans": {"SYSTEM: Sony playmemories home": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[49, 70]]}, "info": {"source": "exploitdb", "exploit_id": "50817"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Denial Of Service (DoS)", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Denial Of Service": [[39, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51170"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Authorization Bypass (IDOR)", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Authorization Bypass": [[38, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51169"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Authentication Bypass", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Authentication Bypass": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51171"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Cross-Site Request Forgery", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Cross-Site Request Forgery": [[37, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51168"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Directory Traversal File Write Exploit", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Directory Traversal": [[37, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51172"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Remote Command Execution (RCE)", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Remote Command Execution": [[37, 61]]}, "info": {"source": "exploitdb", "exploit_id": "51173"}} {"text": "SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Unauthenticated Factory Reset", "spans": {"SYSTEM: SOUND4 IMPACT/FIRST/PULSE/Eco v2.x": [[0, 34]], "VULNERABILITY: Unauthenticated Factory Reset": [[37, 66]]}, "info": {"source": "exploitdb", "exploit_id": "51174"}} {"text": "SOUND4 Server Service 4.1.102 - Local Privilege Escalation", "spans": {"SYSTEM: SOUND4 Server Service 4.1.102": [[0, 29]], "VULNERABILITY: Local Privilege Escalation": [[32, 58]]}, "info": {"source": "exploitdb", "exploit_id": "51167"}} {"text": "SOYAL 701 Client 9.0.1 - Insecure Permissions", "spans": {"SYSTEM: SOYAL 701 Client 9.0.1": [[0, 22]], "VULNERABILITY: Insecure Permissions": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49679"}} {"text": "SOYAL 701 Server 9.0.1 - Insecure Permissions", "spans": {"SYSTEM: SOYAL 701 Server 9.0.1": [[0, 22]], "VULNERABILITY: Insecure Permissions": [[25, 45]]}, "info": {"source": "exploitdb", "exploit_id": "49678"}} {"text": "Splashtop 8.71.12001.0 - Unquoted Service Path", "spans": {"SYSTEM: Splashtop 8.71.12001.0": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[25, 46]]}, "info": {"source": "exploitdb", "exploit_id": "51182"}} {"text": "SprintWork 2.3.1 - Local Privilege Escalation", "spans": {"SYSTEM: SprintWork 2.3.1": [[0, 16]], "VULNERABILITY: Local Privilege Escalation": [[19, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48070"}} {"text": "Spy Emergency 25.0.650 - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: Spy Emergency 25.0.650": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "49997"}} {"text": "SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path", "spans": {"SYSTEM: SpyHunter 4": [[0, 11], [15, 26]], "VULNERABILITY: Unquoted Service Path": [[36, 57]]}, "info": {"source": "exploitdb", "exploit_id": "48172"}} {"text": "SQLite 3.50.1 - Heap Overflow", "spans": {"SYSTEM: SQLite 3.50.1": [[0, 13]], "VULNERABILITY: Heap Overflow": [[16, 29]]}, "info": {"source": "exploitdb", "exploit_id": "52499"}} {"text": "Stonesoft VPN Client 6.2.0 / 6.8.0 - Local Privilege Escalation", "spans": {"SYSTEM: Stonesoft VPN Client 6.2.0 / 6.8.0": [[0, 34]], "VULNERABILITY: Local Privilege Escalation": [[37, 63]]}, "info": {"source": "exploitdb", "exploit_id": "51341"}} {"text": "StreamRipper32 2.6 - Buffer Overflow (PoC)", "spans": {"SYSTEM: StreamRipper32 2.6": [[0, 18]], "VULNERABILITY: Buffer Overflow": [[21, 36]]}, "info": {"source": "exploitdb", "exploit_id": "48517"}} {"text": "SugarSync 4.1.3 - 'SugarSync Service' Unquoted Service Path", "spans": {"SYSTEM: SugarSync 4.1.3": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "51106"}} {"text": "Sync Breeze 13.6.18 - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: Sync Breeze 13.6.18": [[0, 19]], "VULNERABILITY: Unquoted Service Path": [[33, 54]]}, "info": {"source": "exploitdb", "exploit_id": "50023"}} {"text": "Sync Breeze Enterprise 12.4.18 - 'Sync Breeze Enterprise' Unquoted Service Path", "spans": {"SYSTEM: Sync Breeze Enterprise 12.4.18": [[0, 30]], "VULNERABILITY: Unquoted Service Path": [[58, 79]]}, "info": {"source": "exploitdb", "exploit_id": "48045"}} {"text": "Syncplify.me Server! 5.0.37 - 'SMWebRestServicev5' Unquoted Service Path", "spans": {"SYSTEM: Syncplify.me Server! 5.0.37": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "49009"}} {"text": "Sysax FTP Automation 6.9.0 - Privilege Escalation", "spans": {"SYSTEM: Sysax FTP Automation 6.9.0": [[0, 26]], "VULNERABILITY: Privilege Escalation": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50834"}} {"text": "SysGauge 7.9.18 - ' SysGauge Server' Unquoted Service Path", "spans": {"SYSTEM: SysGauge 7.9.18": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50009"}} {"text": "System Explorer 7.0.0 - 'SystemExplorerHelpService' Unquoted Service Path", "spans": {"SYSTEM: System Explorer 7.0.0": [[0, 21]], "VULNERABILITY: Unquoted Service Path": [[52, 73]]}, "info": {"source": "exploitdb", "exploit_id": "49248"}} {"text": "System Mechanic v15.5.0.61 - Arbitrary Read/Write", "spans": {"SYSTEM: System Mechanic v15.5.0.61": [[0, 26]], "VULNERABILITY: Arbitrary Read/Write": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51044"}} {"text": "TCQ - ITeCProteccioAppServer.exe - Unquoted Service Path", "spans": {"SYSTEM: TCQ": [[0, 3]], "VULNERABILITY: ITeCProteccioAppServer.exe - Unquoted Service Path": [[6, 56]]}, "info": {"source": "exploitdb", "exploit_id": "50902"}} {"text": "TDM Digital Signage PC Player 4.1 - Insecure File Permissions", "spans": {"SYSTEM: TDM Digital Signage PC Player 4.1": [[0, 33]], "VULNERABILITY: Insecure File Permissions": [[36, 61]]}, "info": {"source": "exploitdb", "exploit_id": "48953"}} {"text": "TeamSpeak 3.5.6 - Insecure File Permissions", "spans": {"SYSTEM: TeamSpeak 3.5.6": [[0, 15]], "VULNERABILITY: Insecure File Permissions": [[18, 43]]}, "info": {"source": "exploitdb", "exploit_id": "50743"}} {"text": "TFTP Broadband 4.3.0.1465 - 'tftpt.exe' Unquoted Service Path", "spans": {"SYSTEM: TFTP Broadband 4.3.0.1465": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "49852"}} {"text": "TFTP Turbo 4.6.1273 - 'TFTP Turbo 4' Unquoted Service Path", "spans": {"SYSTEM: TFTP Turbo 4.6.1273": [[0, 19]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "48085"}} {"text": "Tftpd32_SE 4.60 - 'Tftpd32_svc' Unquoted Service Path", "spans": {"SYSTEM: Tftpd32_SE 4.60": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "51076"}} {"text": "Tftpd64 4.64 - 'Tftpd32_svc' Unquoted Service Path", "spans": {"SYSTEM: Tftpd64 4.64": [[0, 12]], "VULNERABILITY: Unquoted Service Path": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50004"}} {"text": "Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation", "spans": {"SYSTEM: Throttlestop Kernel Driver": [[0, 26]], "VULNERABILITY: Privilege Escalation": [[56, 76]]}, "info": {"source": "exploitdb", "exploit_id": "52512"}} {"text": "Torrent 3GP Converter 1.51 - Stack Overflow (SEH)", "spans": {"SYSTEM: Torrent 3GP Converter 1.51": [[0, 26]], "VULNERABILITY: Stack Overflow": [[29, 43]]}, "info": {"source": "exploitdb", "exploit_id": "47965"}} {"text": "Torrent FLV Converter 1.51 Build 117 - Stack Oveflow (SEH partial overwrite)", "spans": {"SYSTEM: Torrent FLV Converter 1.51 Build 117": [[0, 36]], "VULNERABILITY: Stack Oveflow": [[39, 52]]}, "info": {"source": "exploitdb", "exploit_id": "47938"}} {"text": "Torrent iPod Video Converter 1.51 - Stack Overflow", "spans": {"SYSTEM: Torrent iPod Video Converter 1.51": [[0, 33]], "VULNERABILITY: Stack Overflow": [[36, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48039"}} {"text": "TOSHIBA DVD PLAYER Navi Support Service - 'TNaviSrv' Unquoted Service Path", "spans": {"SYSTEM: TOSHIBA DVD PLAYER Navi Support Service": [[0, 39]], "VULNERABILITY: Unquoted Service Path": [[53, 74]]}, "info": {"source": "exploitdb", "exploit_id": "50760"}} {"text": "TotalAV 2020 4.14.31 - Privilege Escalation", "spans": {"SYSTEM: TotalAV 2020 4.14.31": [[0, 20]], "VULNERABILITY: Privilege Escalation": [[23, 43]]}, "info": {"source": "exploitdb", "exploit_id": "47897"}} {"text": "TotalAV 5.15.69 - Unquoted Service Path", "spans": {"SYSTEM: TotalAV 5.15.69": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[18, 39]]}, "info": {"source": "exploitdb", "exploit_id": "50314"}} {"text": "Trend Micro Maximum Security 2019 - Arbitrary Code Execution", "spans": {"SYSTEM: Trend Micro Maximum Security 2019": [[0, 33]], "VULNERABILITY: Arbitrary Code Execution": [[36, 60]]}, "info": {"source": "exploitdb", "exploit_id": "47940"}} {"text": "Trend Micro Maximum Security 2019 - Privilege Escalation", "spans": {"SYSTEM: Trend Micro Maximum Security 2019": [[0, 33]], "VULNERABILITY: Privilege Escalation": [[36, 56]]}, "info": {"source": "exploitdb", "exploit_id": "47943"}} {"text": "Trend Micro OfficeScan Client 10.0 - ACL Service LPE", "spans": {"SYSTEM: Trend Micro OfficeScan Client 10.0": [[0, 34]], "VULNERABILITY: ACL Service LPE": [[37, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51453"}} {"text": "TRIGONE Remote System Monitor 3.61 - Unquoted Service Path", "spans": {"SYSTEM: TRIGONE Remote System Monitor 3.61": [[0, 34]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "50633"}} {"text": "Triologic Media Player 8 - '.m3l' Buffer Overflow (Unicode) (SEH)", "spans": {"SYSTEM: Triologic Media Player 8": [[0, 24]], "VULNERABILITY: Buffer Overflow": [[34, 49]]}, "info": {"source": "exploitdb", "exploit_id": "48293"}} {"text": "Typora v1.7.4 - OS Command Injection", "spans": {"SYSTEM: Typora v1.7.4": [[0, 13]], "VULNERABILITY: Command Injection": [[19, 36]]}, "info": {"source": "exploitdb", "exploit_id": "51752"}} {"text": "UDisk Monitor Z5 Phone - 'MonServiceUDisk.exe' Unquoted Service Path", "spans": {"SYSTEM: UDisk Monitor Z5 Phone": [[0, 22]], "VULNERABILITY: Unquoted Service Path": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "50901"}} {"text": "USB Flash Drives Control 4.1.0.0 - Unquoted Service Path", "spans": {"SYSTEM: USB Flash Drives Control 4.1.0.0": [[0, 32]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "51508"}} {"text": "VeeVPN 1.6.1 - Unquoted Service Path", "spans": {"SYSTEM: VeeVPN 1.6.1": [[0, 12]], "VULNERABILITY: Unquoted Service Path": [[15, 36]]}, "info": {"source": "exploitdb", "exploit_id": "52088"}} {"text": "Vembu BDR 4.2.0.1 U1 - Multiple Unquoted Service Paths", "spans": {"SYSTEM: Vembu BDR 4.2.0.1 U1": [[0, 20]], "VULNERABILITY: Multiple Unquoted Service Paths": [[23, 54]]}, "info": {"source": "exploitdb", "exploit_id": "49641"}} {"text": "Veyon 4.3.4 - 'VeyonService' Unquoted Service Path", "spans": {"SYSTEM: Veyon 4.3.4": [[0, 11]], "VULNERABILITY: Unquoted Service Path": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "48246"}} {"text": "Veyon 4.4.1 - 'VeyonService' Unquoted Service Path", "spans": {"SYSTEM: Veyon 4.4.1": [[0, 11]], "VULNERABILITY: Unquoted Service Path": [[29, 50]]}, "info": {"source": "exploitdb", "exploit_id": "49925"}} {"text": "VFS for Git 1.0.21014.1 - 'GVFS.Service' Unquoted Service Path", "spans": {"SYSTEM: VFS for Git 1.0.21014.1": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[41, 62]]}, "info": {"source": "exploitdb", "exploit_id": "49661"}} {"text": "VirtualBox 7.0.16 - Privilege Escalation", "spans": {"SYSTEM: VirtualBox 7.0.16": [[0, 17]], "VULNERABILITY: Privilege Escalation": [[20, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52287"}} {"text": "Visual Studio Code 1.47.1 - Denial of Service (PoC)", "spans": {"SYSTEM: Visual Studio Code 1.47.1": [[0, 25]], "VULNERABILITY: Denial of Service (PoC)": [[28, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49882"}} {"text": "VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path", "spans": {"SYSTEM: VIVE Runtime Service": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[42, 63]]}, "info": {"source": "exploitdb", "exploit_id": "50824"}} {"text": "VPN unlimited 6.1 - Unquoted Service Path", "spans": {"SYSTEM: VPN unlimited 6.1": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[20, 41]]}, "info": {"source": "exploitdb", "exploit_id": "47916"}} {"text": "VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass)", "spans": {"SYSTEM: VUPlayer 2.49": [[0, 13]], "VULNERABILITY: Buffer Overflow": [[29, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50650"}} {"text": "VUPlayer 2.49 .m3u - Local Buffer Overflow (DEP_ASLR)", "spans": {"SYSTEM: VUPlayer 2.49 .m3u": [[0, 18]], "VULNERABILITY: Buffer Overflow": [[27, 42]]}, "info": {"source": "exploitdb", "exploit_id": "48507"}} {"text": "VX Search 13.5.28 - 'Multiple' Unquoted Service Path", "spans": {"SYSTEM: VX Search 13.5.28": [[0, 17]], "VULNERABILITY: Unquoted Service Path": [[31, 52]]}, "info": {"source": "exploitdb", "exploit_id": "50026"}} {"text": "Wedding Slideshow Studio 1.36 - 'Key' Buffer Overflow", "spans": {"SYSTEM: Wedding Slideshow Studio 1.36": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[38, 53]]}, "info": {"source": "exploitdb", "exploit_id": "48028"}} {"text": "Wedding Slideshow Studio 1.36 - 'Name' Buffer Overflow", "spans": {"SYSTEM: Wedding Slideshow Studio 1.36": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[39, 54]]}, "info": {"source": "exploitdb", "exploit_id": "48050"}} {"text": "WibuKey Runtime 6.51 - 'WkSvW32.exe' Unquoted Service Path", "spans": {"SYSTEM: WibuKey Runtime 6.51": [[0, 20]], "VULNERABILITY: Unquoted Service Path": [[37, 58]]}, "info": {"source": "exploitdb", "exploit_id": "49999"}} {"text": "WifiHotSpot 1.0.0.0 - 'WifiHotSpotService.exe' Unquoted Service Path", "spans": {"SYSTEM: WifiHotSpot 1.0.0.0": [[0, 19]], "VULNERABILITY: Unquoted Service Path": [[47, 68]]}, "info": {"source": "exploitdb", "exploit_id": "49845"}} {"text": "WinAVR Version 20100110 - Insecure Folder Permissions", "spans": {"SYSTEM: WinAVR Version 20100110": [[0, 23]], "VULNERABILITY: Insecure Folder Permissions": [[26, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49379"}} {"text": "Windows 11 10.0.22000 - Backup service Privilege Escalation", "spans": {"SYSTEM: Windows 11 10.0.22000": [[0, 21]], "VULNERABILITY: Privilege Escalation": [[40, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51203"}} {"text": "Windows 11 22h2 - Kernel Privilege Elevation", "spans": {"SYSTEM: Windows 11 22h2": [[0, 15]], "VULNERABILITY: Kernel Privilege Elevation": [[18, 44]]}, "info": {"source": "exploitdb", "exploit_id": "51544"}} {"text": "Windows Kernel - Elevation of Privilege", "spans": {"SYSTEM: Windows Kernel": [[0, 14]], "VULNERABILITY: Elevation of Privilege": [[17, 39]]}, "info": {"source": "exploitdb", "exploit_id": "52494"}} {"text": "Windows MultiPoint Server 2011 SP1 - RpcEptMapper and Dnschade Local Privilege Escalation", "spans": {"SYSTEM: Windows MultiPoint Server 2011 SP1": [[0, 34]], "VULNERABILITY: Local Privilege Escalation": [[63, 89]]}, "info": {"source": "exploitdb", "exploit_id": "50517"}} {"text": "Windows TCPIP Finger Command - C2 Channel and Bypassing Security Software", "spans": {"SYSTEM: Windows TCPIP Finger Command": [[0, 28]], "VULNERABILITY: C2 Channel and Bypassing Security Software": [[31, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48815"}} {"text": "Windscribe - WindscribeService Named Pipe Privilege Escalation (Metasploit)", "spans": {"SYSTEM: Windscribe": [[0, 10], [13, 23]], "VULNERABILITY: Privilege Escalation": [[42, 62]], "TOOL: Metasploit": [[64, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48021"}} {"text": "Windscribe 1.83 - 'WindscribeService' Unquoted Service Path", "spans": {"SYSTEM: Windscribe 1.83": [[0, 15]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "48624"}} {"text": "Wing FTP Server 6.2.3 - Privilege Escalation", "spans": {"SYSTEM: Wing FTP Server 6.2.3": [[0, 21]], "VULNERABILITY: Privilege Escalation": [[24, 44]]}, "info": {"source": "exploitdb", "exploit_id": "48160"}} {"text": "WinGate 9.4.1.5998 - Insecure Folder Permissions", "spans": {"SYSTEM: WinGate 9.4.1.5998": [[0, 18]], "VULNERABILITY: Insecure Folder Permissions": [[21, 48]]}, "info": {"source": "exploitdb", "exploit_id": "48573"}} {"text": "Winpakpro 4.8 - 'GuardTourService' Unquoted Service Path", "spans": {"SYSTEM: Winpakpro 4.8": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[35, 56]]}, "info": {"source": "exploitdb", "exploit_id": "49690"}} {"text": "Winpakpro 4.8 - 'ScheduleService' Unquoted Service Path", "spans": {"SYSTEM: Winpakpro 4.8": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49691"}} {"text": "Winpakpro 4.8 - 'WPCommandFileService' Unquoted Service Path", "spans": {"SYSTEM: Winpakpro 4.8": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "49692"}} {"text": "Winstep 18.06.0096 - 'Xtreme Service' Unquoted Service Path", "spans": {"SYSTEM: Winstep 18.06.0096": [[0, 18]], "VULNERABILITY: Unquoted Service Path": [[38, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49004"}} {"text": "WinWaste.NET 1.0.6183.16475 - Privilege Escalation due Incorrect Access Control", "spans": {"SYSTEM: WinWaste.NET 1.0.6183.16475": [[0, 27]], "VULNERABILITY: Privilege Escalation": [[30, 50]]}, "info": {"source": "exploitdb", "exploit_id": "50083"}} {"text": "Wise Care 365 5.6.7.568 - 'WiseBootAssistant' Unquoted Service Path", "spans": {"SYSTEM: Wise Care 365 5.6.7.568": [[0, 23]], "VULNERABILITY: Unquoted Service Path": [[46, 67]]}, "info": {"source": "exploitdb", "exploit_id": "50038"}} {"text": "Wondershare Dr Fone 12.9.6 - Privilege Escalation", "spans": {"SYSTEM: Wondershare Dr Fone 12.9.6": [[0, 26]], "VULNERABILITY: Privilege Escalation": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "51324"}} {"text": "Wondershare Dr.Fone 11.4.10 - Insecure File Permissions", "spans": {"SYSTEM: Wondershare Dr.Fone 11.4.10": [[0, 27]], "VULNERABILITY: Insecure File Permissions": [[30, 55]]}, "info": {"source": "exploitdb", "exploit_id": "50903"}} {"text": "Wondershare Dr.Fone 11.4.9 - 'DFWSIDService' Unquoted Service Path", "spans": {"SYSTEM: Wondershare Dr.Fone 11.4.9": [[0, 26]], "VULNERABILITY: Unquoted Service Path": [[45, 66]]}, "info": {"source": "exploitdb", "exploit_id": "50755"}} {"text": "Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist' Unquoted Service Path", "spans": {"SYSTEM: Wondershare Dr.Fone 12.0.18": [[0, 27]], "VULNERABILITY: Unquoted Service Path": [[58, 79]]}, "info": {"source": "exploitdb", "exploit_id": "50813"}} {"text": "Wondershare Dr.Fone 12.0.7 - Privilege Escalation (ElevationService)", "spans": {"SYSTEM: Wondershare Dr.Fone 12.0.7": [[0, 26]], "VULNERABILITY: Privilege Escalation": [[29, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50912"}} {"text": "Wondershare Driver Install Service help 10.7.1.321 - 'ElevationService' Unquote Service Path", "spans": {"SYSTEM: Wondershare Driver Install Service help 10.7.1.321": [[0, 50]], "VULNERABILITY: Unquote Service Path": [[72, 92]]}, "info": {"source": "exploitdb", "exploit_id": "49101"}} {"text": "Wondershare FamiSafe 1.0 - 'FSService' Unquoted Service Path", "spans": {"SYSTEM: Wondershare FamiSafe 1.0": [[0, 24]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50757"}} {"text": "Wondershare Filmora 12.2.9.2233 - Unquoted Service Path", "spans": {"SYSTEM: Wondershare Filmora 12.2.9.2233": [[0, 31]], "VULNERABILITY: Unquoted Service Path": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "51395"}} {"text": "Wondershare MirrorGo 2.0.11.346 - Insecure File Permissions", "spans": {"SYSTEM: Wondershare MirrorGo 2.0.11.346": [[0, 31]], "VULNERABILITY: Insecure File Permissions": [[34, 59]]}, "info": {"source": "exploitdb", "exploit_id": "50787"}} {"text": "Wondershare MobileTrans 3.5.9 - 'ElevationService' Unquoted Service Path", "spans": {"SYSTEM: Wondershare MobileTrans 3.5.9": [[0, 29]], "VULNERABILITY: Unquoted Service Path": [[51, 72]]}, "info": {"source": "exploitdb", "exploit_id": "50756"}} {"text": "Wondershare UBackit 2.0.5 - 'wsbackup' Unquoted Service Path", "spans": {"SYSTEM: Wondershare UBackit 2.0.5": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[39, 60]]}, "info": {"source": "exploitdb", "exploit_id": "50758"}} {"text": "Workspace ONE Intelligent Hub 20.3.8.0 - 'VMware Hub Health Monitoring Service' Unquoted Service Path", "spans": {"SYSTEM: Workspace ONE Intelligent Hub 20.3.8.0": [[0, 38]], "VULNERABILITY: Unquoted Service Path": [[80, 101]]}, "info": {"source": "exploitdb", "exploit_id": "50028"}} {"text": "WorkTime 10.20 Build 4967 - Unquoted Service Path", "spans": {"SYSTEM: WorkTime 10.20 Build 4967": [[0, 25]], "VULNERABILITY: Unquoted Service Path": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "50664"}} {"text": "WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service Path", "spans": {"SYSTEM: WOW21 5.0.1.9": [[0, 13]], "VULNERABILITY: Unquoted Service Path": [[40, 61]]}, "info": {"source": "exploitdb", "exploit_id": "50818"}} {"text": "XAMPP 7.4.3 - Local Privilege Escalation", "spans": {"SYSTEM: XAMPP 7.4.3": [[0, 11]], "VULNERABILITY: Local Privilege Escalation": [[14, 40]]}, "info": {"source": "exploitdb", "exploit_id": "50337"}} {"text": "XAMPP 8.2.4 - Unquoted Path", "spans": {"SYSTEM: XAMPP 8.2.4": [[0, 11]], "VULNERABILITY: Unquoted Path": [[14, 27]]}, "info": {"source": "exploitdb", "exploit_id": "51585"}} {"text": "XMLBlueprint 16.191112 - XML External Entity Injection", "spans": {"SYSTEM: XMLBlueprint 16.191112": [[0, 22]], "VULNERABILITY: XML External Entity Injection": [[25, 54]]}, "info": {"source": "exploitdb", "exploit_id": "47974"}} {"text": "YouTube Video Grabber 1.9.9.1 - Buffer Overflow (SEH)", "spans": {"SYSTEM: YouTube Video Grabber 1.9.9.1": [[0, 29]], "VULNERABILITY: Buffer Overflow": [[32, 47]]}, "info": {"source": "exploitdb", "exploit_id": "50471"}} {"text": "Zillya Total Security 3.0.2367.0 - Local Privilege Escalation", "spans": {"SYSTEM: Zillya Total Security 3.0.2367.0": [[0, 32]], "VULNERABILITY: Local Privilege Escalation": [[36, 62]]}, "info": {"source": "exploitdb", "exploit_id": "51151"}} {"text": "Zortam Mp3 Media Studio 27.60 - Remote Code Execution (SEH)", "spans": {"SYSTEM: Zortam Mp3 Media Studio 27.60": [[0, 29]], "VULNERABILITY: Remote Code Execution": [[32, 53]]}, "info": {"source": "exploitdb", "exploit_id": "49084"}} {"text": "Adobe ColdFusion 11 - LDAP Java Object Deserialization Remode Code Execution (RCE)", "spans": {"SYSTEM: Adobe ColdFusion 11": [[0, 19]], "VULNERABILITY: RCE": [[78, 81]]}, "info": {"source": "exploitdb", "exploit_id": "50781"}} {"text": "Anviz CrossChex - Buffer Overflow (Metasploit)", "spans": {"SYSTEM: Anviz CrossChex": [[0, 15]], "VULNERABILITY: Buffer Overflow": [[18, 33]], "TOOL: Metasploit": [[35, 45]]}, "info": {"source": "exploitdb", "exploit_id": "48092"}} {"text": "Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit)", "spans": {"SYSTEM: Apache ActiveMQ 5.x-5.11.1": [[0, 26]], "VULNERABILITY: Directory Traversal": [[29, 48]], "TOOL: Metasploit": [[63, 73]]}, "info": {"source": "exploitdb", "exploit_id": "48181"}} {"text": "Archeevo 5.0 - Local File Inclusion", "spans": {"SYSTEM: Archeevo 5.0": [[0, 12]], "VULNERABILITY: Local File Inclusion": [[15, 35]]}, "info": {"source": "exploitdb", "exploit_id": "50665"}} {"text": "ASUS Remote Link 1.1.2.13 - Remote Code Execution", "spans": {"SYSTEM: ASUS Remote Link 1.1.2.13": [[0, 25]], "VULNERABILITY: Remote Code Execution": [[28, 49]]}, "info": {"source": "exploitdb", "exploit_id": "49594"}} {"text": "CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow", "spans": {"SYSTEM: CA Unified Infrastructure Management Nimsoft 7.80": [[0, 49]], "VULNERABILITY: Remote Buffer Overflow": [[52, 74]]}, "info": {"source": "exploitdb", "exploit_id": "48156"}} {"text": "CloudMe 1.11.2 - Buffer Overflow (PoC)", "spans": {"SYSTEM: CloudMe 1.11.2": [[0, 14]], "VULNERABILITY: Buffer Overflow": [[17, 32]]}, "info": {"source": "exploitdb", "exploit_id": "48389"}} {"text": "CompleteFTP Professional 12.1.3 - Remote Code Execution", "spans": {"SYSTEM: CompleteFTP Professional 12.1.3": [[0, 31]], "VULNERABILITY: Remote Code Execution": [[34, 55]]}, "info": {"source": "exploitdb", "exploit_id": "48657"}} {"text": "CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit)", "spans": {"SYSTEM: CoreFTP 2.0 Build 674 MDTM": [[0, 26]], "VULNERABILITY: Directory Traversal": [[29, 48]], "TOOL: Metasploit": [[50, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48195"}} {"text": "CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit)", "spans": {"SYSTEM: CoreFTP 2.0 Build 674 SIZE": [[0, 26]], "VULNERABILITY: Directory Traversal": [[29, 48]], "TOOL: Metasploit": [[50, 60]]}, "info": {"source": "exploitdb", "exploit_id": "48194"}} {"text": "CoreFTP Server build 725 - Directory Traversal (Authenticated)", "spans": {"SYSTEM: CoreFTP Server build 725": [[0, 24]], "VULNERABILITY: Directory Traversal": [[27, 46]]}, "info": {"source": "exploitdb", "exploit_id": "50652"}} {"text": "DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit)", "spans": {"SYSTEM: DotNetNuke": [[0, 10]], "VULNERABILITY: Remote Code Execution": [[36, 57]], "TOOL: Metasploit": [[59, 69]]}, "info": {"source": "exploitdb", "exploit_id": "48336"}} {"text": "Dup Scout Enterprise 10.0.18 - 'online_registration' Remote Buffer Overflow", "spans": {"SYSTEM: Dup Scout Enterprise 10.0.18": [[0, 28]], "VULNERABILITY: Remote Buffer Overflow": [[53, 75]]}, "info": {"source": "exploitdb", "exploit_id": "49210"}} {"text": "Dup Scout Enterprise 10.0.18 - 'sid' Remote Buffer Overflow (SEH)", "spans": {"SYSTEM: Dup Scout Enterprise 10.0.18": [[0, 28]], "VULNERABILITY: Remote Buffer Overflow": [[37, 59]]}, "info": {"source": "exploitdb", "exploit_id": "49217"}} {"text": "Easy Chat Server 3.1 - Remote Stack Buffer Overflow (SEH)", "spans": {"SYSTEM: Easy Chat Server 3.1": [[0, 20]], "VULNERABILITY: Buffer Overflow": [[36, 51]]}, "info": {"source": "exploitdb", "exploit_id": "50999"}} {"text": "Exchange Control Panel - Viewstate Deserialization (Metasploit)", "spans": {"SYSTEM: Exchange Control Panel": [[0, 22]], "VULNERABILITY: Viewstate Deserialization": [[25, 50]], "TOOL: Metasploit": [[52, 62]]}, "info": {"source": "exploitdb", "exploit_id": "48168"}} {"text": "Fortinet FortiOS_ FortiProxy_ and FortiSwitchManager 7.2.0 - Authentication bypass", "spans": {"SYSTEM: Fortinet FortiOS_ FortiProxy_ and FortiSwitchManager 7.2.0": [[0, 58]], "VULNERABILITY: Authentication bypass": [[61, 82]]}, "info": {"source": "exploitdb", "exploit_id": "52239"}} {"text": "freeSSHd 1.0.9 - Denial of Service (DoS)", "spans": {"SYSTEM: freeSSHd 1.0.9": [[0, 14]], "VULNERABILITY: Denial of Service (DoS)": [[17, 40]]}, "info": {"source": "exploitdb", "exploit_id": "52342"}} {"text": "GeoVision ASManager Windows Application 6.1.2.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: GeoVision ASManager Windows Application 6.1.2.0": [[0, 47]], "VULNERABILITY: Remote Code Execution (RCE)": [[50, 77]]}, "info": {"source": "exploitdb", "exploit_id": "52424"}} {"text": "Golden FTP Server 4.70 - 'PASS' Buffer Overflow (2)", "spans": {"SYSTEM: Golden FTP Server 4.70": [[0, 22]], "VULNERABILITY: Buffer Overflow": [[32, 47]]}, "info": {"source": "exploitdb", "exploit_id": "49629"}} {"text": "GOM Player 2.3.90.5360 - Remote Code Execution (RCE)", "spans": {"SYSTEM: GOM Player 2.3.90.5360": [[0, 22]], "VULNERABILITY: Remote Code Execution (RCE)": [[25, 52]]}, "info": {"source": "exploitdb", "exploit_id": "51719"}} {"text": "HFS (HTTP File Server) 2.3.x - Remote Command Execution (3)", "spans": {"SYSTEM: HFS (HTTP File Server) 2.3.x": [[0, 28]], "VULNERABILITY: Remote Command Execution": [[31, 55]]}, "info": {"source": "exploitdb", "exploit_id": "49584"}} {"text": "Huawei HedEx Lite 200R006C00SPC005 - Path Traversal", "spans": {"SYSTEM: Huawei HedEx Lite 200R006C00SPC005": [[0, 34]], "VULNERABILITY: Path Traversal": [[37, 51]]}, "info": {"source": "exploitdb", "exploit_id": "49218"}} {"text": "Inbit Messenger v4.9.0 - Unauthenticated Remote Command Execution (RCE)", "spans": {"SYSTEM: Inbit Messenger v4.9.0": [[0, 22]], "VULNERABILITY: Remote Command Execution": [[41, 65]]}, "info": {"source": "exploitdb", "exploit_id": "51127"}} {"text": "Inbit Messenger v4.9.0 - Unauthenticated Remote SEH Overflow", "spans": {"SYSTEM: Inbit Messenger v4.9.0": [[0, 22]], "VULNERABILITY: Unauthenticated Remote SEH Overflow": [[25, 60]]}, "info": {"source": "exploitdb", "exploit_id": "51126"}} {"text": "Internet Download Manager v6.41 Build 3 - Remote Code Execution (RCE)", "spans": {"SYSTEM: Internet Download Manager v6.41 Build 3": [[0, 39]], "VULNERABILITY: Remote Code Execution (RCE)": [[42, 69]]}, "info": {"source": "exploitdb", "exploit_id": "51131"}} {"text": "IOTransfer 4.0 - Remote Code Execution (RCE)", "spans": {"SYSTEM: IOTransfer 4.0": [[0, 14]], "VULNERABILITY: Remote Code Execution (RCE)": [[17, 44]]}, "info": {"source": "exploitdb", "exploit_id": "50974"}} {"text": "Ivanti Avalanche