![]() 5 changes to exploits/shellcodes SAPSprint 7.60 - 'SAPSprint' Unquoted Service Path Seeddms 5.1.10 - Remote Command Execution (RCE) (Authenticated) Simple Client Management System 1.0 - 'uemail' SQL Injection (Unauthenticated) Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit) |
||
---|---|---|
.. | ||
dos | ||
local | ||
remote | ||
webapps |