![]() 1 changes to exploits/shellcodes WinRAR 5.61 - Path Traversal Nuuo Central Management - Authenticated SQL Server SQL Injection (Metasploit) Nuuo Central Management - (Authenticated) SQL Server SQL Injection (Metasploit) Splunk Enterprise 7.2.3 - Authenticated Custom App RCE Splunk Enterprise 7.2.3 - (Authenticated) Custom App Remote Code Execution LogonBox Limited / Hypersocket Nervepoint Access Manager - Unauthenticated Insecure Direct Object Reference LogonBox Limited / Hypersocket Nervepoint Access Manager - (Unauthenticated) Insecure Direct Object Reference VA MAX 8.3.4 - Authenticated Remote Code Execution VA MAX 8.3.4 - (Authenticated) Remote Code Execution WordPress Plugin Booking Calendar 8.4.3 - Authenticated SQL Injection WordPress Plugin Booking Calendar 8.4.3 - (Authenticated) SQL Injection PRTG Network Monitor 18.2.38 - Authenticated Remote Code Execution PRTG Network Monitor 18.2.38 - (Authenticated) Remote Code Execution CMS Made Simple Showtime2 Module 3.6.2 - Authenticated Arbitrary File Upload CMS Made Simple Showtime2 Module 3.6.2 - (Authenticated) Arbitrary File Upload |
||
---|---|---|
.. | ||
dos | ||
local | ||
remote | ||
webapps |