![]() 16 changes to exploits/shellcodes Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC) Post-it 5.0.1 - Denial of Service (PoC) Notex the best notes 6.4 - Denial of Service (PoC) Spy Emergency 25.0.650 - 'Multiple' Unquoted Service Path WibuKey Runtime 6.51 - 'WkSvW32.exe' Unquoted Service Path Tftpd64 4.64 - 'Tftpd32_svc' Unquoted Service Path Accela Civic Platform 21.1 - 'successURL' Cross-Site-Scripting (XSS) Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR) GLPI 9.4.5 - Remote Code Execution (RCE) COVID19 Testing Management System 1.0 - 'State' Stored Cross-Site-Scripting (XSS) Stock Management System 1.0 - 'user_id' Blind SQL injection (Authenticated) Small CRM 3.0 - 'Authentication Bypass' SQL Injection TextPattern CMS 4.8.7 - Remote Command Execution (Authenticated) OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated) |
||
---|---|---|
.. | ||
dos | ||
local | ||
remote | ||
webapps |