February 17, 2023Best POS Management System 1.0 Cross Site Scripting

Best POS Management System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.

February 17, 2023Zabbix Agent 6.2.7 Insecure Permissions / Privilege Escalation

Zabbix Agent and Zabbix Agent 2 versions 6.2.7 and below suffer from an issue where it does not secure the permissions on a non-default installation directory, allowing an attacker to place a malicious executable to escalate privileges.

February 17, 2023Demanzo Matrimony 1.5 Cross Site Request Forgery

Demanzo Matrimony version 1.5 suffers from a cross site request forgery vulnerability.

February 17, 2023Argon Dashboard 1.1.2 SQL Injection

Argon Dashboard version 1.1.2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

February 16, 2023Atrocore 1.5.25 Shell Upload

Atrocore version 1.5.25 suffers from a remote shell upload vulnerability.

February 15, 2023B&R Systems Diagnostics Manager Cross Site Scripting

B&R Systems Diagnostics Manager versions above or equal to 3.00 and below or equal to C4.93 suffer from a cross site scripting vulnerability.

February 15, 2023WordPress Quiz And Survey Master 8.0.8 Cross Site Request Forgery

WordPress Quiz and Survey Master plugin versions 8.0.8 and below suffer from a cross site request forgery vulnerability.

February 15, 2023WordPress Quiz And Survey Master 8.0.8 Media Deletion

WordPress Quiz and Survey Master plugin versions 8.0.8 and below suffer from a missing authentication vulnerability that allows an attacker to delete media from the WordPress instance.

February 15, 2023GitLab GitHub Repo Import Deserialization Remote Code Execution

An authenticated user can import a repository from GitHub into GitLab. If a user attempts to import a repo from an attacker-controlled server, the server will reply with a Redis serialization protocol object in the nested default_branch. GitLab will cache

February 15, 2023Korenix JetWave Command Injection / Denial Of Service

Multiple versions of Korenix JetWave suffer from authenticated command injection and denial of service vulnerabilities.

Archives
Categories
  • All Exploits 4105
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow