October 10, 2022Zentao Project Management System 17.0 Remote Code Execution

Zentao Project Management System version 17.0 suffers from an authenticated remote code execution vulnerability.

October 7, 2022Joomla Vik Booking 1.15.0 Cross Site Scripting

Joomla Vik Booking extension version 1.15.0 suffers from a cross site scripting vulnerability.

October 7, 2022WordPress Zephyr Project Manager 3.2.42 SQL Injection

WordPress Zephyr Project Manager plugin version 3.2.42 suffers from a remote SQL injection vulnerability.

October 6, 2022Joomla KSAdvertiser 2.5.37 Cross Site Scripting

Joomla KSAdvertiser extension version 2.5.37 suffers from a cross site scripting vulnerability.

October 6, 2022Joomla JoomBri Careers 3.3.0 Cross Site Scripting

Joomla JoomBri Careers extension version 3.3.0 suffers from a cross site scripting vulnerability.

October 6, 2022Joomla JoomBri Freelance 4.5.0 Cross Site Scripting

Joomla JoomBri Freelance extension version 4.5.0 suffers from a cross site scripting vulnerability.

October 5, 2022Canteen Management 1.0-2022 Cross Site Scripting

Canteen Management version 1.0-2022 suffers from a cross site scripting vulnerability.

October 5, 2022Remote Mouse 4.110 Remote Code Execution

This Metasploit module utilizes the Remote Mouse Server by Emote Interactive protocol to deploy a payload and run it from the server. This module will only deploy a payload if the server is set without a password (default). Tested against 4.110, current a

October 5, 2022Ubuntu 22.04.1 X64 Desktop Enlightenment 0.25.3-1 Privilege Escalation

This Metasploit module exploits a command injection within Enlightenment's enlightenment_sys binary. This is done by calling the mount command and feeding it paths which meet all of the system requirements, but execute a specific path as well due to a sem

October 4, 2022WordPress WPvivid Backup Path Traversal

WordPress WPvivid Backup plugin versions prior to 0.9.76 suffer from a path traversal vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow