PhpCollab versions 2.5.1 and below suffer from multiple remote SQL injection vulnerabilities.
60393ffbba4cf77640d0495ff1ac04b03ec23c7c5d69c624bbad0ff95a134795
UCOPIA Wireless Appliance version prior to 5.1.8 suffer from a chroot escape privilege escalation vulnerability.
4f7e58adbfdd9de93ccaebd67d649ffa90a374c7320277dc04695c119db02908
UCOPIA Wireless Appliance version prior to 5.1.8 suffer from a restricted shell escape vulnerability.
b89bf2b19931af9f45509a36fd07550ef582566bfe0c8c59bec4e7227f00f09b
SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a denial of service vulnerability.
93180898a3ba0ab2702b4aa9e84bd5c58147e51d7d510916d0269bf60b73ba35
SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a cross site scripting vulnerability.
8a663aeaed4fe6990426272c59d2c99b583958e2f530562ff27f3da2bfe17d28
The Zyxel P-2812HNU-F1 DSL router suffers from a remote command injection vulnerability. Firmware versions V3.11TUE3 (KPN) and V3.11TUE8 (KPN) are affected.
66372d846f543901562ef728ccfb30a15e208e8dff6f028467937af652912375
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.
ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.
b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.
cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.
6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.
a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.
39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.
0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the Deployment functionality.
73990b4f2d4900515078c4e3e54e6c2a672d4e451a27fcc91b4b3b158d608144
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the XPressoDoc functionality.
835e7040485b8eec8fd758b43e023864584ee9ddd8bf28a69d28672cb49a540d
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the xDashboard functionality.
b7a7c0af738724338221fcb3437fbd9c6305623423be669615e20e312ec2377f
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the doclist functionality.
06fe4a5631c9ee9c179de3b45c389621f11062c74876783f3fd5a7b523eb4ec9
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an arbitrary file read vulnerability.
81085a870f935b25853be4a14962995c5ed2c54f8ad9e7006dad0bd9a8bd405a
Faleemi FSC-880 suffers from command execution, cross site request forgery, remote SQL injection, and various other vulnerabilities.
96810e1c0eb0fbaef786214d894173d6a716f9e0dc87838dcea25c2904912f95
This exploit tests the target Oracle WebLogic Server for Java Deserialization remote code execution vulnerability. The ysoserial payload causes the target to send Ping requests to the attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload (chunk2) with that of your choice. Do not worry about modifying the payload length each time you change the payload as this script will do it for you on the fly. Versions affected include 10.3.6.0, 12.1.2.0, 12.1.3.0 and 12.2.1.0.
ac556f1550022f3147ba71eb384d81217f8f01394258077e4047ca66a5f06464
Roteador Wireless Intelbras WRN150 suffers from an authentication bypass vulnerability.
d7fa7ee4b3e55bcdd38622b982fbf3eb8af71e001cee414eaa3b330410fb36ba
ZeeBuddy version 2x suffers from a remote SQL injection vulnerability.
a7c1ced652dcd3ddf53bb716966fe71c5928d74d2a85e0442128dde52c967342
FileRun versions 2017.09.18 and below suffer from a remote SQL injection vulnerability.
73cfe1415b3d086280477d5589d12a650240435d5bff3958ab7256864aafd3f1
This Metasploit module exploits a directory traversal vulnerability found in the LAquis SCADA application. The vulnerability is triggered when sending a series of dot dot slashes (../) to the vulnerable NOME parameter found on the listagem.laquis file. This Metasploit module was tested against version 4.1.0.2385.
ae0975440fb126f19c5ccc25be557789a6e620a677ff401fc17497d5b023dd68
Cisco Prime Collaboration Provisioning versions prior to 12.1 suffer from authentication bypass and code execution vulnerabilities.
dfd9c9f1d24c40585c41065348c276c1ee7b370952139218edb30fa3bb94f440