[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
Mehmet Onder
MyT Project Management 1.5.1 - 'Charge[group_total]' SQL Injection
webapps
php
80.0
Noman Riffat
WordPress Plugin UserPro < 4.9.21 - User Registration Privilege Escalation
webapps
php
80.0
Ozer Goker
phpMoAdmin MongoDB GUI 1.1.5 - Cross-Site Request Forgery / Cross-Site Scripting
webapps
php
80.0
Ozer Goker
phpMoAdmin MongoDB GUI 1.1.5 - Cross-Site Request Forgery / Cross-Site Scripting
webapps
php
80.0
Kumar Saurav
PLC Wireless Router GPN2.4P21-C-CN - Cross-Site Scripting
webapps
cgi
80.0
CVE-2018-20326
0xB9
MyBB OUGC Awards Plugin 1.8.3 - Persistent Cross-Site Scripting
webapps
php
80.0
CVE-2019-3501
0xB9
LayerBB 1.1.1 - Persistent Cross-Site Scripting
webapps
php
80.0
CVE-2018-17997
Bogdan Kurinnoy
Microsoft Edge 44.17763.1.0 - NULL Pointer Dereference
dos
windows
Deyaa Muhammad
All in One Video Downloader 1.2 - (Authenticated) SQL Injection
webapps
php
80.0
Deyaa Muhammad
Embed Video Scripts - Persistent Cross-Site Scripting
webapps
php
80.0
Mehmet Ince
Mailcleaner - (Authenticated) Remote Code Execution (Metasploit)
remote
python
443.0
bcoles
Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (polkit Method)
local
linux
CVE-2018-18955
bcoles
Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method)
local
linux
CVE-2018-18955
SandboxEscaper
Microsoft Windows - Windows Error Reporting Local Privilege Escalation
local
windows
Metasploit
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote
linux
«
...
388
389
390
391
392
393
394
395
396
397
398
...
»
page: 393/3001 [exploits: 48015]