STVS ProVision 5.9.10 – Cross-Site Request Forgery (Add Admin)
January 31st, 2021 📆 | 3193 Views ⚑
# Exploit Title: STVS ProVision 5.9.10 - Cross-Site Request Forgery (Add Admin) # Date: 19.01.2021 # Exploit Author: LiquidWorm #
January 31st, 2021 📆 | 3193 Views ⚑
# Exploit Title: STVS ProVision 5.9.10 - Cross-Site Request Forgery (Add Admin) # Date: 19.01.2021 # Exploit Author: LiquidWorm #
January 22nd, 2021 📆 | 5930 Views ⚑
# Exploit Title: Selea Targa IP OCR-ANPR Camera - CSRF Add Admin # Date: 07.11.2020 # Exploit Author: LiquidWorm #
January 17th, 2021 📆 | 2413 Views ⚑
# Exploit Title: Online Hotel Reservation System 1.0 - Admin Authentication Bypass # Exploit Author: Richard Jones # Date: 2021-01-13
January 17th, 2021 📆 | 7192 Views ⚑
# Exploit Title: Online Movie Streaming 1.0 - Admin Authentication Bypass # Exploit Author: Richard Jones # Date: 2021-01-13 #
January 16th, 2021 📆 | 7980 Views ⚑
# Exploit Title: PHP-Fusion CMS 9.03.90 - Cross-Site Request Forgery (Delete admin shoutbox message) # Date: 2020-12-21 # Exploit Author:
January 10th, 2021 📆 | 8217 Views ⚑
# Exploit Title: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Multiple Stored Cross-Site Scripting # Date:
December 20th, 2020 📆 | 2853 Views ⚑
# Exploit Title: Grav CMS 1.6.30 Admin Plugin 1.9.18 - 'Page Title' Persistent Cross-Site Scripting # Date: 13-12-2020 # Exploit
December 6th, 2020 📆 | 7229 Views ⚑
# Exploit Title: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting # Exploit
December 3rd, 2020 📆 | 5602 Views ⚑
EgavilanMedia User Registration And Login System With Admin Panel 1.0 XSS Posted Dec 2, 2020 Authored by Soushikta Chowdhury EgavilanMedia
December 1st, 2020 📆 | 2872 Views ⚑
# Exploit Title: TypeSetter 5.1 - CSRF (Change admin e-mail) # Exploit Author: Alperen Ergel # Software Homepage: https://www.typesettercms.com/ #
November 26th, 2020 📆 | 3794 Views ⚑
# frozen_string_literal: true ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClient
November 21st, 2020 📆 | 8342 Views ⚑
# Exploit Title: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass # Date: 17-11-2020
November 21st, 2020 📆 | 8270 Views ⚑
KL-001-2020-005 : Barco wePresent Admin Credentials Exposed In Plain-text Title: Barco wePresent Admin Credentials Exposed In Plain-textAdvisory ID: KL-001-2020-005Publication Date:
October 25th, 2020 📆 | 5609 Views ⚑
#!/usr/bin/env bash # Exploit Title: HiSilicon video encoders - full admin access via backdoor password # Date: 2020-09-20 # Exploit
October 24th, 2020 📆 | 4394 Views ⚑
# Exploit Title: User Registration & Login and User Management System With admin panel 2.1 - Persistent XSS # Google
September 25th, 2020 📆 | 5946 Views ⚑
# Exploit Title: B-swiss 3 Digital Signage System 3.6.5 - Cross-Site Request Forgery (Add Maintenance Admin) # Date: 2020-09-16 #
September 25th, 2020 📆 | 2446 Views ⚑
CISA announced Thursday that an unnamed United States government agency was hacked in an unusual method. The attacker used valid
September 10th, 2020 📆 | 6710 Views ⚑
# Exploit Title: Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password) # Google Dork: inurl:scopia+index.jsp # Date:
August 14th, 2020 📆 | 1614 Views ⚑
# Exploit Title: GetSimple CMS Plugin Multi User v1.8.2 - Cross-Site Request Forgery (Add Admin) # Exploit Author: Bobby Cooke
August 10th, 2020 📆 | 5625 Views ⚑
# Exploit Title: Warehouse Inventory System 1.0 - Cross-Site Request Forgery (Change Admin Password) # Exploit Author: Bobby Cooke (boku)
Comments