Browsing the "Site" Tag

Online Shopping Alphaware 1.0 Cross Site Scripting ≈ Packet Storm

August 7th, 2020 📆 | 4729 Views ⚑

# Exploit Title: Online Shopping Alphaware 1.0 – ‘Edit Customer Account’ Persistent Cross-Site Scripting (Authenticated)# Date: 2020-8-4# Exploit Author: Edo

Tagged with:




Daily Expenses Management System 1.0 Cross Site Scripting ≈ Packet Storm

August 7th, 2020 📆 | 2863 Views ⚑

# Exploit Title: Daily Expenses Management System 1.0 – Multiple Persistent Cross-Site Scripting# Date: 2020-8-4# Exploit Author: Edo Maland# Vendor

Tagged with:




Daily Expenses Management System 1.0 Cross SIte Request Forgery ≈ Packet Storm

August 7th, 2020 📆 | 5591 Views ⚑

# Exploit Title: Daily Expenses Management System 1.0 – Cross-Site Request Forgery# Date: 2020-8-5# Exploit Author: Edo Maland# Vendor Homepage:

Tagged with:




Online Shopping Alphaware 1.0 Cross Site Request Forgery ≈ Packet Storm

August 7th, 2020 📆 | 6788 Views ⚑

# Exploit Title: Online Shopping Alphaware 1.0 – Cross-Site Request Forgery (Account Takeover)# Date: 2020-8-4# Exploit Author: Edo Maland# Vendor

Tagged with:




Car Rental Management System 1.0 Cross Site Scripting ≈ Packet Storm

August 5th, 2020 📆 | 8119 Views ⚑

# Exploit Title: Car Rental Management System v1.0 – Persistent Cross-Site Scripting (Unauthenticated)# Exploit Author: Adeeb Shah (@hyd3sec)# Date: August

Tagged with:




Gantt-Chart For Jira 5.5.4 Cross Site Scripting ≈ Packet Storm

August 5th, 2020 📆 | 1683 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA512 Advisory ID: SYSS-2020-030Product: Jira module “Gantt-Chart for Jira”Manufacturer: Frank Polscheit – Solutions & IT-ConsultingAffected Version(s):

Tagged with:




Namirial SIGNificant SignAnyWhere 6.10.x Cross Site Scripting ≈ Packet Storm

July 31st, 2020 📆 | 3925 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20200728-0 >=======================================================================title: Stored Cross-Site Scripting (XSS) Vulnerabilityproduct: Namirial SIGNificant SignAnyWherevulnerable version: v6.10.60.25434 (SSP

Tagged with:




WordPress Maintenance Mode By SeedProd 5.1.1 Cross Site Scripting ≈ Packet Storm

July 30th, 2020 📆 | 5553 Views ⚑

# Exploit Title: WordPress Plugin Maintenance Mode by SeedProd 5.1.1 – Persistent Cross-Site Scripting# Date: 2020-06-22# Vendor Homepage: https://www.seedprod.com/# Vendor

Tagged with:




Virtual Airlines Manager 2.6.2 Cross Site Scripting ≈ Packet Storm

July 29th, 2020 📆 | 6121 Views ⚑

# Exploit Title: Virtual Airlines Manager 2.6.2 – Persistent Cross-Site Scripting# Google Dork: inurl:”/vam/index_vam_op.php”# Date: 2020-06-29# Exploit Author: Peter Blue#

Tagged with:




pfSense 2.4.4-p3 Cross Site Request Forgery ≈ Packet Storm

July 29th, 2020 📆 | 7231 Views ⚑

# Exploit Title: pfSense 2.4.4-p3 – Cross-Site Request Forgery# Date: 2019-09-27# Exploit Author: ghost_fh# Vendor Homepage: https://www.pfsense.org/# Software Link: https://www.pfsense.org/download/index.html?section=downloads#

Tagged with:




WordPress NexosReal Estate Theme 1.7 Cross Site Scripting / SQL Injection ≈ Packet Storm

July 23rd, 2020 📆 | 3350 Views ⚑

*]# Exploit Title: WordPress Theme NexosReal Estate 1.7 – ‘search_order’ SQL Injection*]# Google Dork: inurl:/wp-content/themes/nexos/*]# Date: 2020-06-17*]# Exploit Author: Vlad

Tagged with:




ICE Questions an Admin of The-Eye Archive Site About ‘BlueLeaks’

July 21st, 2020 📆 | 2530 Views ⚑

On Thursday, Immigration and Customs Enforcement agents questioned a woman who shared a copy of allegedly stolen U.S. police internal

Tagged with:




Online Farm Management System 0.1.0 Cross Site Scripting ≈ Packet Storm

July 17th, 2020 📆 | 8218 Views ⚑

# Exploit Title: Online Farm Management System 0.1.0 - Persistent Cross-Site Scripting# Date: 2020-06-29# Exploit Author: KeopssGroup0day,Inc# Vendor Homepage: https://www.sourcecodester.com/php/14198/online-farm-management-system-phpmysql.html#

Tagged with:




Webtareas 2.1 / 2.1p Cross Site Scripting ≈ Packet Storm

July 11th, 2020 📆 | 3302 Views ⚑

#Author: AppleBois#Homepage: https://sourceforge.net/projects/webtareas/#Affected Version: 2.1/2.1p#Stored XSS#Allows an attacker to execute arbitrary HTML and JavaScript code#More info : https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a#Solutions: “NONE” Payload

Tagged with: