Exploits & CVE's

Exploits Database – Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, CVEs and more.

WordPress Alemha Watermarker 1.3.1 Cross Site Scripting

Authored by Erdemstar WordPress Alemha Watermarker plugin version 1.3.1 suffers from a persistent cross site scripting vulnerability. Change Mirror Download # Exploit Title: Wordpress Plugin Alemha Watermarker 1.3.1 - Stored Cross-Site Scripting...

Numbas Remote Code Execution

0
Authored by Matheus Boschetti Numbas versions prior to 7.3 suffer from a remote code execution vulnerability. advisories | CVE-2024-27612 Change Mirror Download # Exploit Title: Numbas < v7.3 - Remote Code Execution# Google...

DerbyNet 9.0 print/render/racer.inc SQL Injection

Authored by Valentin Lobstein DerbyNet 9.0 suffers from a remote SQL injection vulnerability in print/render/racer.inc. advisories | CVE-2024-30923 Change Mirror Download CVE ID: CVE-2024-30923Description:An SQL Injection vulnerability has been discovered in DerbyNet version...

WBCE 1.6.0 SQL Injection

0
Authored by Young Pope WBCE version 1.6.0 suffers from a remote SQL injection vulnerability. advisories | CVE-2023-39796 Change Mirror Download # Exploit Title: |Unauthenticated SQL injection in WBCE 1.6.0# Date: 15.11.2023 # Exploit...

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto PAN-OS < v11.1.2-h3 ...

Backdoor.Win32.Dumador.c MVID-2024-0679 Buffer Overflow

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Dumador.c malware suffers from a buffer overflow vulnerability. Change Mirror Download Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/6cc630843cabf23621375830df474bc5.txtContact: [email protected]: twitter.com/malvulnThreat: Backdoor.Win32.Dumador.cVulnerability:...

Visual Planning 8 Arbitrary File Read

Authored by David Brown, Lennert Preuth | Site schutzwerk.com Authenticated attackers can exploit a weakness in the XML parser functionality of the Visual Planning application in order to obtain read...

Google Pixel MFC H264 Processing Memory Corruption

Authored by Google Security Research, natashenka There is a memory corruption issue in the MFC media processing core on the Pixel 7. It occurs when decoding a malformed H264 stream...

HALO 2.13.1 CORS Issue

0
Authored by nu11secur1ty HALO version 2.13.1 has an insecure cross-origin resource sharing setting that allows an arbitrary origin. Change Mirror Download ## Title: HALO-2.13.1 Cross-origin resource sharing: arbitrary origin trusted## Author: nu11secur1ty##...

MinIO Privilege Escalation

0
Authored by Jenson Zhao MinIO versions prior to 2024-01-31T20-20-33Z suffer from a privilege escalation vulnerability. advisories | CVE-2024-24747 Change Mirror Download # Exploit Title: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation# Date: 2024-04-11#...
Error decoding the Instagram API json