CVE-2022-1386
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
Github link:
https://github.com/lamcodeofpwnosec/CVE-2022-1386
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
Github link:
https://github.com/lamcodeofpwnosec/CVE-2022-1386
GitHub
GitHub - lamcodeofpwnosec/CVE-2022-1386: Fusion Builder < 3.6.2 - Unauthenticated SSRF
Fusion Builder < 3.6.2 - Unauthenticated SSRF. Contribute to lamcodeofpwnosec/CVE-2022-1386 development by creating an account on GitHub.
CVE-2023-4220
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/MikeyPPPPPPPP/CVE-2023-4220
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/MikeyPPPPPPPP/CVE-2023-4220
GitHub
GitHub - MikeyPPPPPPPP/CVE-2023-4220: Remote command execution exploit made for redteamers.
Remote command execution exploit made for redteamers. - MikeyPPPPPPPP/CVE-2023-4220
CVE-2022-26318
On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
Github link:
https://github.com/egilas/Watchguard-RCE-POC-CVE-2022-26318
On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
Github link:
https://github.com/egilas/Watchguard-RCE-POC-CVE-2022-26318
GitHub
GitHub - egilas/Watchguard-RCE-POC-CVE-2022-26318: PoC for Watchguard CVE-2022-26318 updated to Python3.12
PoC for Watchguard CVE-2022-26318 updated to Python3.12 - egilas/Watchguard-RCE-POC-CVE-2022-26318
CVE-2024-9465
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
Github link:
https://github.com/Farzan-Kh/CVE-2024-9465
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
Github link:
https://github.com/Farzan-Kh/CVE-2024-9465
CVE-2023-4220
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/Pr1or95/CVE-2023-4220-exploit
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/Pr1or95/CVE-2023-4220-exploit
GitHub
GitHub - Pr1or95/CVE-2023-4220-exploit: Carga de archivos sin restricciones en la funcionalidad de carga de archivos grandes en…
Carga de archivos sin restricciones en la funcionalidad de carga de archivos grandes en `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` en Chamilo LMS en versiones <= 1.11.24 permite ...
CVE-2024-10914
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Github link:
https://github.com/redspy-sec/D-Link
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Github link:
https://github.com/redspy-sec/D-Link
GitHub
GitHub - redspy-sec/D-Link: CVE-2024-10914 D-Link Remote Code Execution (RCE)
CVE-2024-10914 D-Link Remote Code Execution (RCE). Contribute to redspy-sec/D-Link development by creating an account on GitHub.
CVE-2024-6782
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
Github link:
https://github.com/NketiahGodfred/CVE-2024-6782
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
Github link:
https://github.com/NketiahGodfred/CVE-2024-6782
GitHub
GitHub - NketiahGodfred/CVE-2024-6782: Calibre Remote Code Execution
Calibre Remote Code Execution. Contribute to NketiahGodfred/CVE-2024-6782 development by creating an account on GitHub.