CVE-2021-42362
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
Github link:
https://github.com/samiba6/CVE-2021-42362
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
Github link:
https://github.com/samiba6/CVE-2021-42362
GitHub
GitHub - samiba6/CVE-2021-42362: The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient…
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for att...
CVE-2019-9053
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/del0x3/CVE-2019-9053-port-py3
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/del0x3/CVE-2019-9053-port-py3
GitHub
GitHub - del0x3/CVE-2019-9053-port-py3: CVE-2019-9053.
CVE-2019-9053. Contribute to del0x3/CVE-2019-9053-port-py3 development by creating an account on GitHub.
CVE-2019-9053
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/kaizoku73/CVE-2019-9053
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/kaizoku73/CVE-2019-9053
GitHub
GitHub - kaizoku73/CVE-2019-9053: CMS Made Simple ≤ 2.2.9 SQL Injection Vulnerability CVE-2019-9053 is a vulnerability found in…
CMS Made Simple ≤ 2.2.9 SQL Injection Vulnerability CVE-2019-9053 is a vulnerability found in CMS Made Simple (CMSMS) versions up to 2.2.9, where the application is vulnerable to a blind time-based...
CVE-2019-9053
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/Hackheart-tech/-exploit-lab
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/Hackheart-tech/-exploit-lab
GitHub
GitHub - Hackheart-tech/-exploit-lab: Exploits Python cve-2019-9053– by HackHeart
Exploits Python cve-2019-9053– by HackHeart. Contribute to Hackheart-tech/-exploit-lab development by creating an account on GitHub.
CVE-2020-1054
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
Github link:
https://github.com/Naman2701B/CVE-2020-1054
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
Github link:
https://github.com/Naman2701B/CVE-2020-1054
GitHub
GitHub - Naman2701B/CVE-2020-1054: This is a modified version of CVE 2020 1054 PoC
This is a modified version of CVE 2020 1054 PoC. Contribute to Naman2701B/CVE-2020-1054 development by creating an account on GitHub.
CVE-2020-0665
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
Github link:
https://github.com/gunzf0x/CVE-2020-0665
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
Github link:
https://github.com/gunzf0x/CVE-2020-0665
GitHub
GitHub - gunzf0x/CVE-2020-0665: Proof of Concept for CVE-2020-0665, a.k.a. SID Filter Bypass.
Proof of Concept for CVE-2020-0665, a.k.a. SID Filter Bypass. - gunzf0x/CVE-2020-0665
CVE-2025-29927
None
Github link:
https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation
None
Github link:
https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation
GitHub
GitHub - Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation: Simulates CVE-2025-29927, a critical Next.js vulnerability allowing…
Simulates CVE-2025-29927, a critical Next.js vulnerability allowing attackers to bypass middleware authorization by exploiting the internal x-middleware-subrequest HTTP header. Demonstrates unautho...