Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered 9 minutes ago

PoC for CVE-2024-9474

Palo Alto NetworksCloud Ngfw🟣 EPSS 97%7.2HIGH
Palo Alto Networks PAN-OS Privilege Escalation Vulnerability Affect...

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Discovered 4 hours ago

PoC for CVE-2024-48990

Qualys
Qualys: Needrestart Zero-Day Vulnerability Allows Root Access with ...

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

Discovered 6 hours ago

PoC for CVE-2023-50164

ApacheApache Struts🟣 EPSS 16%9.8CRITICAL
Struts File Upload Vulnerability Could Lead to Remote Code Execution

The CVE-2023-50164 vulnerability in Apache Struts enables remote code execution and is being actively exploited by threat actors. It affects a wide range of systems, including those used by Fortune 500 companies and various industries. The vulnerability requires specific conditions for exploitati...

Discovered 7 hours ago

PoC for CVE-2024-0012

Palo Alto NetworksCloud Ngfw🟣 EPSS 97%9.8CRITICAL
Authentication Bypass Vulnerability Affects Palo Alto Networks PAN-...

A critical vulnerability, CVE-2024-0012, affects Palo Alto Networks PAN-OS software, with an authentication bypass allowing unauthenticated attackers to gain administrator privileges. This could lead to administrative actions, configuration tampering, and other vulnerabilities being exploited. An...

Discovered 9 hours ago

PoC for CVE-2024-10924

Really Simple Plu...Really Simple Security...9.8CRITICAL
Authentication Bypass Vulnerability in Two-Factor Authentication

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are affected by a critical authentication bypass vulnerability, tracked as CVE-2024-10924, with a high CVSS score of 9.8. This vulnerability can allow unauthenticated attackers to log in as any existing user on the si...

Discovered 12 hours ago

PoC for CVE-2024-52316

ApacheApache Tomcat
Unchecked Error Condition Vulnerability Affects Apache Tomcat

Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the ...

Discovered 23 hours ago

PoC for CVE-2024-42640

angular-base64-up...
UNAUTHENTICATED REMOTE CODE EXECUTION VULNERABILITY IN ANGLER-BASE6...

angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of pr...

Discovered 1 day ago

PoC for CVE-2023-3722

AvayaAura Device Services8.6HIGH
Avaya Aura Device Services Remote Code Execution

An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.

PoC for CVE-2024-9474

Palo Alto NetworksCloud Ngfw🟣 EPSS 97%7.2HIGH
Palo Alto Networks PAN-OS Privilege Escalation Vulnerability Affect...

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

PoC for CVE-2023-32784

KeepassKeepass7.5HIGH
Memory Dump Vulnerability in KeePass 2.x Allows Recovery of Clearte...

In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system....

PoC for CVE-2024-0012

Palo Alto NetworksCloud Ngfw🟣 EPSS 97%9.8CRITICAL
Authentication Bypass Vulnerability Affects Palo Alto Networks PAN-...

A critical vulnerability, CVE-2024-0012, affects Palo Alto Networks PAN-OS software, with an authentication bypass allowing unauthenticated attackers to gain administrator privileges. This could lead to administrative actions, configuration tampering, and other vulnerabilities being exploited. An...

Discovered 2 days ago

PoC for CVE-2024-10924

Really Simple Plu...Really Simple Security...9.8CRITICAL
Authentication Bypass Vulnerability in Two-Factor Authentication

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are affected by a critical authentication bypass vulnerability, tracked as CVE-2024-10924, with a high CVSS score of 9.8. This vulnerability can allow unauthenticated attackers to log in as any existing user on the si...

PoC for CVE-2024-49039

MicrosoftWindows Server 20258.8HIGH
Elevation of Privilege Vulnerability Affects Windows Task Scheduler

Windows Task Scheduler Elevation of Privilege Vulnerability

PoC for CVE-2024-10924

Really Simple Plu...Really Simple Security...9.8CRITICAL
Authentication Bypass Vulnerability in Two-Factor Authentication

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are affected by a critical authentication bypass vulnerability, tracked as CVE-2024-10924, with a high CVSS score of 9.8. This vulnerability can allow unauthenticated attackers to log in as any existing user on the si...

PoC for CVE-2024-10924

Really Simple Plu...Really Simple Security...9.8CRITICAL
Authentication Bypass Vulnerability in Two-Factor Authentication

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are affected by a critical authentication bypass vulnerability, tracked as CVE-2024-10924, with a high CVSS score of 9.8. This vulnerability can allow unauthenticated attackers to log in as any existing user on the si...

PoC for CVE-2024-10592

MapsterMapster WP Maps6.4MEDIUM
Stored Cross-Site Scripting Vulnerability in WP Maps Plugin

The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level ac...

PoC for CVE-2024-38063

MicrosoftWindows 10 Version 18099.8CRITICAL
Windows TCP/IP Remote Code Execution Vulnerability

A critical remote code execution vulnerability, identified as CVE-2024-38063, has been discovered in the Windows TCP/IP stack by Microsoft. This vulnerability, rated with a CVSSv3 score of 9.8, can be exploited remotely by sending specially crafted IPv6 packets to the target, requiring no user in...

Discovered 3 days ago

PoC for CVE-2024-9935

RedefiningthewebPDF Generator Addon Fo...7.5HIGH
WordPress Plugin Vulnerable to Path Traversal Attacks

The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, ...

PoC for CVE-2019-2215

GoogleAndroid🟣 EPSS 49%7.8HIGH
Google - Android

A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network...

PoC for CVE-2024-10924

Really Simple Plu...Really Simple Security...9.8CRITICAL
Authentication Bypass Vulnerability in Two-Factor Authentication

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are affected by a critical authentication bypass vulnerability, tracked as CVE-2024-10924, with a high CVSS score of 9.8. This vulnerability can allow unauthenticated attackers to log in as any existing user on the si...

PoC for CVE-2024-27821

AppleiOS And iPad OS
iOS 17.5 and Later Fix Path Handling Issue That Could Leak Sensitiv...

A path handling issue was addressed with improved validation. This issue is fixed in iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A shortcut may output sensitive user data without consent.

PoC for CVE-2024-10793

MelapressWP Activity Log6.1MEDIUM
Unauthorized Execution of Arbitrary Web Scripts via User_id Parameter

The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scri...

PoC for CVE-2024-10793

MelapressWP Activity Log6.1MEDIUM
Unauthorized Execution of Arbitrary Web Scripts via User_id Parameter

The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scri...

PoC for CVE-2024-10245

Mobisoft974Relais 2fa9.8CRITICAL
Unauthenticated Attackers Can Bypass 2FA in Relais Plugin

The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on th...

Discovered 4 days ago

PoC for CVE-2024-8856

RevmakxBackup And Staging By ...9.8CRITICAL
Unauthenticated File Upload Vulnerability Affects WP Time Capsule B...

The vulnerability labeled as CVE-2024-8856 affects the WP Time Capsule plugin for WordPress, allowing unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution. This flaw has a severe impact, with a CVSS score of 9.8, and affects versions of the plugin up t...

PoC for CVE-2024-49379

Umbrel is a home server OS for self-hosting. The login functionality of Umbrel before version 1.2.2 contains a reflected cross-site scripting (XSS) vulnerability in use-auth.tsx. An attacker can specify a malicious redirect query parameter to trigger the vulnerability. If a JavaScript URL is pass...

PoC for CVE-2024-38063

MicrosoftWindows 10 Version 18099.8CRITICAL
Windows TCP/IP Remote Code Execution Vulnerability

A critical remote code execution vulnerability, identified as CVE-2024-38063, has been discovered in the Windows TCP/IP stack by Microsoft. This vulnerability, rated with a CVSSv3 score of 9.8, can be exploited remotely by sending specially crafted IPv6 packets to the target, requiring no user in...

PoC for CVE-2024-10914

D-LinkDns-320 Firmware🟣 EPSS 17%9.8CRITICAL
D-Link Routers Vulnerable to OS Command Injection Attacks

A critical vulnerability, CVE-2024-10914, has been found in D-Link network-attached storage devices that have reached end-of-life. This vulnerability allows attackers to execute arbitrary shell commands remotely using crafted HTTP GET requests. The flaw affects multiple models of D-Link NAS devic...

PoC for CVE-2024-11120

GeovisionGv-vs129.8CRITICAL
EOL GeoVision Devices Vulnerable to OS Command Injection Attacks

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received relat...

PoC for CVE-2024-10728

WPxpoPost Grid Gutenberg Bl...8.8HIGH
Unauthorized Plugin Installation Vulnerability Affects PostX Plugin...

The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possi...

Discovered 5 days ago

PoC for CVE-2024-9796

WP-Advanced-SearchWP-advanced-search9.8CRITICAL
Unauthorized SQL Injection Attacks via T Parameter in WP-Advanced-S...

The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks

PoC for CVE-2024-2876

IcegramEmail Subscribers By I...9.8CRITICAL
Email Subscribers Vulnerable to SQL Injection

The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escapi...

PoC for CVE-2022-39275

SaleorSaleor5.3MEDIUM
Improper object type validation in saleor

Saleor is a headless, GraphQL commerce platform. In affected versions some GraphQL mutations were not properly checking the ID type input which allowed to access database objects that the authenticated user may not be allowed to access. This vulnerability can be used to expose the following infor...

PoC for CVE-2024-7954

SpipSpip9.8CRITICAL
Arbitrary Code Execution Vulnerability in SPIP'sporte_plume Plugin

An arbitrary code execution vulnerability, CVE-2024-7954, was identified in the SPIP's porte_plume plugin, allowing remote unauthenticated attackers to execute arbitrary PHP code by sending a specially crafted HTTP request. The Cyble Sensor Intelligence report also highlighted other active vulner...

PoC for CVE-2018-1000531

InversoftPrime-jwt7.5HIGH
Inversoft - Prime-jwt

inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header usi...

PoC for CVE-2024-52301

Laravel
Ignoring Arguments for Environment Detection

CVE-2024-52301 is a critical vulnerability in the Laravel web application framework that allows attackers to change the environment used by the framework when handling requests. This can lead to unauthorized access, privilege escalation, data tampering, and potential further system compromise. Th...

PoC for CVE-2024-50803

The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges

PoC for CVE-2018-25031

SmartbearSwagger Ui4.3MEDIUM
Smartbear - Swagger Ui

Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parti...

Discovered 6 days ago

PoC for CVE-2024-2242

TakayukisterContact Form 76.1MEDIUM
Reflected Cross-Site Scripting Vulnerability in Contact Form 7 for ...

The Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘active-tab’ parameter in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web...

PoC for CVE-2024-47575

FortinetFortimanager9.8CRITICAL
Specially crafted requests can execute arbitrary code or commands i...

A critical vulnerability identified as CVE-2024-47575 in Fortinet's FortiManager tool has been actively exploited by an unknown threat actor known as UNC5820, impacting over 50 systems across various industries. This vulnerability, rated 9.8 out of 10 on the CVSS, allows remote attackers to execu...

PoC for CVE-2023-7261

GoogleOmaha
Privilege Escalation Vulnerability in Google Chrome Prior to 1.3.36...

Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)

PoC for CVE-2024-5764

SonatypeNexus6.5MEDIUM
Sonatype - Nexus

Use of Hard-coded Credentials vulnerability in Sonatype Nexus Repository has been discovered in the code responsible for encrypting any secrets stored in the Nexus Repository configuration database (SMTP or HTTP proxy credentials, user tokens, tokens, among others). The affected versions relied o...

PoC for CVE-2024-10924

Really Simple Plu...Really Simple Security...9.8CRITICAL
Authentication Bypass Vulnerability in Two-Factor Authentication

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are affected by a critical authentication bypass vulnerability, tracked as CVE-2024-10924, with a high CVSS score of 9.8. This vulnerability can allow unauthenticated attackers to log in as any existing user on the si...

PoC for CVE-2019-1653

CiscoCisco Small Business R...🟣 EPSS 98%7.5HIGH
Cisco Small Business RV320 and RV325 Routers Information Disclosure...

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit th...

PoC for CVE-2024-7124

Improper Neutralization of Input During Web Page Generation vulnerability in DInGO dLibra software in the parameter 'filter' in the endpoint 'indexsearch' allows a Reflected Cross-Site Scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run ...

PoC for CVE-2024-52302

common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint /api/v1/customer/profile-picture. This endpoint allows file uploads without proper vali...

PoC for CVE-2023-27997

FortinetFortiOS-6k7k9.2CRITICAL
FortiOS Buffer Overflow Vulnerability Could Lead to Arbitrary Code ...

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 al...

Discovered 1 week ago

PoC for CVE-2022-20474

GoogleAndroid7.8HIGH
Google - Android

In readLazyValue of Parcel.java, there is a possible loading of arbitrary code into the System Settings app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVe...

PoC for CVE-2024-44625

GogsGogs8.8HIGH
Gogs Directory Traversal Vulnerability

Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.

PoC for CVE-2024-5910

Palo Alto NetworksExpedition🟣 EPSS 97%9.8CRITICAL
Expedition Admin Account Takeover Risk Due to Missing Authentication

CVE-2024-5910 is a critical vulnerability in the Palo Alto Networks Expedition Migration Tool, with a high CVSS score of 9.3. It allows for attackers with network access to Expedition to take over the admin account due to missing authentication for a critical function. This puts configuration sec...