Larry W. Cashdollar

55 exploits Active since Feb 1999
EIP-2026-114053 EXPLOITDB text WORKING POC
WordPress Plugin Simple Image Manipulator 1.0 - Arbitrary File Download
EIP-2026-114279 EXPLOITDB text WORKING POC
WordPress Plugin WPTF Image Gallery 1.03 - Arbitrary File Download
EIP-2026-114001 EXPLOITDB text WORKING POC
WordPress Plugin Recent Backups 0.7 - Arbitrary File Download
CVE-2014-8607 EXPLOITDB text WORKING POC
Xcloner - Information Disclosure
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command.
CVE-2018-1002009 EXPLOITDB MEDIUM text WRITEUP
WordPress Arigato Autoresponder & Newsletter <v2.5.1.8 - XSS
There is a reflected XSS vulnerability in WordPress Arigato Autoresponder and News letter v2.5.1.8 This vulnerability requires administrative privileges to exploit. There is an XSS vulnerability in unsubscribe.html.php:3: via GET reuqest to the email variable.
CVSS 4.8
CVE-2015-4455 EXPLOITDB CRITICAL text WORKING POC
Aviary Image Editor Add-on For Gravit... - Unrestricted File Upload
Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary.
CVSS 9.8
EIP-2026-113618 EXPLOITDB text WORKING POC
WordPress Plugin Candidate Application Form 1.0 - Arbitrary File Download
CVE-2015-4616 EXPLOITDB text WORKING POC
Easy2map < 1.2.4 - Path Traversal
Directory traversal vulnerability in includes/MapPinImageSave.php in the Easy2Map plugin before 1.2.5 for WordPress allows remote attackers to create arbitrary files via a .. (dot dot) in the map_id parameter.
CVE-2017-1002008 EXPLOITDB CRITICAL python WORKING POC
Membership Simplified - Unrestricted File Upload
Vulnerability in wordpress plugin membership-simplified-for-oap-members-only v1.58, The file download code located membership-simplified-for-oap-members-only/download.php does not check whether a user is logged in and has download privileges.
CVSS 9.8
CVE-2018-9206 EXPLOITDB CRITICAL text WORKING POC
Blueimp jQuery-File-Upload <=9.22.0 - File Upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
CVSS 9.8
EIP-2026-108833 EXPLOITDB text WORKING POC
Joomla! Component Portfolio Gallery 1.0.6 - SQL Injection
CVE-2016-1000125 EXPLOITDB CRITICAL text WORKING POC
Huge-IT Catalog <1.0.7 - SQL Injection
Unauthenticated SQL Injection in Huge-IT Catalog v1.0.7 for Joomla
CVSS 9.8
CVE-2016-1000124 EXPLOITDB CRITICAL text WRITEUP
Huge-IT Portfolio Gallery Plugin <1.0.6 - SQL Injection
Unauthenticated SQL Injection in Huge-IT Portfolio Gallery Plugin v1.0.6
CVSS 9.8
EIP-2026-108578 EXPLOITDB text WORKING POC
Joomla! Component com_videogallerylite 1.0.9 - SQL Injection
EIP-2026-108230 EXPLOITDB text WORKING POC
Joomla! Component Catalog 1.0.7 - SQL Injection
CVE-2016-1000123 EXPLOITDB CRITICAL text WRITEUP
Huge-IT Video Gallery v1.0.9 - SQL Injection
Unauthenticated SQL Injection in Huge-IT Video Gallery v1.0.9 for Joomla
CVSS 9.8
CVE-2018-9205 EXPLOITDB HIGH text WORKING POC
Drupal Avatar Uploader - Path Traversal
Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesn't verify users or sanitize the file path.
CVSS 7.5
CVE-2018-9206 EXPLOITDB CRITICAL python WORKING POC
Blueimp jQuery-File-Upload <=9.22.0 - File Upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
CVSS 9.8
CVE-2018-9206 EXPLOITDB CRITICAL ruby WORKING POC
Blueimp jQuery-File-Upload <=9.22.0 - File Upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
CVSS 9.8
EIP-2026-104064 EXPLOITDB text WRITEUP
RubyGems fastreader - 'entry_controller.rb' Remote Command Execution
CVE-2010-1183 EXPLOITDB text WORKING POC
Oracle Solaris - Info Disclosure
Certain patch-installation scripts in Oracle Solaris allow local users to append data to arbitrary files via a symlink attack on the /tmp/CLEANUP temporary file, related to use of Update Manager.
CVE-2015-7556 EXPLOITDB HIGH text WORKING POC
DeleGate 9.9.13 - Privilege Escalation
DeleGate 9.9.13 allows local users to gain privileges as demonstrated by the dgcpnod setuid program.
CVSS 7.8
CVE-1999-1008 EXPLOITDB c WORKING POC
xsoldier - Privilege Escalation via Long Argument
xsoldier program allows local users to gain root access via a long argument.
CVE-2003-0265 EXPLOITDB perl WORKING POC
SAP Database 7.3.0.29 - Privilege Escalation
Race condition in SDBINST for SAP database 7.3.0.29 creates critical files with world-writable permissions before initializing the setuid bits, which allows local attackers to gain root privileges by modifying the files before the permissions are changed.
EIP-2026-102983 EXPLOITDB c WORKING POC
rpi-update - Insecure Temporary File Handling / Security Bypass