LiquidWorm

790 exploits Active since Jun 2006
EIP-2026-104181 EXPLOITDB python WORKING POC
B-swiss 3 Digital Signage System 3.6.5 - Remote Code Execution
EIP-2026-104180 EXPLOITDB text WORKING POC
B-swiss 3 Digital Signage System 3.6.5 - Cross-Site Request Forgery (Add Maintenance Admin)
EIP-2026-104179 EXPLOITDB text WORKING POC
B-swiss 3 Digital Signage System 3.6.5 - Database Disclosure
EIP-2026-104148 EXPLOITDB text WRITEUP
ABB Cylon Aspect 3.08.03 - Hard-coded Secrets
EIP-2026-104147 EXPLOITDB text WORKING POC
ABB Cylon Aspect 3.08.03 (MapServicesHandler) - Authenticated Reflected XSS
CVE-2024-6298 EXPLOITDB CRITICAL WORKING POC
ABB ASPECT Enterprise, NEXUS Series, MATRIX Series <3.08.01 - Unauthorized File Access
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01 ; MATRIX Series v3.08.01 allows Attacker to execute arbitrary code remotely
CVSS 10.0
CVE-2015-2080 EXPLOITDB HIGH text WORKING POC
Fedora < 9.2.9.v20150224 - Information Disclosure
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
CVSS 7.5
EIP-2026-104146 EXPLOITDB WORKING POC
ABB Cylon Aspect 3.07.02 - File Disclosure
EIP-2026-104237 EXPLOITDB text WORKING POC
Emby MediaServer 3.2.5 - SQL Injection
EIP-2026-104236 EXPLOITDB text WORKING POC
Emby MediaServer 3.2.5 - Password Reset
EIP-2026-104235 EXPLOITDB text WORKING POC
Emby MediaServer 3.2.5 - Directory Traversal
EIP-2026-104204 EXPLOITDB text WORKING POC
CMU CERT/CC VINCE 2.0.6 - Stored XSS
EIP-2026-104194 EXPLOITDB text WORKING POC
Cayin Digital Signage System xPost 2.5 - Remote Command Injection
CVE-2024-13946 EXPLOITDB MEDIUM text WORKING POC
ASPECT-Enterprise <3.* - Binary Planting
DLL's are not digitally signed when loaded in ASPECT's configuration toolset exposing the application to binary planting during device commissioning.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.
CVSS 6.8
EIP-2026-103833 EXPLOITDB text WORKING POC
ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
EIP-2026-103832 EXPLOITDB python WORKING POC
ABB Cylon Aspect 3.08.03 - Guest2Root Privilege Escalation
EIP-2026-103815 EXPLOITDB text WORKING POC
SmartFoxServer 2X 2.17.0 - God Mode Console Remote Code Execution
EIP-2026-103814 EXPLOITDB text WRITEUP
SmartFoxServer 2X 2.17.0 - Credentials Disclosure
EIP-2026-103771 EXPLOITDB text WORKING POC
Daikin Security Gateway 14 - Remote Password Reset
EIP-2026-103762 EXPLOITDB text WORKING POC
ACE Stream Media 2.1 - 'acestream://' Format String
CVE-2024-48849 EXPLOITDB CRITICAL text WORKING POC
FLXEON <= 9.3.4 - Info Disclosure
Missing Origin Validation in WebSockets vulnerability in FLXEON. Session management was not sufficient to prevent unauthorized HTTPS requests. This issue affects FLXEON: through <= 9.3.4.
CVSS 9.4
CVE-2024-48852 EXPLOITDB CRITICAL text WORKING POC
FLEXON <9.3.4 - Info Disclosure
Insertion of Sensitive Information into Log File vulnerability observed in FLEXON. Some information may be improperly disclosed through https access. This issue affects FLXEON through <= 9.3.4.
CVSS 9.4
CVE-2024-48841 EXPLOITDB CRITICAL text WORKING POC
FLXEON <9.3.4 - Privilege Escalation
Network access can be used to execute arbitrary code with elevated privileges. This issue affects FLXEON 9.3.4 and older.
CVSS 10.0
CVE-2024-48841 EXPLOITDB CRITICAL text WORKING POC
FLXEON <9.3.4 - Privilege Escalation
Network access can be used to execute arbitrary code with elevated privileges. This issue affects FLXEON 9.3.4 and older.
CVSS 10.0
EIP-2026-103757 EXPLOITDB text WRITEUP
ABB Cylon FLXeon 9.3.4 - Default Credentials