evilsocket

5 exploits Active since Sep 2024
CVE-2024-47177 GITHUB python WORKING POC
Rejected
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID.
CVE-2024-47176 METASPLOIT MEDIUM ruby SCANNER
CUPS - SSRF
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CVSS 5.3
EIP-2026-114029 EXPLOITDB text WRITEUP
WordPress Plugin SendIt 1.5.9 - Blind SQL Injection
EIP-2026-113954 EXPLOITDB text WORKING POC
WordPress Plugin Photoracer 1.0 - SQL Injection
EIP-2026-108793 EXPLOITDB text WRITEUP
Joomla! Component mod_simpleFileLister 1.0 - Directory Traversal