Writeup Exploits

54,687 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-4435 WRITEUP HIGH
CPython TarFile - Incorrect Extraction with errorlevel=0
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
CVSS 7.5
CVE-2025-45001 WRITEUP HIGH
Numan React-native-keys - Cleartext Storage
react-native-keys 0.7.11 is vulnerable to sensitive information disclosure (remote) as encryption cipher and Base64 chunks are stored as plaintext in the compiled native binary. Attackers can extract these secrets using basic static analysis tools.
CVSS 7.5
CVE-2025-56301 WRITEUP HIGH
Rocket-Chip f517abbf41 - Memory Corruption
An issue was discovered in Chipsalliance Rocket-Chip commit f517abbf41abb65cea37421d3559f9739efd00a9 (2025-01-29) allowing attackers to corrupt exception handling and privilege state transitions via a flawed interaction between exception handling and MRET return mechanisms in the CSR logic when an exception is triggered during MRET execution. The Control and Status Register (CSR) logic has a flawed interaction between exception handling and exception return (MRET) mechanisms which can cause faulty trap behavior. When the MRET instruction is executed in machine mode without being in an exception state, an Instruction Access Fault may be triggered. This results in both the exception handling logic and the exception return logic activating simultaneously, leading to conflicting updates to the control and status registers.
CVSS 7.5
CVE-2025-56301 WRITEUP HIGH
Rocket-Chip f517abbf41 - Memory Corruption
An issue was discovered in Chipsalliance Rocket-Chip commit f517abbf41abb65cea37421d3559f9739efd00a9 (2025-01-29) allowing attackers to corrupt exception handling and privilege state transitions via a flawed interaction between exception handling and MRET return mechanisms in the CSR logic when an exception is triggered during MRET execution. The Control and Status Register (CSR) logic has a flawed interaction between exception handling and exception return (MRET) mechanisms which can cause faulty trap behavior. When the MRET instruction is executed in machine mode without being in an exception state, an Instruction Access Fault may be triggered. This results in both the exception handling logic and the exception return logic activating simultaneously, leading to conflicting updates to the control and status registers.
CVSS 7.5
CVE-2025-56301 WRITEUP HIGH
Rocket-Chip f517abbf41 - Memory Corruption
An issue was discovered in Chipsalliance Rocket-Chip commit f517abbf41abb65cea37421d3559f9739efd00a9 (2025-01-29) allowing attackers to corrupt exception handling and privilege state transitions via a flawed interaction between exception handling and MRET return mechanisms in the CSR logic when an exception is triggered during MRET execution. The Control and Status Register (CSR) logic has a flawed interaction between exception handling and exception return (MRET) mechanisms which can cause faulty trap behavior. When the MRET instruction is executed in machine mode without being in an exception state, an Instruction Access Fault may be triggered. This results in both the exception handling logic and the exception return logic activating simultaneously, leading to conflicting updates to the control and status registers.
CVSS 7.5
CVE-2025-45006 WRITEUP CRITICAL
Open-Source RISC-V Processor <f517abb - Memory Corruption
Improper mstatus.SUM bit retention (non-zero) in Open-Source RISC-V Processor commit f517abb violates privileged spec constraints, enabling potential physical memory access attacks.
CVSS 9.1
CVE-2022-34632 WRITEUP CRITICAL
Linuxfoundation Rocket Chip Generator - Broken Cryptographic Algorithm
Rocket-Chip commit 4f8114374d8824dfdec03f576a8cd68bebce4e56 was discovered to contain insufficient cryptography via the component /rocket/RocketCore.scala.
CVSS 9.1
CVE-2022-34632 WRITEUP CRITICAL
Linuxfoundation Rocket Chip Generator - Broken Cryptographic Algorithm
Rocket-Chip commit 4f8114374d8824dfdec03f576a8cd68bebce4e56 was discovered to contain insufficient cryptography via the component /rocket/RocketCore.scala.
CVSS 9.1
CVE-2022-34632 WRITEUP CRITICAL
Linuxfoundation Rocket Chip Generator - Broken Cryptographic Algorithm
Rocket-Chip commit 4f8114374d8824dfdec03f576a8cd68bebce4e56 was discovered to contain insufficient cryptography via the component /rocket/RocketCore.scala.
CVSS 9.1
CVE-2025-45143 WRITEUP HIGH
Devrafalko String-math - Denial of Service
string-math v1.2.2 was discovered to contain a Regex Denial of Service (ReDoS) which is exploited via a crafted input.
CVSS 7.0
CVE-2025-45150 WRITEUP CRITICAL
X-D LAB Langchain-chatglm-webui - Incorrect Permission Assignment
Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows attackers to arbitrarily view and download sensitive files via supplying a crafted request.
CVSS 9.8
CVE-2025-45160 WRITEUP MEDIUM
Cacti <=1.2.29 - HTML Injection
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.
CVSS 5.4
CVE-2025-45236 WRITEUP MEDIUM
Dbsyncer - XSS
A stored cross-site scripting (XSS) vulnerability in the Edit Profile feature of DBSyncer v2.0.6 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Nickname parameter.
CVSS 5.4
CVE-2025-45237 WRITEUP HIGH
Dbsyncer - Improper Access Control
Incorrect access control in the component /config/download of DBSyncer v2.0.6 allows attackers to access the JSON file containing sensitive account information, including the encrypted password.
CVSS 7.5
CVE-2025-45242 WRITEUP HIGH
Rhymix v2.1.22 - File Deletion
Rhymix v2.1.22 was discovered to contain an arbitrary file deletion vulnerability via the procFileAdminEditImage method in /file/file.admin.controller.php.
CVSS 7.7
CVE-2025-45331 WRITEUP HIGH
Ricko Brplot - NULL Pointer Dereference
brplot v420.69.1 contains a Null Pointer Dereference (NPD) vulnerability in the br_dagens_handle_once function of its data processing module, leading to unpredictable program behavior, causing segmentation faults, and program crashes.
CVSS 7.5
CVE-2025-45346 WRITEUP HIGH
Bacula-web < 9.7.1 - SQL Injection
SQL Injection vulnerability in Bacula-web before v.9.7.1 allows a remote attacker to execute arbitrary code via a crafted HTTP GET request.
CVSS 8.1
CVE-2025-45406 WRITEUP MEDIUM
Codeigniter4 Framework - XSS
A stored cross-site scripting (XSS) vulnerability in CodeIgniter4 v4.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the debugbar_time parameter. NOTE: this is disputed by the Supplier because attackers cannot influence the value of debugbar_time, and because debugbar-related data is automatically escaped by the CodeIgniter Parser class.
CVSS 6.1
CVE-2025-45424 WRITEUP MEDIUM
Xinference < 1.4.0 - Improper Access Control
Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication.
CVSS 5.3
CVE-2025-45467 WRITEUP HIGH
Unitree Go1 Firmware - Incorrect Default Permissions
Unitree Go1 <= Go1_2022_05_11 is vulnerable to Insecure Permissions as the firmware update functionality (via Wi-Fi/Ethernet) implements an insecure verification mechanism that solely relies on MD5 checksums for firmware integrity validation.
CVSS 7.1
CVE-2025-45487 WRITEUP CRITICAL
Linksys E5600 Firmware - Command Injection
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.InternetConnection function.
CVSS 9.8
CVE-2025-45488 WRITEUP CRITICAL
Linksys E5600 Firmware - Command Injection
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the mailex parameter.
CVSS 9.8
CVE-2025-45489 WRITEUP CRITICAL
Linksys E5600 Firmware - Command Injection
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the hostname parameter.
CVSS 9.8
CVE-2025-45490 WRITEUP CRITICAL
Linksys E5600 Firmware - Command Injection
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the password parameter.
CVSS 9.8
CVE-2025-45491 WRITEUP CRITICAL
Linksys E5600 Firmware - Command Injection
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the username parameter.
CVSS 9.8