Exploit Database

139,313 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-26789 WRITEUP MEDIUM
Veritas NetBackUp OpsCenter 9.1.0.1 - XSS
Veritas NetBackUp OpsCenter Version 9.1.0.1 is vulnerable to Reflected Cross-site scripting (XSS). The Web App fails to adequately sanitize special characters. By leveraging this issue, an attacker is able to cause arbitrary HTML and JavaScript code to be executed in a user's browser.
CVSS 6.1
CVE-2023-26876 WRITEUP HIGH
Piwigo CVE-2023-26876 Gather Credentials via SQL Injection
SQL injection vulnerability found in Piwigo v.13.5.0 and before allows a remote attacker to execute arbitrary code via the filter_user_id parameter to the admin.php?page=history&filter_image_id=&filter_user_id endpoint.
CVSS 8.8
CVE-2023-26920 WRITEUP MEDIUM
fast-xml-parser <4.1.2 - Info Disclosure
fast-xml-parser before 4.1.2 allows __proto__ for Prototype Pollution.
CVSS 6.5
CVE-2023-26930 WRITEUP MEDIUM
XPDF <4.04 - Buffer Overflow
Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the PDFDoc malloc in the pdftotext.cc function. NOTE: Vendor states “it's an expected abort on out-of-memory error.”
CVSS 5.5
CVE-2023-26976 WRITEUP HIGH
Tenda AC6 <15.03.05.09 - Buffer Overflow
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
CVSS 7.5
CVE-2023-26986 WRITEUP HIGH
China Mobile OA Mailbox PC <2.9.23 - RCE
An issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox.
CVSS 7.8
CVE-2023-2645 WRITEUP CRITICAL
USR USR-G806 1.0.41 - Hard-Coded Password
A vulnerability, which was classified as critical, was found in USR USR-G806 1.0.41. Affected is an unknown function of the component Web Management Page. The manipulation of the argument username/password with the input root leads to use of hard-coded password. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-228774 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 9.8
CVE-2023-27159 WRITEUP HIGH
Appwrite <1.2.1 - SSRF
Appwrite up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /v1/avatars/favicon. This vulnerability allows attackers to access network resources and sensitive information via a crafted GET request.
CVSS 7.5
CVE-2023-27159 WRITEUP HIGH
Appwrite <1.2.1 - SSRF
Appwrite up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /v1/avatars/favicon. This vulnerability allows attackers to access network resources and sensitive information via a crafted GET request.
CVSS 7.5
CVE-2023-27160 WRITEUP HIGH
forem <v2022.11.11 - SSRF
forem up to v2022.11.11 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /articles/{id}. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request.
CVSS 7.2
CVE-2023-27161 WRITEUP HIGH
Jellyfin <10.7.7 - SSRF
Jellyfin up to v10.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /Repositories. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request.
CVSS 7.5
CVE-2023-27162 WRITEUP CRITICAL
openapi-generator <v6.4.0 - SSRF
openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/gen/clients/{language}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CVSS 9.1
CVE-2023-27163 WRITEUP MEDIUM
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CVSS 6.5
CVE-2023-27164 WRITEUP MEDIUM
Halo <1.6.1 - RCE
An arbitrary file upload vulnerability in Halo up to v1.6.1 allows attackers to execute arbitrary code via a crafted .md file.
CVSS 4.8
CVE-2023-27179 WRITEUP HIGH
GDidees CMS <3.9.1 - Info Disclosure
GDidees CMS v3.9.1 and lower was discovered to contain an arbitrary file download vulenrability via the filename parameter at /_admin/imgdownload.php.
CVSS 7.5
CVE-2023-27180 WRITEUP HIGH
GDidees CMS v3.9.1 - Info Disclosure
GDidees CMS v3.9.1 was discovered to contain a source code disclosure vulnerability by the backup feature which is accessible via /_admin/backup.php.
CVSS 7.5
CVE-2023-27241 WRITEUP MEDIUM
SourceCodester Water Billing System v1.0 - XSS
SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.
CVSS 6.1
CVE-2023-27242 WRITEUP MEDIUM
SourceCodester Loan Mgmt <1.0 - XSS
SourceCodester Loan Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Type parameter under the Edit Loan Types module.
CVSS 5.4
CVE-2023-27249 WRITEUP MEDIUM
swfdump <0.9.2 - Buffer Overflow
swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c.
CVSS 5.5
CVE-2023-27253 WRITEUP HIGH
Netgate pfSense <2.7.0 - Command Injection
A command injection vulnerability in the function restore_rrddata() of Netgate pfSense v2.7.0 allows authenticated attackers to execute arbitrary commands via manipulating the contents of an XML file supplied to the component config.xml.
CVSS 8.8
CVE-2023-27470 WRITEUP HIGH
N-able Take Control < 7.0.43 - TOCTOU Race Condition
BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.
CVSS 7.0
CVE-2023-27477 WRITEUP LOW
wasmtime - Buffer Overflow
wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices are greater than 16. There is an off-by-one error in the calculation of the mask to the `pshufb` instruction which causes incorrect results to be returned if lanes are selected from the second vector. This codegen bug has been fixed in Wasmtiem 6.0.1, 5.0.1, and 4.0.1. Users are recommended to upgrade to these updated versions. If upgrading is not an option for you at this time, you can avoid this miscompilation by disabling the Wasm simd proposal. Additionally the bug is only present on x86_64 hosts. Other platforms such as AArch64 and s390x are not affected.
CVSS 3.1
CVE-2023-27539 WRITEUP MEDIUM
Rack < 2.2.6.4 - Denial of Service
There is a denial of service vulnerability in the header parsing component of Rack.
CVSS 5.3
CVE-2023-27566 WRITEUP HIGH
Live2d Cubism Editor - Out-of-Bounds Write
Cubism Core in Live2D Cubism Editor 4.2.03 allows out-of-bounds write via a crafted Section Offset Table or Count Info Table in an MOC3 file.
CVSS 7.8
CVE-2023-27582 WRITEUP CRITICAL
Maddy < 0.6.3 - Authentication Bypass
maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.
CVSS 9.1