Exploit Database

139,558 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-26986 WRITEUP HIGH
China Mobile OA Mailbox PC <2.9.23 - RCE
An issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox.
CVSS 7.8
CVE-2023-2645 WRITEUP CRITICAL
USR USR-G806 1.0.41 - Hard-Coded Password
A vulnerability, which was classified as critical, was found in USR USR-G806 1.0.41. Affected is an unknown function of the component Web Management Page. The manipulation of the argument username/password with the input root leads to use of hard-coded password. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-228774 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 9.8
CVE-2023-27159 WRITEUP HIGH
Appwrite <1.2.1 - SSRF
Appwrite up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /v1/avatars/favicon. This vulnerability allows attackers to access network resources and sensitive information via a crafted GET request.
CVSS 7.5
CVE-2023-27159 WRITEUP HIGH
Appwrite <1.2.1 - SSRF
Appwrite up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /v1/avatars/favicon. This vulnerability allows attackers to access network resources and sensitive information via a crafted GET request.
CVSS 7.5
CVE-2023-27160 WRITEUP HIGH
forem <v2022.11.11 - SSRF
forem up to v2022.11.11 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /articles/{id}. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request.
CVSS 7.2
CVE-2023-27161 WRITEUP HIGH
Jellyfin <10.7.7 - SSRF
Jellyfin up to v10.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /Repositories. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request.
CVSS 7.5
CVE-2023-27162 WRITEUP CRITICAL
openapi-generator <v6.4.0 - SSRF
openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/gen/clients/{language}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CVSS 9.1
CVE-2023-27163 WRITEUP MEDIUM
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CVSS 6.5
CVE-2023-27164 WRITEUP MEDIUM
Halo <1.6.1 - RCE
An arbitrary file upload vulnerability in Halo up to v1.6.1 allows attackers to execute arbitrary code via a crafted .md file.
CVSS 4.8
CVE-2023-27179 WRITEUP HIGH
GDidees CMS <3.9.1 - Info Disclosure
GDidees CMS v3.9.1 and lower was discovered to contain an arbitrary file download vulenrability via the filename parameter at /_admin/imgdownload.php.
CVSS 7.5
CVE-2023-27180 WRITEUP HIGH
GDidees CMS v3.9.1 - Info Disclosure
GDidees CMS v3.9.1 was discovered to contain a source code disclosure vulnerability by the backup feature which is accessible via /_admin/backup.php.
CVSS 7.5
CVE-2023-27241 WRITEUP MEDIUM
SourceCodester Water Billing System v1.0 - XSS
SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.
CVSS 6.1
CVE-2023-27242 WRITEUP MEDIUM
SourceCodester Loan Mgmt <1.0 - XSS
SourceCodester Loan Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Type parameter under the Edit Loan Types module.
CVSS 5.4
CVE-2023-27249 WRITEUP MEDIUM
swfdump <0.9.2 - Buffer Overflow
swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c.
CVSS 5.5
CVE-2023-27253 WRITEUP HIGH
Netgate pfSense <2.7.0 - Command Injection
A command injection vulnerability in the function restore_rrddata() of Netgate pfSense v2.7.0 allows authenticated attackers to execute arbitrary commands via manipulating the contents of an XML file supplied to the component config.xml.
CVSS 8.8
CVE-2023-27470 WRITEUP HIGH
N-able Take Control < 7.0.43 - TOCTOU Race Condition
BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.
CVSS 7.0
CVE-2023-27477 WRITEUP LOW
wasmtime - Buffer Overflow
wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices are greater than 16. There is an off-by-one error in the calculation of the mask to the `pshufb` instruction which causes incorrect results to be returned if lanes are selected from the second vector. This codegen bug has been fixed in Wasmtiem 6.0.1, 5.0.1, and 4.0.1. Users are recommended to upgrade to these updated versions. If upgrading is not an option for you at this time, you can avoid this miscompilation by disabling the Wasm simd proposal. Additionally the bug is only present on x86_64 hosts. Other platforms such as AArch64 and s390x are not affected.
CVSS 3.1
CVE-2023-27539 WRITEUP MEDIUM
Rack < 2.2.6.4 - Denial of Service
There is a denial of service vulnerability in the header parsing component of Rack.
CVSS 5.3
CVE-2023-27566 WRITEUP HIGH
Live2d Cubism Editor - Out-of-Bounds Write
Cubism Core in Live2D Cubism Editor 4.2.03 allows out-of-bounds write via a crafted Section Offset Table or Count Info Table in an MOC3 file.
CVSS 7.8
CVE-2023-27582 WRITEUP CRITICAL
Maddy < 0.6.3 - Authentication Bypass
maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.
CVSS 9.1
CVE-2023-27586 WRITEUP CRITICAL
Courtbouillon Cairosvg < 2.7.0 - SSRF
CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to version 2.7.0, Cairo can send requests to external hosts when processing SVG files. A malicious actor could send a specially crafted SVG file that allows them to perform a server-side request forgery or denial of service. Version 2.7.0 disables CairoSVG's ability to access other files online by default.
CVSS 9.9
CVE-2023-27587 WRITEUP HIGH
Readtomyshoe < 2023-03-13 - Error Information Exposure
ReadtoMyShoe, a web app that lets users upload articles and listen to them later, generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, then it will include the full URL of the request. The request URL contains the Google Cloud API key. This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds.
CVSS 7.4
CVE-2023-27748 WRITEUP CRITICAL
Blackvue Dr750-2ch Lte Firmware - Data Authenticity Bypass
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution.
CVSS 9.8
CVE-2023-27747 WRITEUP HIGH
Blackvue Dr750-2ch Lte Firmware - Missing Authentication
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.
CVSS 7.5
CVE-2023-27746 WRITEUP CRITICAL
Blackvue Dr750-2ch Lte Firmware - Brute Force
BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
CVSS 9.8