Writeup Exploits

59,964 exploits tracked across all sources.

Sort: Activity Stars
CVE-2024-36612 WRITEUP HIGH
Zulip <8.4 - Memory Corruption
Zulip from 8.0 to 8.3 contains a memory leak vulnerability in the handling of popovers.
CVSS 7.5
CVE-2024-36613 WRITEUP MEDIUM
FFmpeg n6.1.1 - DoS
FFmpeg n6.1.1 has a vulnerability in the DXA demuxer of the libavformat library allowing for an integer overflow, potentially resulting in a denial-of-service (DoS) condition or other undefined behavior.
CVSS 6.2
CVE-2024-36615 WRITEUP MEDIUM
FFmpeg n7.0 - Data Race
FFmpeg n7.0 has a race condition vulnerability in the VP9 decoder. This could lead to a data race if video encoding parameters were being exported, as the side data would be attached in the decoder thread while being read in the output thread.
CVSS 5.9
CVE-2024-36616 WRITEUP MEDIUM
FFmpeg n6.1.1 - DoS
An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file.
CVSS 6.5
CVE-2024-36617 WRITEUP MEDIUM
FFmpeg n6.1.1 - Buffer Overflow
FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder.
CVSS 6.2
CVE-2024-36618 WRITEUP MEDIUM
FFmpeg n6.1.1 - Memory Corruption
FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition.
CVSS 6.2
CVE-2024-36619 WRITEUP MEDIUM
FFmpeg n6.1.1 - DoS
FFmpeg n6.1.1 has a vulnerability in the WAVARC decoder of the libavcodec library which allows for an integer overflow when handling certain block types, leading to a denial-of-service (DoS) condition.
CVSS 5.3
CVE-2024-36620 WRITEUP MEDIUM
moby <26.0.2 - Null Pointer Dereference
moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go.
CVSS 6.5
CVE-2024-36621 WRITEUP MEDIUM
moby <25.0.5 - Use After Free
moby v25.0.5 is affected by a Race Condition in builder/builder-next/adapters/snapshot/layer.go. The vulnerability could be used to trigger concurrent builds that call the EnsureLayer function resulting in resource leaks/exhaustion.
CVSS 6.5
CVE-2024-36622 WRITEUP CRITICAL
RaspAP raspap-webgui <3.0.9 - Command Injection
In RaspAP raspap-webgui 3.0.9 and earlier, a command injection vulnerability exists in the clearlog.php script. The vulnerability is due to improper sanitization of user input passed via the logfile parameter.
CVSS 9.8
CVE-2024-36623 WRITEUP HIGH
moby <v25.0.3 - Memory Corruption
moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
CVSS 8.1
CVE-2024-36623 WRITEUP HIGH
moby <v25.0.3 - Memory Corruption
moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
CVSS 8.1
CVE-2024-36624 WRITEUP MEDIUM
Zulip 8.3 - XSS
Zulip 8.3 is vulnerable to Cross Site Scripting (XSS) via the construct_copy_div function in copy_and_paste.js.
CVSS 5.4
CVE-2024-36625 WRITEUP MEDIUM
Zulip 8.3 - XSS
Zulip 8.3 is vulnerable to Cross Site Scripting (XSS) via the replace_emoji_with_text function in ui_util.ts.
CVSS 5.4
CVE-2024-36626 WRITEUP MEDIUM
Prestashop 8.1.4 - Memory Corruption
In prestashop 8.1.4, a NULL pointer dereference was identified in the math_round function within Tools.php.
CVSS 5.3
CVE-2024-36814 WRITEUP MEDIUM
Adguard Home <0.107.52 - Info Disclosure
An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory.
CVSS 4.9
CVE-2024-36842 WRITEUP HIGH
Oncord+ Android Infotainment Systems OS <Android 12 - RCE
An issue in Oncord+ Android Infotainment Systems OS Android 12, Model Hardware TS17,Hardware part Number F57L_V3.2_20220301, and Build Number PlatformVER:K24-2023/05/09-v0.01 allows a remote attacker to execute arbitrary code via the ADB port component.
CVSS 7.3
CVE-2024-3656 WRITEUP HIGH
Org.keycloak Keycloak-services < 24.0.5 - Information Disclosure
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
CVSS 8.1
CVE-2024-3656 WRITEUP HIGH
Org.keycloak Keycloak-services < 24.0.5 - Information Disclosure
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
CVSS 8.1
CVE-2024-3690 WRITEUP MEDIUM
Phpgurukul Small Crm - SQL Injection
A vulnerability classified as critical was found in PHPGurukul Small CRM 3.0. Affected by this vulnerability is an unknown functionality of the component Change Password Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260479.
CVSS 6.3
CVE-2024-37151 WRITEUP MEDIUM
Oisf Suricata < 6.0.20 - Improper Condition Check
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Mishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem.
CVSS 5.3
CVE-2024-37155 WRITEUP MEDIUM
Citeum Opencti < 6.1.9 - Improper Access Control
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. Prior to version 6.1.9, the regex validation used to prevent Introspection queries can be bypassed by removing the extra whitespace, carriage return, and line feed characters from the query. GraphQL Queries in OpenCTI can be validated using the `secureIntrospectionPlugin`. The regex check in the plkugin can be bypassed by removing the carriage return and line feed characters (`\r\n`). Running a curl command against a local instance of OpenCTI will result in a limited error message. By running the same Introspection query without the `\r\n` characters, the unauthenticated user is able to successfully run a full Introspection query. Bypassing this restriction allows the attacker to gather a wealth of information about the GraphQL endpoint functionality that can be used to perform actions and/or read data without authorization. These queries can also be weaponized to conduct a Denial of Service (DoS) attack if sent repeatedly. Users should upgrade to version 6.1.9 to receive a patch for the issue.
CVSS 6.5
CVE-2024-37157 WRITEUP MEDIUM
Discourse < 3.2.3 - SSRF
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches, a malicious actor could get the FastImage library to redirect requests to an internal Discourse IP. This issue is patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches. No known workarounds are available.
CVSS 6.4
CVE-2024-37160 WRITEUP MEDIUM
Formwork < 1.13.1 - XSS
Formwork is a flat file-based Content Management System (CMS). An attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard). This vulnerability is fixed in 1.13.1.
CVSS 4.8
CVE-2024-37165 WRITEUP MEDIUM
Discourse < 3.2.3 - XSS
Discourse is an open source discussion platform. Prior to 3.2.3 and 3.3.0.beta3, improperly sanitized Onebox data could lead to an XSS vulnerability in some situations. This vulnerability only affects Discourse instances which have disabled the default Content Security Policy. This vulnerability is fixed in 3.2.3 and 3.3.0.beta3.
CVSS 6.3