00:08.6 CVE-2024-25927 cvss:9.3 (CRITICAL) (SQL injection, Improper Neutralization) https://www.cve.org/CVERecord?id=CVE-2024-25927
00:09.8 CVE-2024-25910 cvss:9.8 (CRITICAL) (SQL injection, Improper Neutralization) https://www.cve.org/CVERecord?id=CVE-2024-25910
00:10.7 CVE-2024-25902 cvss:7.6 (HIGH) (SQL injection, Improper Neutralization) https://www.cve.org/CVERecord?id=CVE-2024-25902
00:11.7 CVE-2024-24868 cvss:8.5 (HIGH) (SQL injection, Improper Neutralization) https://www.cve.org/CVERecord?id=CVE-2024-24868
00:12.6 CVE-2024-21886 cvss:0 (Not_rated) (Remote code execution, Buffer Overflow) https://www.cve.org/CVERecord?id=CVE-2024-21886
00:13.6 CVE-2024-21885 cvss:0 (Not_rated) (Remote code execution, Buffer Overflow) https://www.cve.org/CVERecord?id=CVE-2024-21885
00:14.6 CVE-2024-27913 cvss:0 (Not_rated) (Remote Attack, Denial of service) https://www.cve.org/CVERecord?id=CVE-2024-27913
00:15.6 CVE-2024-1388 cvss:4.3 (MEDIUM) (WordPress) https://www.cve.org/CVERecord?id=CVE-2024-1388
00:16.6 CVE-2023-50736 cvss:9 (CRITICAL) (Execute arbitrary code, Memory corruption) https://www.cve.org/CVERecord?id=CVE-2023-50736
00:17.5 CVE-2023-50735 cvss:9 (CRITICAL) (Execute arbitrary code, Heap corruption) https://www.cve.org/CVERecord?id=CVE-2023-50735
00:18.5 CVE-2023-50734 cvss:9 (CRITICAL) (Execute arbitrary code, Buffer Overflow) https://www.cve.org/CVERecord?id=CVE-2023-50734
00:19.5 CVE-2024-26298 cvss:7.2 (HIGH) (Arbitrary Command, Execute arbitrary command) https://www.cve.org/CVERecord?id=CVE-2024-26298
00:20.5 CVE-2024-26297 cvss:7.2 (HIGH) (Arbitrary Command, Execute arbitrary command) https://www.cve.org/CVERecord?id=CVE-2024-26297
00:21.4 CVE-2024-26296 cvss:7.2 (HIGH) (Arbitrary Command, Execute arbitrary command) https://www.cve.org/CVERecord?id=CVE-2024-26296
00:22.3 CVE-2024-26295 cvss:7.2 (HIGH) (Arbitrary Command, Execute arbitrary command) https://www.cve.org/CVERecord?id=CVE-2024-26295
00:23.2 CVE-2024-26294 cvss:7.2 (HIGH) (Arbitrary Command, Execute arbitrary command) https://www.cve.org/CVERecord?id=CVE-2024-26294
00:24.1 CVE-2024-27099 cvss:9.8 (CRITICAL) (Azure) https://www.cve.org/CVERecord?id=CVE-2024-27099
00:25.1 CVE-2024-24323 cvss:0 (Not_rated) (Remote Attack, SQL injection, obtain sensitive information) https://www.cve.org/CVERecord?id=CVE-2024-24323
00:26.0 CVE-2024-1925 cvss:5 (MEDIUM) (PHP, Unrestricted Upload, Critical) https://www.cve.org/CVERecord?id=CVE-2024-1925
00:26.9 CVE-2024-1924 cvss:6.3 (MEDIUM) (PHP, SQL injection, Critical) https://www.cve.org/CVERecord?id=CVE-2024-1924
00:27.9 CVE-2023-50380 cvss:0 (Not_rated) (XXE, XML external entity, Input validation, Privilege Escalation) https://www.cve.org/CVERecord?id=CVE-2023-50380
00:28.9 CVE-2024-25400 cvss:0 (Not_rated) (MySQL, PHP, SQL injection) https://www.cve.org/CVERecord?id=CVE-2024-25400
00:29.9 CVE-2024-27905 cvss:0 (Not_rated) (Remote code execution, Exposure of Sensitive) https://www.cve.org/CVERecord?id=CVE-2024-27905
00:30.8 CVE-2024-1921 cvss:4.7 (MEDIUM) (PHP, Unrestricted Upload, Critical) https://www.cve.org/CVERecord?id=CVE-2024-1921
00:31.8 CVE-2024-1920 cvss:5.6 (MEDIUM) (PHP, Critical) https://www.cve.org/CVERecord?id=CVE-2024-1920
Proof of Concept
1 44:49.5 CVE-2024-1346 https://github.com/PeterGabaldon/CVE-2024-1346
2 44:49.5 CVE-2023-38041 https://github.com/ewilded/CVE-2023-38041-POC
3 44:49.5 CVE-2020-3452 https://github.com/imhunterand/CVE-2020-3452
4 44:49.5 CVE-2020-10189 https://github.com/BLACKpwn/Remote_Code_Execution-
5 44:49.5 CVE-2023-22515 https://github.com/rxerium/CVE-2023-22515
6 44:49.5 CVE-2024-1709 https://github.com/HussainFathy/CVE-2024-1709
7 44:49.5 CVE-2020-36730 https://github.com/RandomRobbieBF/CVE-2020-36730
8 44:49.5 CVE-2024-21413 https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
9 44:49.5 CVE-2024-1651 https://github.com/sharpicx/CVE-2024-1651-PoC
10 44:49.5 CVE-2024-22243 https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234
11 02:02.3 CVE-2024-23897 https://github.com/Abo5/CVE-2024-23897
12 02:02.3 CVE-2023-22527 https://github.com/M0untainShley/CVE-2023-22527-MEMSHELL
13 02:02.1 CVE-2024-26560 https://github.com/sajaljat/CVE-2024-26560
14 02:02.1 CVE-2024-26535 https://github.com/sajaljat/CVE-2024-26535
15 02:02.1 CVE-2023-52160 https://github.com/Helica-core/eap_pwn
16 01:02.1 CVE-2023-41892 https://github.com/acesoyeo/CVE-2023-41892
17 02:03.0 CVE-2022-30525 https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit
18 02:02.5 CVE-2024-1071 https://github.com/gbrsh/CVE-2024-1071
19 02:02.5 CVE-2023-6654 https://github.com/qfmy1024/CVE-2023-6654
20 02:02.3 CVE-2024-0197 https://github.com/ewilded/CVE-2024-0197-POC
21 02:02.3 CVE-2023-7016 https://github.com/ewilded/CVE-2023-7016-POC
22 02:02.3 CVE-2017-2903 https://github.com/SpiralBL0CK/dpx_work_CVE-2017-2903
23 02:02.2 CVE-2024-23334 https://github.com/ox1111/CVE-2024-23334
24 02:02.2 CVE-2023-40000 https://github.com/rxerium/CVE-2023-40000
25 02:02.2 CVE-2024-21762 https://github.com/c0d3b3af/CVE-2024-21762-POC
26 02:02.4 CVE-2023-50386 https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC
27 02:02.7 CVE-2023-2640 https://github.com/SanjayRagavendar/UbuntuPrivilegeEscalationV1
