An open API service indexing awesome lists of open source software.

https://github.com/codeb0ss/cveploiterv2

The most advanced software for CVE-2024 exploits and WordPress vulnerabilities with the latest version/method.
https://github.com/codeb0ss/cveploiterv2

codeb0ss cve-2024-32399 cve-2024-38759 cve-2024-38761 cve-2024-40348 cve-2024-4295 cve-2024-4577 cve-2024-4836 cve-2024-6164 cve-2024-6313 uncodeboss

Last synced: 5 months ago
JSON representation

The most advanced software for CVE-2024 exploits and WordPress vulnerabilities with the latest version/method.

Awesome Lists containing this project

README

        

# CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]

***[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities
with the latest version/method.]***

1x => CVE-2024-38761 - Wordpress [Zephyr Project Manager] < Unauthenticated Information Exposure.

2x => CVE-2024-38759 - Wordpress [Search & Replace] < Unauthenticated PHP Object Injection.

3x => CVE-2024-6313 - Wordpress [Gutenberg Forms] < Unauthenticated Arbitrary File Upload.

4x => CVE-2024-6164 - Wordpress [Filter & Grids] < Unauthenticated Local File Inclusion.

5x => CVE-2024-40348 - [Bazarr] < Unauthenticated Arbitrary File Read.

6x => CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] < Unauthenticated SQL Injection via Hash.

7x => CVE-2024-4577 - PHP [CGI] < Unauthenticated Command Injection.

8x => CVE-2024-4836 - [Edito CMS] < Unauthenticated Sensitive Data Leak.

9x => CVE-2024-32399 - RaidenMAILD [MailServer] < Unauthenticated Path Traversal.

![Screenshot 2024-07-25 002215](https://github.com/user-attachments/assets/faa40555-d3b9-4e0c-90f0-c4d704b2103d)