# My CVE

### Order by CVE (MITRE / HACKPUNTES)

1. [CVE-2018-13832](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13832) - [All In One Favicon <= 4.6 - Multiple Stored Authenticated XSS](https://hackpuntes.com/cve-2018-13832-wordpress-plugin-all-in-one-favicon-4-6-autenticado-multiples-cross-site-scripting-persistentes/)
2. [CVE-2018-14430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14430) - [Multi Step Form <= 1.2.5 - Multiple Unauthenticated Reflected XSS](https://hackpuntes.com/cve-2018-14430-wordpress-plugin-multi-step-form-125-multiples-xss-reflejados/)
3. [CVE-2018-15571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15571) - [Export Users to CSV <= 1.1.1 CSV Injection](https://hackpuntes.com/cve-2018-15571-wordpress-plugin-export-users-to-csv-1-1-1-csv-injection/)
4. [CVE-2018-15873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15873) - [Sentrifugo HRMS 3.2 - Blind SQL Injection](https://hackpuntes.com/cve-2018-15873-sentrifugo-hrms-3-2-blind-sql-injection/)
5. [CVE-2018-15917](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15917) - [Jorani Leave Management System 0.6.5 - Cross-Site Scripting Persistente](https://hackpuntes.com/cve-2018-15917-jorani-leave-management-system-0-6-5-cross-site-scripting-persistente/)
6. [CVE-2018-15918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15918) - [Jorani Leave Management System 0.6.5 - SQL Injection](https://hackpuntes.com/cve-2018-15918-jorani-leave-management-system-0-6-5-sql-injection/)
7. [CVE-2018-18478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18478) - [Libre Network Monitoring System 1.43 - Stored Cross-Site Scripting](https://hackpuntes.com/cve-2018-18478-libre-nms-1-43-cross-site-scripting-persistente/)
8. [CVE-2018-18921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18921) - [PHP Server Monitor 3.3.1 - Cross-Site Request Forgery](https://hackpuntes.com/cve-2018-18921-php-server-monitor-3-3-1-cross-site-request-forgery/)
9. [CVE-2018-18922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18922) - [Ticketly 1.0 - Privilege Escalation](https://hackpuntes.com/cve-2018-18922-ticketly-1-0-escalacion-de-privilegios-crear-cuenta-administrador/)
10. [CVE-2018-18923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18923) - [Ticketly 1.0 - Multiple SQL Injection](https://hackpuntes.com/cve-2018-18923-ticketly-1-0-multiples-sql-injections/)
11. [CVE-2018-19828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19828) - [Integria IMS 5.0.83 - Cross-Site Scripting](https://hackpuntes.com/cve-2018-19828-integria-ims-5-0-83-cross-site-scripting-reflejado/)
12. [CVE-2018-19829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19829) - [Integria IMS 5.0.83 – Cross-Site Request Forgery](https://hackpuntes.com/cve-2018-19829-integria-ims-5-0-83-cross-site-request-forgery/)
13. [CVE-2019-7400 ](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7400)  - [Rukovoditel ERP & CRM 2.4.1 - 'path' Cross-Site Scripting](https://hackpuntes.com/cve-2019-7400-rukovoditel-erp-crm-2-4-1-cross-site-scripting-reflejado/)
14. [CVE-2019-15092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15092) - [WordPress Plugin Import Export WordPress Users 1.3.1 - CSV Injection](https://hackpuntes.com/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection/)
15. [CVE-2019-19031](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19031) - [Easy XML Editor <= 1.7.8 - XML External Entity Injection](https://hackpuntes.com/cve-2019-19031-easy-xml-editor-1-7-8-inyeccion-xml/)
16. [CVE-2019-19032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19032) - [XMLBlueprint <= 16.191112 - XML External Entity Injection](https://hackpuntes.com/cve-2019-19032-xmlblueprint-16-191112-inyeccion-xml/)

|                                CVE                                |                             CWE                            |     CVSS3    |    CVSS2   |                    Exploit-DB                   |
| :---------------------------------------------------------------: | :--------------------------------------------------------: | :----------: | :--------: | :---------------------------------------------: |
| [CVE-2018-13832](https://nvd.nist.gov/vuln/detail/CVE-2018-13832) |  [CWE-79 ](https://cwe.mitre.org/data/definitions/79.html) |  4.8 MEDIUM  |   3.5 LOW  | [✔️](https://www.exploit-db.com/exploits/45056) |
| [CVE-2018-14430](https://nvd.nist.gov/vuln/detail/CVE-2018-14430) |  [CWE-79 ](https://cwe.mitre.org/data/definitions/79.html) |  6.1 MEDIUM  | 4.3 MEDIUM |   [❌](https://www.exploit-db.com/?author=9580)  |
| [CVE-2018-15571](https://nvd.nist.gov/vuln/detail/CVE-2018-15571) |  [CWE-74 ](https://cwe.mitre.org/data/definitions/74.html) |   8.6 HIGH   | 6.8 MEDIUM | [✔️](https://www.exploit-db.com/exploits/45206) |
| [CVE-2018-15873](https://nvd.nist.gov/vuln/detail/CVE-2018-15873) |  [CWE-89 ](https://cwe.mitre.org/data/definitions/89.html) | 9.8 CRITICAL |  7.5 HIGH  | [✔️](https://www.exploit-db.com/exploits/45266) |
| [CVE-2018-15917](https://nvd.nist.gov/vuln/detail/CVE-2018-15917) |  [CWE-79 ](https://cwe.mitre.org/data/definitions/79.html) |  5.4 MEDIUM  |   3.5 LOW  | [✔️](https://www.exploit-db.com/exploits/45338) |
| [CVE-2018-15918](https://nvd.nist.gov/vuln/detail/CVE-2018-15918) |  [CWE-89 ](https://cwe.mitre.org/data/definitions/89.html) |  5.4 MEDIUM  | 5.5 MEDIUM | [✔️](https://www.exploit-db.com/exploits/45340) |
| [CVE-2018-18478](https://nvd.nist.gov/vuln/detail/CVE-2018-18478) |  [CWE-79 ](https://cwe.mitre.org/data/definitions/79.html) |  6.1 MEDIUM  | 4.3 MEDIUM |   [❌](https://www.exploit-db.com/?author=9580)  |
| [CVE-2018-18921](https://nvd.nist.gov/vuln/detail/CVE-2018-18921) | [CWE-352](https://cwe.mitre.org/data/definitions/352.html) |  6.5 MEDIUM  | 5.8 MEDIUM | [✔️](https://www.exploit-db.com/exploits/45932) |
| [CVE-2018-18922](https://nvd.nist.gov/vuln/detail/CVE-2018-18922) | [CWE-425](https://cwe.mitre.org/data/definitions/425.html) | 9.8 CRITICAL | 5.0 MEDIUM | [✔️](https://www.exploit-db.com/exploits/45892) |
| [CVE-2018-18923](https://nvd.nist.gov/vuln/detail/CVE-2018-18923) |  [CWE-89 ](https://cwe.mitre.org/data/definitions/89.html) | 9.8 CRITICAL |  7.5 HIGH  | [✔️](https://www.exploit-db.com/exploits/45895) |
| [CVE-2018-19828](https://nvd.nist.gov/vuln/detail/CVE-2018-19828) |  [CWE-79 ](https://cwe.mitre.org/data/definitions/79.html) |  6.1 MEDIUM  | 4.3 MEDIUM | [✔️](https://www.exploit-db.com/exploits/46012) |
| [CVE-2018-19829](https://nvd.nist.gov/vuln/detail/CVE-2018-19829) | [CWE-352](https://cwe.mitre.org/data/definitions/352.html) |  6.5 MEDIUM  | 5.8 MEDIUM | [✔️](https://www.exploit-db.com/exploits/46013) |
|  [CVE-2019-7400 ](https://nvd.nist.gov/vuln/detail/CVE-2019-7400) |  [CWE-79 ](https://cwe.mitre.org/data/definitions/79.html) |  6.1 MEDIUM  | 4.3 MEDIUM | [✔️](https://www.exploit-db.com/exploits/46608) |
| [CVE-2019-15092](https://nvd.nist.gov/vuln/detail/CVE-2019-15092) |  [CWE-74 ](https://cwe.mitre.org/data/definitions/74.html) |   7.3 HIGH   | 6.0 MEDIUM | [✔️](https://www.exploit-db.com/exploits/47303) |
| [CVE-2019-19031](https://nvd.nist.gov/vuln/detail/CVE-2019-19031) |  [CWE-91 ](https://cwe.mitre.org/data/definitions/91.html) |   8.1 HIGH   | 5.5 MEDIUM | [✔️](https://www.exploit-db.com/exploits/47945) |
| [CVE-2019-19032](https://nvd.nist.gov/vuln/detail/CVE-2019-19032) |  [CWE-91 ](https://cwe.mitre.org/data/definitions/91.html) |   8.1 HIGH   | 5.5 MEDIUM | [✔️](https://www.exploit-db.com/exploits/47974) |
|                                                                   |                                                            |              |            |                                                 |
