CVE-2023-30253
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
Github link:
https://github.com/andria-dev/DolibabyPhp
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
Github link:
https://github.com/andria-dev/DolibabyPhp
GitHub
GitHub - andria-dev/DolibabyPhp: An authenticated RCE exploit for Dolibarr ERP/CRM CVE-2023-30253.
An authenticated RCE exploit for Dolibarr ERP/CRM CVE-2023-30253. - andria-dev/DolibabyPhp
CVE-2024-23692
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
Github link:
https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692-
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
Github link:
https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692-
GitHub
GitHub - pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692-: Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module…
Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692) - pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692-
CVE-2024-36991
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Github link:
https://github.com/Cappricio-Securities/CVE-2024-36991
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Github link:
https://github.com/Cappricio-Securities/CVE-2024-36991
GitHub
GitHub - Cappricio-Securities/CVE-2024-36991: Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2…
Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10 that allows reading sensitive files. - Cappricio-Securities/CVE-2024-36991
CVE-2024-37032
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Github link:
https://github.com/ahboon/CVE-2024-37032-scanner
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Github link:
https://github.com/ahboon/CVE-2024-37032-scanner
GitHub
GitHub - ahboon/CVE-2024-37032-scanner: CVE-2024-37032 scanner
CVE-2024-37032 scanner. Contribute to ahboon/CVE-2024-37032-scanner development by creating an account on GitHub.
CVE-2023-4220
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/HO4XXX/cve-2023-4220-poc
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/HO4XXX/cve-2023-4220-poc
GitHub
GitHub - HO4XXX/cve-2023-4220-poc: PoC for CVE-2023-4220 - Chamilo LMS - Unauthenticated File Upload in BigUpload
PoC for CVE-2023-4220 - Chamilo LMS - Unauthenticated File Upload in BigUpload - HO4XXX/cve-2023-4220-poc
CVE-2019-6447
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
Github link:
https://github.com/Cmadhushanka/CVE-2019-6447-Exploitation
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
Github link:
https://github.com/Cmadhushanka/CVE-2019-6447-Exploitation
GitHub
GitHub - Cmadhushanka/CVE-2019-6447-Exploitation: year 2 semester 1 Systems and Network Programming Assignment
year 2 semester 1 Systems and Network Programming Assignment - Cmadhushanka/CVE-2019-6447-Exploitation
CVE-2015-3864
Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.
Github link:
https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation
Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.
Github link:
https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation
GitHub
GitHub - Cmadhushanka/CVE-2015-3864-Exploitation: year 2 semester 1 Systems and Network Programming Assignment
year 2 semester 1 Systems and Network Programming Assignment - Cmadhushanka/CVE-2015-3864-Exploitation
CVE-2023-32784
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
Github link:
https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
Github link:
https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation
GitHub
GitHub - Cmadhushanka/CVE-2023-32784-Exploitation: year 2 semester 1 Systems and Network Programming Assignment
year 2 semester 1 Systems and Network Programming Assignment - Cmadhushanka/CVE-2023-32784-Exploitation
CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/Ex-Arn/CVE-2024-34102-RCE
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/Ex-Arn/CVE-2024-34102-RCE
CVE-2024-4577
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Github link:
https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Github link:
https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK
GitHub
GitHub - bibo318/CVE-2024-4577-RCE-ATTACK: ATTACK PoC - PHP CVE-2024-4577
ATTACK PoC - PHP CVE-2024-4577 . Contribute to bibo318/CVE-2024-4577-RCE-ATTACK development by creating an account on GitHub.
CVE-2000-0114
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
Github link:
https://github.com/Josekutty-K/frontpage-server-extensions-vulnerability-scanner
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
Github link:
https://github.com/Josekutty-K/frontpage-server-extensions-vulnerability-scanner
GitHub
GitHub - Josekutty-K/frontpage-server-extensions-vulnerability-scanner: Python script to scan for CVE-2000-0114 vulnerability in…
Python script to scan for CVE-2000-0114 vulnerability in Frontpage Server Extensions. Automates subdomain enumeration and vulnerability scanning using subfinder and nuclei. For educational and prof...
CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/crynomore/CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/crynomore/CVE-2024-34102
GitHub
GitHub - crynomore/CVE-2024-34102: Burp Extension to test for CVE-2024-34102
Burp Extension to test for CVE-2024-34102. Contribute to crynomore/CVE-2024-34102 development by creating an account on GitHub.
CVE-2020-25540
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
Github link:
https://github.com/simonlee-hello/CVE-2020-25540
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
Github link:
https://github.com/simonlee-hello/CVE-2020-25540
GitHub
GitHub - simonlee-hello/CVE-2020-25540: ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破
ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破. Contribute to simonlee-hello/CVE-2020-25540 development by creating an account on GitHub.
CVE-2024-0044
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Github link:
https://github.com/007CRIPTOGRAFIA/C-CVE-2024-0044
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Github link:
https://github.com/007CRIPTOGRAFIA/C-CVE-2024-0044
GitHub
GitHub - 007CRIPTOGRAFIA/c-CVE-2024-0044: CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer…
CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer aplicativo" que afeta as versões 12 e 13 do Android - 007CRIPTOGRAFIA/c-CVE-2024-0044
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/Sibijo/mitigate_ssh
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/Sibijo/mitigate_ssh
GitHub
GitHub - Sibijo/mitigate_ssh: OpenSSH vulnerability CVE-2024-6387
OpenSSH vulnerability CVE-2024-6387. Contribute to Sibijo/mitigate_ssh development by creating an account on GitHub.
CVE-2017-11882
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
Github link:
https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
Github link:
https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis
GitHub
GitHub - jadeapar/Dragonfish-s-Malware-Cyber-Analysis: Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically…
Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically, exploring the exploitation of vulnerability CVE-2017-11882. - GitHub - jadeapar/Dragonfish-s-Malware-Cyb...
CVE-2017-5638
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Github link:
https://github.com/Nithylesh/web-application-firewall-
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Github link:
https://github.com/Nithylesh/web-application-firewall-
GitHub
GitHub - Nithylesh/web-application-firewall-: This project demonstrates a Web Application Firewall (WAF) simulation using Flask…
This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns...
CVE-2006-5051
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Github link:
https://github.com/ThemeHackers/CVE-2024-6387
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Github link:
https://github.com/ThemeHackers/CVE-2024-6387
GitHub
GitHub - ThemeHackers/CVE-2024-6387: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)
Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) - ThemeHackers/CVE-2024-6387