CVE-2024-6387.zip
3.9 MB
CVE-2024-6387
Author: arielrbrdev
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
GitHub Link:
https://github.com/arielrbrdev/redteamlab1
Author: arielrbrdev
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
GitHub Link:
https://github.com/arielrbrdev/redteamlab1
CVE-2024-32019.zip
2.6 KB
CVE-2024-32019
Author: julichaan
Netdata is an open source observability tool. In affected versions the
GitHub Link:
https://github.com/julichaan/CVE-2024-32019-ndsudo-local-privilege-escalation-NetData
Author: julichaan
Netdata is an open source observability tool. In affected versions the
ndsudo tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The ndsudo tool is packaged as a root-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the PATH environment variable. This allows an attacker to control where ndsudo looks for these commands, which may be a path the attacker has write access to. This may lead to local privilege escalation. This vulnerability has been addressed in versions 1.45.3 and 1.45.2-169. Users are advised to upgrade. There are no known workarounds for this vulnerability.GitHub Link:
https://github.com/julichaan/CVE-2024-32019-ndsudo-local-privilege-escalation-NetData
CVE-2021-41773.zip
2.7 KB
CVE-2021-41773
Author: faizdotid
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
GitHub Link:
https://github.com/faizdotid/CVE-2021-41773
Author: faizdotid
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
GitHub Link:
https://github.com/faizdotid/CVE-2021-41773
CVE-2025-29306.zip
4.5 KB
CVE-2025-29306
Author: B1ack4sh
An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component.
GitHub Link:
https://github.com/B1ack4sh/Blackash-CVE-2025-29306
Author: B1ack4sh
An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component.
GitHub Link:
https://github.com/B1ack4sh/Blackash-CVE-2025-29306
CVE-2021-21980.zip
5.9 KB
CVE-2021-21980
Author: gui2000guix-ui
The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
GitHub Link:
https://github.com/gui2000guix-ui/cve-2021-21980-mock-server
Author: gui2000guix-ui
The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
GitHub Link:
https://github.com/gui2000guix-ui/cve-2021-21980-mock-server
CVE-2021-21980.zip
1.1 KB
CVE-2021-21980
Author: pkxk5pr6m2-web
The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
GitHub Link:
https://github.com/pkxk5pr6m2-web/cve-2021-21980-nuclei-poc
Author: pkxk5pr6m2-web
The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
GitHub Link:
https://github.com/pkxk5pr6m2-web/cve-2021-21980-nuclei-poc
CVE-2023-42793.zip
3.7 KB
CVE-2023-42793
Author: cxdxnt
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
GitHub Link:
https://github.com/cxdxnt/CVE-2023-42793
Author: cxdxnt
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
GitHub Link:
https://github.com/cxdxnt/CVE-2023-42793