CVE-2025-32463.zip
1.6 KB
CVE-2025-32463
Author: justjoeyking

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

GitHub Link:
https://github.com/justjoeyking/CVE-2025-32463
CVE-2017-7921.zip
3 KB
CVE-2017-7921
Author: f3d0rq

An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.

GitHub Link:
https://github.com/f3d0rq/CVE-2017-7921
CVE-2021-43798.zip
1.5 KB
CVE-2021-43798
Author: f3d0rq

Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: <grafana_host_url>/public/plugins//, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.

GitHub Link:
https://github.com/f3d0rq/CVE-2021-43798
CVE-2025-32433.zip
2.8 KB
CVE-2025-32433
Author: soltanali0

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

GitHub Link:
https://github.com/soltanali0/CVE-2025-32433-Eploit
CVE-2010-2075.zip
1.3 KB
CVE-2010-2075
Author: earthbendergara

UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3DOLOGSYSTEM macro, which allows remote attackers to execute arbitrary commands.

GitHub Link:
https://github.com/earthbendergara/unrealircd3.2.8.1-local-exploit
CVE-2024-25600.zip
3.4 KB
CVE-2024-25600
Author: ranjithxploit

Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.

GitHub Link:
https://github.com/ranjithxploit/CVE-2024-25600
CVE-2025-2011.zip
4.9 KB
CVE-2025-2011
Author: Ashwesker

The Slider & Popup Builder by Depicter plugin for WordPress is vulnerable to generic SQL Injection via the ‘s' parameter in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

GitHub Link:
https://github.com/Ashwesker/Blackash-CVE-2025-2011
CVE-2024-20666.zip
8.4 KB
CVE-2024-20666
Author: tazxtazxedu

BitLocker Security Feature Bypass Vulnerability

GitHub Link:
https://github.com/tazxtazxedu/WinRE-Fix
CVE-2023-26360.zip
4.9 KB
CVE-2023-26360
Author: RyanRodrigues880

Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.

GitHub Link:
https://github.com/RyanRodrigues880/CVE-2023-26360