CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/crynomore/CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/crynomore/CVE-2024-34102
GitHub
GitHub - crynomore/CVE-2024-34102: Burp Extension to test for CVE-2024-34102
Burp Extension to test for CVE-2024-34102. Contribute to crynomore/CVE-2024-34102 development by creating an account on GitHub.
CVE-2020-25540
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
Github link:
https://github.com/simonlee-hello/CVE-2020-25540
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
Github link:
https://github.com/simonlee-hello/CVE-2020-25540
GitHub
GitHub - simonlee-hello/CVE-2020-25540: ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破
ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破. Contribute to simonlee-hello/CVE-2020-25540 development by creating an account on GitHub.
CVE-2024-0044
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Github link:
https://github.com/007CRIPTOGRAFIA/C-CVE-2024-0044
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Github link:
https://github.com/007CRIPTOGRAFIA/C-CVE-2024-0044
GitHub
GitHub - 007CRIPTOGRAFIA/c-CVE-2024-0044: CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer…
CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer aplicativo" que afeta as versões 12 e 13 do Android - 007CRIPTOGRAFIA/c-CVE-2024-0044
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/Sibijo/mitigate_ssh
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/Sibijo/mitigate_ssh
GitHub
GitHub - Sibijo/mitigate_ssh: OpenSSH vulnerability CVE-2024-6387
OpenSSH vulnerability CVE-2024-6387. Contribute to Sibijo/mitigate_ssh development by creating an account on GitHub.
CVE-2017-11882
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
Github link:
https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
Github link:
https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis
GitHub
GitHub - jadeapar/Dragonfish-s-Malware-Cyber-Analysis: Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically…
Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically, exploring the exploitation of vulnerability CVE-2017-11882. - GitHub - jadeapar/Dragonfish-s-Malware-Cyb...
CVE-2017-5638
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Github link:
https://github.com/Nithylesh/web-application-firewall-
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Github link:
https://github.com/Nithylesh/web-application-firewall-
GitHub
GitHub - Nithylesh/web-application-firewall-: This project demonstrates a Web Application Firewall (WAF) simulation using Flask…
This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns...
CVE-2006-5051
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Github link:
https://github.com/ThemeHackers/CVE-2024-6387
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Github link:
https://github.com/ThemeHackers/CVE-2024-6387
GitHub
GitHub - ThemeHackers/CVE-2024-6387: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)
Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) - ThemeHackers/CVE-2024-6387
CVE-2024-27956
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
Github link:
https://github.com/ThatNotEasy/CVE-2024-27956
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
Github link:
https://github.com/ThatNotEasy/CVE-2024-27956
GitHub
GitHub - ThatNotEasy/CVE-2024-27956: Perform with massive Wordpress SQLI 2 RCE
Perform with massive Wordpress SQLI 2 RCE. Contribute to ThatNotEasy/CVE-2024-27956 development by creating an account on GitHub.
CVE-2023-4220
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/nr4x4/CVE-2023-4220
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
Github link:
https://github.com/nr4x4/CVE-2023-4220
GitHub
GitHub - nr4x4/CVE-2023-4220: CVE-2023–4220 Exploit
CVE-2023–4220 Exploit. Contribute to nr4x4/CVE-2023-4220 development by creating an account on GitHub.
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/Passyed/regreSSHion-Fix
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/Passyed/regreSSHion-Fix
GitHub
GitHub - Passyed/regreSSHion-Fix: Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian
Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian - Passyed/regreSSHion-Fix
CVE-2000-0114
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
Github link:
https://github.com/0xMe5war/CVE-2000-0114
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
Github link:
https://github.com/0xMe5war/CVE-2000-0114
GitHub
GitHub - adhamelhansye/CVE-2000-0114: This a CVE I found it in VDP at hackerone Platform
This a CVE I found it in VDP at hackerone Platform - adhamelhansye/CVE-2000-0114
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/k4t3pr0/CVE-2024-6387-Check
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/k4t3pr0/CVE-2024-6387-Check
GitHub
GitHub - k4t3pr0/CVE-2024-6387-Check: Lỗ hổng thực thi mã không được xác thực từ xa trong máy chủ OpenSSH
Lỗ hổng thực thi mã không được xác thực từ xa trong máy chủ OpenSSH - k4t3pr0/CVE-2024-6387-Check
CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/1mpl3ment3d/CVE-2024-34102-RCE-POC
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/1mpl3ment3d/CVE-2024-34102-RCE-POC
CVE-2024-4879
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
Github link:
https://github.com/bigb0x/CVE-2024-4879
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
Github link:
https://github.com/bigb0x/CVE-2024-4879
GitHub
GitHub - bigb0x/CVE-2024-4879: Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability - bigb0x/CVE-2024-4879
CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/bughuntar/CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/bughuntar/CVE-2024-34102
GitHub
GitHub - bughuntar/CVE-2024-34102: Exploitation CVE-2024-34102
Exploitation CVE-2024-34102. Contribute to bughuntar/CVE-2024-34102 development by creating an account on GitHub.
CVE-2023-34960
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
Github link:
https://github.com/dvtarsoul/ChExp
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
Github link:
https://github.com/dvtarsoul/ChExp
GitHub
GitHub - dvtarsoul/ChExp: Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960
Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960 - dvtarsoul/ChExp