CVE-2014-6271
Author: mtaha-sec
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the modcgi and modcgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
GitHub Link:
https://github.com/mtaha-sec/bash-apocalypse
Author: mtaha-sec
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the modcgi and modcgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
GitHub Link:
https://github.com/mtaha-sec/bash-apocalypse
CVE-2025-55182.zip
4.9 KB
CVE-2025-55182
Author: yunaranyancat
None
GitHub Link:
https://github.com/yunaranyancat/CVE-2025-55182-NSE
Author: yunaranyancat
None
GitHub Link:
https://github.com/yunaranyancat/CVE-2025-55182-NSE
❤1
CVE-2025-55182.zip
155.5 KB
CVE-2025-55182
Author: philparzer
None
GitHub Link:
https://github.com/philparzer/nextjs-react2shell-detect
Author: philparzer
None
GitHub Link:
https://github.com/philparzer/nextjs-react2shell-detect
🔥1
CVE-2019-1040.zip
80.6 KB
CVE-2019-1040
Author: JonyFilc
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.
GitHub Link:
https://github.com/JonyFilc/PrintSpoofer-ReflectiveDLL
Author: JonyFilc
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.
GitHub Link:
https://github.com/JonyFilc/PrintSpoofer-ReflectiveDLL