CVE-2015-3306.zip
470.8 KB
CVE-2015-3306
Author: canpilayda
The modcopy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
GitHub Link:
https://github.com/canpilayda/proftpd-modcopy-cve-2015-3306
Author: canpilayda
The modcopy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
GitHub Link:
https://github.com/canpilayda/proftpd-modcopy-cve-2015-3306
CVE-2026-22812
Author: barrersoftware
None
GitHub Link:
https://github.com/barrersoftware/opencode-secure
Author: barrersoftware
None
GitHub Link:
https://github.com/barrersoftware/opencode-secure
CVE-2017-14980
Author: pseudo-securite
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
GitHub Link:
https://github.com/pseudo-securite/CVE-2017-14980
Author: pseudo-securite
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
GitHub Link:
https://github.com/pseudo-securite/CVE-2017-14980
CVE-2019-5736.zip
559.6 KB
CVE-2019-5736
Author: sastraadiwiguna-purpleeliteteaming
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
GitHub Link:
https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-
Author: sastraadiwiguna-purpleeliteteaming
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
GitHub Link:
https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-
CVE-2019-2725.zip
4.7 KB
CVE-2019-2725
Author: loursha
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
GitHub Link:
https://github.com/loursha/Oracle-Weblogic-Server-AsyncResponseService-Deserialization-Remote-Code-Execution-CVE-2019-2725
Author: loursha
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
GitHub Link:
https://github.com/loursha/Oracle-Weblogic-Server-AsyncResponseService-Deserialization-Remote-Code-Execution-CVE-2019-2725
CVE-2023-21768
Author: Feede33
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
GitHub Link:
https://github.com/Feede33/Windows-11-Exploit
Author: Feede33
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
GitHub Link:
https://github.com/Feede33/Windows-11-Exploit