CVE-2011-2523
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Github link:
https://github.com/Fatalitysec/vsftpd_2.3.4_Backdoor
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Github link:
https://github.com/Fatalitysec/vsftpd_2.3.4_Backdoor
CVE-2015-6668
The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary CV files via a brute force attack to the WordPress upload directory structure, related to an insecure direct object reference.
Github link:
https://github.com/jimdiroffii/CVE-2015-6668
The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary CV files via a brute force attack to the WordPress upload directory structure, related to an insecure direct object reference.
Github link:
https://github.com/jimdiroffii/CVE-2015-6668
GitHub
GitHub - jimdiroffii/CVE-2015-6668: Evangelos Mourikis POC for CVE-2015-6668 converted for Python 3
Evangelos Mourikis POC for CVE-2015-6668 converted for Python 3 - jimdiroffii/CVE-2015-6668
CVE-2021-42013
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
Github link:
https://github.com/rafifdna/CVE-2021-42013
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
Github link:
https://github.com/rafifdna/CVE-2021-42013
GitHub
GitHub - rafifdna/CVE-2021-42013: CVE-2021-42013, a critical vulnerability in the Apache HTTP Server (2.4.50)
CVE-2021-42013, a critical vulnerability in the Apache HTTP Server (2.4.50) - rafifdna/CVE-2021-42013
CVE-2024-34102
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/ex-arny/CVE-2024-34102-RCE
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
Github link:
https://github.com/ex-arny/CVE-2024-34102-RCE
CVE-2024-28995
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Github link:
https://github.com/Praison001/CVE-2024-28995-SolarWinds-Serv-U
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Github link:
https://github.com/Praison001/CVE-2024-28995-SolarWinds-Serv-U
GitHub
GitHub - Praison001/CVE-2024-28995-SolarWinds-Serv-U: Exploit for CVE-2024-28995 affecting SolarWinds Serv-U 15.4.2 HF 1 and previous…
Exploit for CVE-2024-28995 affecting SolarWinds Serv-U 15.4.2 HF 1 and previous versions - Praison001/CVE-2024-28995-SolarWinds-Serv-U
CVE-2024-37032
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Github link:
https://github.com/Bi0x/CVE-2024-37032
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Github link:
https://github.com/Bi0x/CVE-2024-37032
GitHub
GitHub - Bi0x/CVE-2024-37032: Path traversal in Ollama with rogue registry server
Path traversal in Ollama with rogue registry server - Bi0x/CVE-2024-37032
CVE-2024-33883
The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certain pollution protection.
Github link:
https://github.com/Grantzile/PoC-CVE-2024-33883
The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certain pollution protection.
Github link:
https://github.com/Grantzile/PoC-CVE-2024-33883
GitHub
GitHub - Grantzile/PoC-CVE-2024-33883: PoC of CVE-2024-33883, RCE vulnerability of ejs.
PoC of CVE-2024-33883, RCE vulnerability of ejs. Contribute to Grantzile/PoC-CVE-2024-33883 development by creating an account on GitHub.
CVE-2024-33111
D-Link DIR-845L router <=v1.01KRb03 is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php.
Github link:
https://github.com/FaLLenSKiLL1/CVE-2024-33111
D-Link DIR-845L router <=v1.01KRb03 is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php.
Github link:
https://github.com/FaLLenSKiLL1/CVE-2024-33111
GitHub
GitHub - FaLLenSKiLL1/CVE-2024-33111: D-Link DIR-845L router is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js…
D-Link DIR-845L router is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php. - FaLLenSKiLL1/CVE-2024-33111
CVE-2024-33113
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
Github link:
https://github.com/tekua/CVE-2024-33113
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
Github link:
https://github.com/tekua/CVE-2024-33113
GitHub
GitHub - tekua/CVE-2024-33113: Le routeur D-LINK DIR-845L est vulnérable à un problème de divulgation d'informations. Plus précisément…
Le routeur D-LINK DIR-845L est vulnérable à un problème de divulgation d'informations. Plus précisément, le fichier bsc_sms_inbox.php sur l'appareil peut être exploité pour divulgue...
CVE-2024-6028
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Github link:
https://github.com/truonghuuphuc/CVE-2024-6028-Poc
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Github link:
https://github.com/truonghuuphuc/CVE-2024-6028-Poc
GitHub
GitHub - truonghuuphuc/CVE-2024-6028-Poc: CVE-2024-6028 Quiz Maker <= 6.5.8.3 - Unauthenticated SQL Injection via 'ays_questions'…
CVE-2024-6028 Quiz Maker <= 6.5.8.3 - Unauthenticated SQL Injection via 'ays_questions' Parameter - truonghuuphuc/CVE-2024-6028-Poc
CVE-2019-9053
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered
GitHub
GitHub - TeymurNovruzov/CVE-2019-9053-python3-remastered: The script has been remastered by Teymur Novruzov to ensure compatibility…
The script has been remastered by Teymur Novruzov to ensure compatibility with Python 3. This tool is intended for educational purposes only. Unauthorized use of this tool on any system or network ...
CVE-2023-50029
PHP Injection vulnerability in the module "M4 PDF Extensions" (m4pdf) up to version 3.3.2 from PrestaAddons for PrestaShop allows attackers to run arbitrary code via the M4PDF::saveTemplate() method.
Github link:
https://github.com/absholi7ly/PHP-Injection-in-M4-PDF-Extensions
PHP Injection vulnerability in the module "M4 PDF Extensions" (m4pdf) up to version 3.3.2 from PrestaAddons for PrestaShop allows attackers to run arbitrary code via the M4PDF::saveTemplate() method.
Github link:
https://github.com/absholi7ly/PHP-Injection-in-M4-PDF-Extensions
GitHub
GitHub - absholi7ly/PHP-Injection-in-M4-PDF-Extensions: CVE-2023-50029: PHP Injection Vulnerability in M4 PDF Extensions Module
CVE-2023-50029: PHP Injection Vulnerability in M4 PDF Extensions Module - absholi7ly/PHP-Injection-in-M4-PDF-Extensions
CVE-2023-25690
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL) data and is then
re-inserted into the proxied request-target using variable
substitution. For example, something like:
RewriteEngine on
RewriteRule "^/here/(.*)" "https://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ https://example.com:8080/
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
Github link:
https://github.com/g4nkd/CVE-2023-25690-PoC
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL) data and is then
re-inserted into the proxied request-target using variable
substitution. For example, something like:
RewriteEngine on
RewriteRule "^/here/(.*)" "https://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ https://example.com:8080/
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
Github link:
https://github.com/g4nkd/CVE-2023-25690-PoC
CVE-2024-33113
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
Github link:
https://github.com/FaLLenSKiLL1/CVE-2024-33113
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
Github link:
https://github.com/FaLLenSKiLL1/CVE-2024-33113
GitHub
GitHub - FaLLenSKiLL1/CVE-2024-33113: D-LINK DIR-845L is vulnerable to information disclosure via the bsc_sms_inbox.php file.
D-LINK DIR-845L is vulnerable to information disclosure via the bsc_sms_inbox.php file. - FaLLenSKiLL1/CVE-2024-33113
CVE-2019-9849
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
Github link:
https://github.com/mbadanoiu/CVE-2019-9849
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
Github link:
https://github.com/mbadanoiu/CVE-2019-9849
GitHub
GitHub - mbadanoiu/CVE-2019-9849: CVE-2019-9849: Remote bullet graphics retrieved in “stealth mode” in LibreOffice
CVE-2019-9849: Remote bullet graphics retrieved in “stealth mode” in LibreOffice - mbadanoiu/CVE-2019-9849
CVE-2024-5806
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass in limited scenarios.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
Github link:
https://github.com/watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass in limited scenarios.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
Github link:
https://github.com/watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806
GitHub
GitHub - watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806: Exploit for the CVE-2024-5806
Exploit for the CVE-2024-5806. Contribute to watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806 development by creating an account on GitHub.
CVE-2023-30253
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
Github link:
https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
Github link:
https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253
GitHub
GitHub - dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253: In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled…
In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions. - dollarb...
CVE-2018-9995
TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response.
Github link:
https://github.com/A-Alabdoo/CVE-DVr
TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response.
Github link:
https://github.com/A-Alabdoo/CVE-DVr
GitHub
GitHub - A-Alabdoo/CVE-DVr: CVE-2018-9995
CVE-2018-9995. Contribute to A-Alabdoo/CVE-DVr development by creating an account on GitHub.
CVE-2024-29868
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
Github link:
https://github.com/DEVisions/CVE-2024-29868
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
Github link:
https://github.com/DEVisions/CVE-2024-29868
GitHub
GitHub - DEVisions/CVE-2024-29868: Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0
Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0 - DEVisions/CVE-2024-29868