CVE-2025-4334.zip
7.8 KB
CVE-2025-4334
Author: 0xgh057r3c0n
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
GitHub Link:
https://github.com/0xgh057r3c0n/CVE-2025-4334
Author: 0xgh057r3c0n
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
GitHub Link:
https://github.com/0xgh057r3c0n/CVE-2025-4334
CVE-2013-3900.zip
4.8 KB
CVE-2013-3900
Author: PREN0MEN
The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote attackers to execute arbitrary code via a crafted PE file, aka "WinVerifyTrust Signature Validation Vulnerability."
GitHub Link:
https://github.com/PREN0MEN/CVE-2013-3900-PowerShell-PoC
Author: PREN0MEN
The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote attackers to execute arbitrary code via a crafted PE file, aka "WinVerifyTrust Signature Validation Vulnerability."
GitHub Link:
https://github.com/PREN0MEN/CVE-2013-3900-PowerShell-PoC
Forwarded from PT from dbugs
@Dbugs1337 — automated monitoring of dbugs.ptsecurity.com
Unofficial Telegram bot channel that tracks and posts entries from dbugs with information about new vulnerabilities with the PT identifier (like CVE).
Unofficial Telegram bot channel that tracks and posts entries from dbugs with information about new vulnerabilities with the PT identifier (like CVE).
CVE-2025-5777.zip
2.6 KB
CVE-2025-5777
Author: ndr-repo
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
GitHub Link:
https://github.com/ndr-repo/CVE-2025-5777
Author: ndr-repo
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
GitHub Link:
https://github.com/ndr-repo/CVE-2025-5777
CVE-2011-2523.zip
2.3 KB
CVE-2011-2523
Author: seerat-fatima21
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
GitHub Link:
https://github.com/seerat-fatima21/vsftpd-exploit
Author: seerat-fatima21
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
GitHub Link:
https://github.com/seerat-fatima21/vsftpd-exploit
CVE-2018-7600.zip
5.8 KB
CVE-2018-7600
Author: SyedGhufranRaza
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
GitHub Link:
https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
Author: SyedGhufranRaza
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
GitHub Link:
https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
CVE-2021-29447.zip
961.2 KB
CVE-2021-29447
Author: ArtemCyberLab
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
GitHub Link:
https://github.com/ArtemCyberLab/Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets-
Author: ArtemCyberLab
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
GitHub Link:
https://github.com/ArtemCyberLab/Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets-
CVE-2024-2961
Author: scriptSails
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
GitHub Link:
https://github.com/scriptSails/glibcs
Author: scriptSails
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
GitHub Link:
https://github.com/scriptSails/glibcs
CVE-2025-25256.zip
1 KB
CVE-2025-25256
Author: JMS-Security
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability CWE-78 in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
GitHub Link:
https://github.com/JMS-Security/CVE-2025-25256-PoC
Author: JMS-Security
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability CWE-78 in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
GitHub Link:
https://github.com/JMS-Security/CVE-2025-25256-PoC
CVE-2023-35078.zip
7.4 KB
CVE-2023-35078
Author: 0nsec
Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an administrative account, and change the configuration because of an authentication bypass, as exploited in the wild in July 2023. A patch is available.
GitHub Link:
https://github.com/0nsec/CVE-2023-35078
Author: 0nsec
Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an administrative account, and change the configuration because of an authentication bypass, as exploited in the wild in July 2023. A patch is available.
GitHub Link:
https://github.com/0nsec/CVE-2023-35078