CVE-2024-4956.zip
1.5 KB
CVE-2024-4956
Author: Buff3st-0v3rfl0w

Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.

GitHub Link:
https://github.com/Buff3st-0v3rfl0w/CVE-2024-4956
CVE-2011-2523
Author: hajisthabegum

vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.

GitHub Link:
https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit
CVE-2024-4367.zip
1.4 KB
CVE-2024-4367
Author: 1337rokudenashi

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

GitHub Link:
https://github.com/1337rokudenashi/OdooPDFjsCVE-2024-4367.pdf
CVE-2024-4367.zip
1.4 KB
CVE-2024-4367
Author: 1337rokudenashi

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

GitHub Link:
https://github.com/1337rokudenashi/OdooPDFjsCVE-2024-4367.pdf
CVE-2011-2523
Author: hajisthabegum

vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.

GitHub Link:
https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit
CVE-2021-3156.zip
185.5 KB
CVE-2021-3156
Author: HuzaifaTariqAfzalKhan

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

GitHub Link:
https://github.com/HuzaifaTariqAfzalKhan/CVE-Exploit-Research-Development-ITSOLERA
CVE-2021-3156.zip
185.5 KB
CVE-2021-3156
Author: HuzaifaTariqAfzalKhan

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

GitHub Link:
https://github.com/HuzaifaTariqAfzalKhan/CVE-Exploit-Research-Development-ITSOLERA
CVE-2025-48384.zip
413 B
CVE-2025-48384
Author: eliox01

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

GitHub Link:
http...
CVE-2023-6275.zip
1.2 KB
CVE-2023-6275
Author: LelioCosta

A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104.

GitHub Link:
https://github.com/LelioCosta/FLUIG-Vulnerabilidade-CVE-2023-6275
CVE-2017-5638.zip
1.9 KB
CVE-2017-5638
Author: iampetru

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

GitHub Link:
https://github.com/iampetru/PoC-CVE-2017-5638
CVE-2024-0762.zip
1.2 KB
CVE-2024-0762
Author: abandon1337

Potential buffer overflow
in unsafe UEFI variable handling

in Phoenix SecureCore for select Intel platforms

This issue affects:

Phoenix

SecureCore for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;

Phoenix

SecureCore for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;

Phoenix

SecureCore for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;

Phoenix

SecureCore for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;

Phoenix

SecureCore for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;

Phoenix

SecureCore for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;

Phoenix

SecureCore for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;

Phoenix

SecureCore for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;

Phoenix

SecureCore for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.



GitHub Link:
https://github.com/abandon1337/CVE-2024-0762
CVE-2023-45866.zip
10.6 KB
CVE-2023-45866
Author: Sergeb250

Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.

GitHub Link:
https://github.com/Sergeb250/BlueDucky
CVE-2017-11882
Author: futureFfff

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.

GitHub Link:
https://github.com/futureFfff/CVE-2017
CVE-2025-48384.zip
489 B
CVE-2025-48384
Author: wzx5002

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

GitHub Link:
http...