CVE-2023-32315.zip
1.6 KB
CVE-2023-32315
Author: shiyingzhencai

Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or ...
CVE-2024-48990.zip
1.6 KB
CVE-2024-48990
Author: sobbing333

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

GitHub Link:
https://github.com/sobbing333/CVE-2024-48990-POC
CVE-2018-6242.zip
1.2 MB
CVE-2018-6242
Author: Resi-le

Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.

GitHub Link:
https://github.com/Resi-le/NXLoader
CVE-2024-31317.zip
6 KB
CVE-2024-31317
Author: fcy10012

In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITESECURESETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

GitHub Link:
https://github.com/fcy10012/CVE-2024-31317-Deployer
CVE-2022-22965.zip
5.1 KB
CVE-2022-22965
Author: Anon2Fear

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

GitHub Link:
https://github.com/Anon2Fear/CVE-2022-22965
CVE-2022-26134.zip
5.3 KB
CVE-2022-26134
Author: Anon2Fear

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.

GitHub Link:
https://github.com/Anon2Fear/CVE-2022-26134
CVE-2021-3493
Author: George-Yanni

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

GitHub Link:
https://github.com/George-Yanni/DeepRoot