CVE-2022-22965
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Github link:
https://github.com/jashan-lefty/Spring4Shell
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Github link:
https://github.com/jashan-lefty/Spring4Shell
GitHub
GitHub - jashan-lefty/Spring4Shell: In this challenge, I analyzed the Spring4Shell (CVE-2022-22965) vulnerability, investigated…
In this challenge, I analyzed the Spring4Shell (CVE-2022-22965) vulnerability, investigated security bypasses, and wrote an Incident Postmortem Report detailing the detection, impact, and resolutio...
CVE-2012-4960
None
Github link:
https://github.com/ghcohu/Decrypt-passwords-for-Huawei-routers-and-switches-CVE-2012-4960
None
Github link:
https://github.com/ghcohu/Decrypt-passwords-for-Huawei-routers-and-switches-CVE-2012-4960
GitHub
GitHub - ghcohu/Decrypt-passwords-for-Huawei-routers-and-switches-CVE-2012-4960: Code to decrypt Huawei passwords CVE-2012-4960
Code to decrypt Huawei passwords CVE-2012-4960. Contribute to ghcohu/Decrypt-passwords-for-Huawei-routers-and-switches-CVE-2012-4960 development by creating an account on GitHub.
CVE-2017-0144
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
GitHub
GitHub - MedX267/EternalBlue-Vulnerability-Scanner: This script checks for devices vulnerable to the EternalBlue exploit (CVE-2017…
This script checks for devices vulnerable to the EternalBlue exploit (CVE-2017-0144) in a network using SMB. - MedX267/EternalBlue-Vulnerability-Scanner
CVE-2024-25092
Missing Authorization vulnerability in XLPlugins NextMove Lite.This issue affects NextMove Lite: from n/a through 2.17.0.
Github link:
https://github.com/Nxploited/CVE-2024-25092
Missing Authorization vulnerability in XLPlugins NextMove Lite.This issue affects NextMove Lite: from n/a through 2.17.0.
Github link:
https://github.com/Nxploited/CVE-2024-25092
GitHub
GitHub - Nxploited/CVE-2024-25092: WordPress NextMove Lite plugin <= 2.17.0 - Subscriber+ Arbitrary Plugin Installation/Activation…
WordPress NextMove Lite plugin <= 2.17.0 - Subscriber+ Arbitrary Plugin Installation/Activation vulnerability - Nxploited/CVE-2024-25092
CVE-2015-0009
The Group Policy Security Configuration policy implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows man-in-the-middle attackers to disable a signing requirement and trigger a revert-to-default action by spoofing domain-controller responses, aka "Group Policy Security Feature Bypass Vulnerability."
Github link:
https://github.com/PhoenixC46/ExploitPOC_MS15-014_CVE-2015-0009
The Group Policy Security Configuration policy implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows man-in-the-middle attackers to disable a signing requirement and trigger a revert-to-default action by spoofing domain-controller responses, aka "Group Policy Security Feature Bypass Vulnerability."
Github link:
https://github.com/PhoenixC46/ExploitPOC_MS15-014_CVE-2015-0009
GitHub
GitHub - PhoenixC46/ExploitPOC_MS15-014_CVE-2015-0009: PoC Exploit for CVE-2015-0009 (SMB Signing)
PoC Exploit for CVE-2015-0009 (SMB Signing). Contribute to PhoenixC46/ExploitPOC_MS15-014_CVE-2015-0009 development by creating an account on GitHub.
CVE-2017-0143
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/n3rdh4x0r/MS17-010
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/n3rdh4x0r/MS17-010
GitHub
GitHub - n3rdh4x0r/MS17-010: MS17-010 (CVE-2017-0143) - Python3 Script
MS17-010 (CVE-2017-0143) - Python3 Script. Contribute to n3rdh4x0r/MS17-010 development by creating an account on GitHub.