Exploits from Github
537 subscribers
1 photo
616 files
3.55K links
Download Telegram
CVE-2025-24799.zip
8.7 KB
CVE-2025-24799
Author: Rosemary1337

GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18.

GitHub Link:
https://github.com/Rosemary1337/CVE-2025-24799
CVE-2022-22077.zip
42.6 KB
CVE-2022-22077
Author: grisuno

Memory corruption in graphics due to use-after-free in graphics dispatcher logic in Snapdragon Mobile

GitHub Link:
https://github.com/grisuno/CVE-2022-22077
CVE-2024-6387.zip
4.5 KB
CVE-2024-6387
Author: moften

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

GitHub Link:
https://github.com/moften/regreSSHion-CVE-2024-6387
CVE-2025-30208.zip
20.5 KB
CVE-2025-30208
Author: Dany60-98

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. @fs denies access to files outside of Vite serving allow list. Adding ?raw?? or ?import&raw?? to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as ? are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

GitHub Link:
https://github.com/Dany60-98/CVE-2025-30208-EXP
CVE-2025-48384.zip
2.2 KB
CVE-2025-48384
Author: EdwardYeIntrix

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

Git...
CVE-2018-16763.zip
2.6 KB
CVE-2018-16763
Author: B7T3

FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.

GitHub Link:
https://github.com/B7T3/CVE-2018-16763FuelCMS-1.4.1RCE
CVE-2018-16763.zip
2.6 KB
CVE-2018-16763
Author: B7T3

FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.

GitHub Link:
https://github.com/B7T3/CVE-2018-16763FuelCMS-1.4.1RCE
CVE-2025-48384.zip
2.2 KB
CVE-2025-48384
Author: EdwardYeIntrix

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

Git...
CVE-2022-22077.zip
42.6 KB
CVE-2022-22077
Author: grisuno

Memory corruption in graphics due to use-after-free in graphics dispatcher logic in Snapdragon Mobile

GitHub Link:
https://github.com/grisuno/CVE-2022-22077
CVE-2024-6387.zip
4.5 KB
CVE-2024-6387
Author: moften

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

GitHub Link:
https://github.com/moften/regreSSHion-CVE-2024-6387
CVE-2025-30208.zip
20.5 KB
CVE-2025-30208
Author: Dany60-98

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. @fs denies access to files outside of Vite serving allow list. Adding ?raw?? or ?import&raw?? to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as ? are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

GitHub Link:
https://github.com/Dany60-98/CVE-2025-30208-EXP
CVE-2021-44228.zip
5 KB
CVE-2021-44228
Author: moften

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

GitHub Link:
https://github.com/moften/Log4Shell
CVE-2018-11776.zip
2.1 KB
CVE-2018-11776
Author: m4sk0ff

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.

GitHub Link:
https://github.com/m4sk0ff/CVE-2018-11776