Exploits from Github
531 subscribers
1 photo
609 files
3.55K links
Download Telegram
CVE-2008-0166.zip
32.6 KB
CVE-2008-0166
Author: AhegaoPsyops

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

GitHub Link:
https://github.com/AhegaoPsyops/sslWeakness
CVE-2024-32002.zip
3.7 KB
CVE-2024-32002
Author: JoaoLeonello

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a .git/ directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via git config --global core.symlinks false), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.

GitHub Link:
https://github.com/JoaoLeonello/cve-2024-32002-poc
CVE-2017-5638
Author: FozilCV

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

GitHub Link:
https://github.com/FozilCV/Apache-Struts2-CVE-2017-5638
CVE-2025-49132.zip
11.7 KB
CVE-2025-49132
Author: WebSafety-2tina

Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.

GitHub Link:
https://github.com/WebSafety-2tina/CVE-2025-49132
CVE-2023-36802.zip
12.9 KB
CVE-2023-36802
Author: rahul0xkr

Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability

GitHub Link:
https://github.com/rahul0xkr/Reproducing-CVE-2023-36802
CVE-2025-31161.zip
2.3 KB
CVE-2025-31161
Author: Teexo

CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to loginuserpass() with no password requirement. This will authenticate the session through the HMAC verification process and up until the server checks for user verification once more. The vulnerability can be further stabilized, eliminating the need for successfully triggering a race condition, by sending a mangled AWS4-HMAC header. By providing only the username and a following slash (/), the server will successfully find a username, whic...