Exploits from Github
531 subscribers
1 photo
606 files
3.54K links
Download Telegram
CVE-2018-16763.zip
735 B
CVE-2018-16763
Author: Cyberuser-hash

FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.

GitHub Link:
https://github.com/Cyberuser-hash/CVE-2018-16763
CVE-2025-32463.zip
2.9 KB
CVE-2025-32463
Author: r3dBust3r

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

GitHub Link:
https://github.com/r3dBust3r/CVE-2025-32463
CVE-2025-32462
Author: harsh1verma

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

GitHub Link:
https://github.com/harsh1verma/CVE-Analysis
CVE-2021-41773.zip
3.1 KB
CVE-2021-41773
Author: gunzf0x

A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.

GitHub Link:
https://github.com/gunzf0x/CVE-2021-41773