CVE-2025-4123.zip
4.4 MB
CVE-2025-4123
Author: MorphyKutay
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.
The default Content-Security-Policy (CSP) in Grafana will block the XSS though the
GitHub Link:
https://github.com/MorphyKutay/CVE-2025-4123-Exploit
Author: MorphyKutay
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.
The default Content-Security-Policy (CSP) in Grafana will block the XSS though the
connect-src
directive.GitHub Link:
https://github.com/MorphyKutay/CVE-2025-4123-Exploit
CVE-2024-53677.zip
34.9 KB
CVE-2024-53677
Author: seoyoung-kang
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
GitHub Link:
https://github.com/seoyoung-kang/CVE-2024-53677
Author: seoyoung-kang
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
GitHub Link:
https://github.com/seoyoung-kang/CVE-2024-53677
CVE-2017-10271.zip
9 KB
CVE-2017-10271
Author: seoyoung-kang
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
GitHub Link:
https://github.com/seoyoung-kang/CVE-2017-10271
Author: seoyoung-kang
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
GitHub Link:
https://github.com/seoyoung-kang/CVE-2017-10271
CVE-2023-45612.zip
49.8 KB
CVE-2023-45612
Author: aecelen
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
GitHub Link:
https://github.com/aecelen/ktor-xxe-poc
Author: aecelen
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
GitHub Link:
https://github.com/aecelen/ktor-xxe-poc
CVE-2024-3094.zip
2.1 KB
CVE-2024-3094
Author: M1lo25
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/M1lo25/CS50Cybersecurity
Author: M1lo25
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/M1lo25/CS50Cybersecurity
CVE-2017-1000367.zip
4.8 KB
CVE-2017-1000367
Author: letsr00t
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the getprocessttyname() function resulting in information disclosure and command execution.
GitHub Link:
https://github.com/letsr00t/CVE-2017-1000367
Author: letsr00t
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the getprocessttyname() function resulting in information disclosure and command execution.
GitHub Link:
https://github.com/letsr00t/CVE-2017-1000367
CVE-2025-32463.zip
1.3 KB
CVE-2025-32463
Author: dr4xp
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
GitHub Link:
https://github.com/dr4xp/sudo-chroot
Author: dr4xp
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
GitHub Link:
https://github.com/dr4xp/sudo-chroot
CVE-2024-27956.zip
3.6 KB
CVE-2024-27956
Author: 0axz-tools
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
GitHub Link:
https://github.com/0axz-tools/CVE-2024-27956
Author: 0axz-tools
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
GitHub Link:
https://github.com/0axz-tools/CVE-2024-27956