CVE-2024-3094.zip
14.7 KB
CVE-2024-3094
Author: ThomRgn
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation
Author: ThomRgn
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation
CVE-2025-53072.zip
2 KB
CVE-2025-53072
Author: RedFoxNxploits
None
GitHub Link:
https://github.com/RedFoxNxploits/CVE-2025-53072
Author: RedFoxNxploits
None
GitHub Link:
https://github.com/RedFoxNxploits/CVE-2025-53072
CVE-2024-38063.zip
8.7 KB
CVE-2024-38063
Author: akozsentre
Windows TCP/IP Remote Code Execution Vulnerability
GitHub Link:
https://github.com/akozsentre/CVE-2024-38063
Author: akozsentre
Windows TCP/IP Remote Code Execution Vulnerability
GitHub Link:
https://github.com/akozsentre/CVE-2024-38063
CVE-2019-18935.zip
71.4 KB
CVE-2019-18935
Author: menashe12346
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
GitHub Link:
https://github.com/menashe12346/CVE-2019-18935
Author: menashe12346
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
GitHub Link:
https://github.com/menashe12346/CVE-2019-18935
CVE-2019-11043
Author: CodeHex083
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
GitHub Link:
https://github.com/CodeHex083/phuip-fpizdam
Author: CodeHex083
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
GitHub Link:
https://github.com/CodeHex083/phuip-fpizdam
CVE-2023-22515.zip
3 KB
CVE-2023-22515
Author: Arkha-Corvus
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
For more details, please review the linked advisory on this CVE.
GitHub Link:
https://github.com/Arkha-Corvus/LetsDefend-SOC235-Atlassian-Confluence-Broken-Access-Control-0-Day-CVE-2023-22515-EventID-197
Author: Arkha-Corvus
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
For more details, please review the linked advisory on this CVE.
GitHub Link:
https://github.com/Arkha-Corvus/LetsDefend-SOC235-Atlassian-Confluence-Broken-Access-Control-0-Day-CVE-2023-22515-EventID-197
❤1