Exploits from Github
591 subscribers
1 photo
706 files
3.65K links
Download Telegram
CVE-2024-38063.zip
8.7 KB
CVE-2024-38063
Author: akozsentre

Windows TCP/IP Remote Code Execution Vulnerability

GitHub Link:
https://github.com/akozsentre/CVE-2024-38063
CVE-2019-18935.zip
71.4 KB
CVE-2019-18935
Author: menashe12346

Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)

GitHub Link:
https://github.com/menashe12346/CVE-2019-18935
CVE-2019-11043
Author: CodeHex083

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

GitHub Link:
https://github.com/CodeHex083/phuip-fpizdam
CVE-2023-22515.zip
3 KB
CVE-2023-22515
Author: Arkha-Corvus

Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.

Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

For more details, please review the linked advisory on this CVE.

GitHub Link:
https://github.com/Arkha-Corvus/LetsDefend-SOC235-Atlassian-Confluence-Broken-Access-Control-0-Day-CVE-2023-22515-EventID-197
1
CVE-2025-3248.zip
6.2 KB
CVE-2025-3248
Author: bambooqj

Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.

GitHub Link:
https://github.com/bambooqj/cve-2025-3248