Exploits from Github
628 subscribers
1 photo
791 files
3.75K links
Download Telegram
CVE-2024-9047.zip
2.5 KB
CVE-2024-9047
Author: amirqusairy99

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfufiledownloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

GitHub Link:
https://github.com/amirqusairy99/WordPress-File-Upload-4.24.11---Unauthenticated-Path-Traversal
CVE-2022-22536.zip
4.2 KB
CVE-2022-22536
Author: abrewer251

SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

GitHub Link:
https://github.com/abrewer251/CVE-2022-22536SAPRequestSmugglingScanner
🔥1
CVE-2015-1328.zip
14.5 KB
CVE-2015-1328
Author: 0xf1d0

The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.

GitHub Link:
https://github.com/0xf1d0/CVE-2015-1328
CVE-2018-6242.zip
1.2 KB
CVE-2018-6242
Author: nikameru

Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.

GitHub Link:
https://github.com/nikameru/nxboot
CVE-2025-2011.zip
4.1 KB
CVE-2025-2011
Author: X3RX3SSec

The Slider & Popup Builder by Depicter plugin for WordPress is vulnerable to generic SQL Injection via the ‘s' parameter in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

GitHub Link:
https://github.com/X3RX3SSec/CVE-2025-2011