CVE-2024-23113
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Github link:
https://github.com/hatvix1/CVE-2024-23113
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Github link:
https://github.com/hatvix1/CVE-2024-23113
CVE-2024-24919
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Github link:
https://github.com/sar-3mar/CVE-2024-24919_POC
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Github link:
https://github.com/sar-3mar/CVE-2024-24919_POC
GitHub
GitHub - sar-3mar/CVE-2024-24919_POC: It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd
It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd - GitHub - sar-3mar/CVE-2024-24919_POC: It's Proof of Concept on CVE-2024-24919-POC , i made it...
CVE-2022-38029
Windows ALPC Elevation of Privilege Vulnerability.
Github link:
https://github.com/SpiralBL0CK/SIDECHANNEL-CVE-2022-38029
Windows ALPC Elevation of Privilege Vulnerability.
Github link:
https://github.com/SpiralBL0CK/SIDECHANNEL-CVE-2022-38029
GitHub
GitHub - SpiralBL0CK/SIDECHANNEL-CVE-2022-38029: SIDECHANNEL+CVE-2022-38029
SIDECHANNEL+CVE-2022-38029. Contribute to SpiralBL0CK/SIDECHANNEL-CVE-2022-38029 development by creating an account on GitHub.
CVE-2023-22518
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Github link:
https://github.com/zgimszhd61/CVE-2023-22518
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Github link:
https://github.com/zgimszhd61/CVE-2023-22518
CVE-2023-21716
Microsoft Word Remote Code Execution Vulnerability
Github link:
https://github.com/n0s3ns33/poc-cve-2023-21716
Microsoft Word Remote Code Execution Vulnerability
Github link:
https://github.com/n0s3ns33/poc-cve-2023-21716
GitHub
GitHub - n0s3ns33/poc-cve-2023-21716: POC CVE 2023-21716
POC CVE 2023-21716. Contribute to n0s3ns33/poc-cve-2023-21716 development by creating an account on GitHub.
CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/h3athen/CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/h3athen/CVE-2023-41425
GitHub
GitHub - h3athen/CVE-2023-41425: Writing one because the one I found isn't working
Writing one because the one I found isn't working. Contribute to h3athen/CVE-2023-41425 development by creating an account on GitHub.
CVE-2021-22911
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
Github link:
https://github.com/Weisant/CVE-2021-22911-EXP
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
Github link:
https://github.com/Weisant/CVE-2021-22911-EXP
GitHub
GitHub - Weisant/CVE-2021-22911-EXP: some small changes to the code by CsEnox
some small changes to the code by CsEnox. Contribute to Weisant/CVE-2021-22911-EXP development by creating an account on GitHub.
CVE-2017-12635
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
Github link:
https://github.com/Weisant/CVE-2017-12635-EXP
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
Github link:
https://github.com/Weisant/CVE-2017-12635-EXP
GitHub
GitHub - Weisant/CVE-2017-12635-EXP: CouchDB CVE-2017-12635 Exploit Script
CouchDB CVE-2017-12635 Exploit Script. Contribute to Weisant/CVE-2017-12635-EXP development by creating an account on GitHub.