CVE-2017-0144
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/sethwhy/BlueDoor
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/sethwhy/BlueDoor
GitHub
GitHub - sethwhy/BlueDoor: Can you exploit the EternalBlue vulnerability (CVE-2017-0144) on a Windows 7 system and retrieve the…
Can you exploit the EternalBlue vulnerability (CVE-2017-0144) on a Windows 7 system and retrieve the hidden flag? Your goal is to gain administrative privileges and locate the flag stored behind th...
CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/xpltive/CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/xpltive/CVE-2023-41425
GitHub
GitHub - xpltive/CVE-2023-41425: WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit. Contribute to xpltive/CVE-2023-41425 development by creating an account on GitHub.
CVE-2023-50564
An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
Github link:
https://github.com/xpltive/CVE-2023-50564
An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
Github link:
https://github.com/xpltive/CVE-2023-50564
GitHub
GitHub - xpltive/CVE-2023-50564: Pluck-CMS v4.7.18 RCE exploit
Pluck-CMS v4.7.18 RCE exploit. Contribute to xpltive/CVE-2023-50564 development by creating an account on GitHub.
CVE-2022-46463
An access control issue in Harbor v1.X.X to v2.5.3 allows attackers to access public and private image repositories without authentication.
Github link:
https://github.com/CodeSecurityTeam/harbor
An access control issue in Harbor v1.X.X to v2.5.3 allows attackers to access public and private image repositories without authentication.
Github link:
https://github.com/CodeSecurityTeam/harbor
GitHub
GitHub - CodeSecurityTeam/harbor: CVE-2022-46463 harbor公开镜像全自动下载脚本
CVE-2022-46463 harbor公开镜像全自动下载脚本. Contribute to CodeSecurityTeam/harbor development by creating an account on GitHub.
CVE-2024-10914
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Github link:
https://github.com/dragonXZH/CVE-2024-10914
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Github link:
https://github.com/dragonXZH/CVE-2024-10914
GitHub
GitHub - dragonXZH/CVE-2024-10914: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - dragonXZH/CVE-2024-10914