Exploits from Github
567 subscribers
1 photo
664 files
3.6K links
Download Telegram
CVE-2022-30190.zip
2.6 KB
CVE-2022-30190
Author: Arkha-Corvus

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.

GitHub Link:
https://github.com/Arkha-Corvus/LetsDefend-SOC173-Follina-0-Day-Detected
CVE-2025-27591.zip
1.2 KB
CVE-2025-27591
Author: krn966

A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.

GitHub Link:
https://github.com/krn966/CVE-2025-27591
CVE-2025-32433.zip
2.5 KB
CVE-2025-32433
Author: Batman529

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

GitHub Link:
https://github.com/Batman529/PoC-CVE-2025-32433
CVE-2022-22965.zip
6.5 KB
CVE-2022-22965
Author: NickoPS87

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

GitHub Link:
https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POC
CVE-2017-1000353.zip
16.7 KB
CVE-2017-1000353
Author: Jelc0Doesbruf

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java SignedObject object to the Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding SignedObject to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.

GitHub Link:
https://github.com/Jelc0Doesbruf/CVE-2017-1000353