Exploits from Github
623 subscribers
1 photo
772 files
3.72K links
Download Telegram
CVE-2025-26794.zip
8.5 KB
CVE-2025-26794
Author: XploitGh0st

Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection.

GitHub Link:
https://github.com/XploitGh0st/CVE-2025-26794-exploit
CVE-2021-29447.zip
7.3 KB
CVE-2021-29447
Author: 0xricksanchez

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

GitHub Link:
https://github.com/0xricksanchez/CVE-2021-29447
CVE-2024-9047.zip
2.5 KB
CVE-2024-9047
Author: amirqusairy99

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfufiledownloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

GitHub Link:
https://github.com/amirqusairy99/WordPress-File-Upload-4.24.11---Unauthenticated-Path-Traversal
CVE-2022-22536.zip
4.2 KB
CVE-2022-22536
Author: abrewer251

SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

GitHub Link:
https://github.com/abrewer251/CVE-2022-22536SAPRequestSmugglingScanner
🔥1
CVE-2015-1328.zip
14.5 KB
CVE-2015-1328
Author: 0xf1d0

The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.

GitHub Link:
https://github.com/0xf1d0/CVE-2015-1328
CVE-2018-6242.zip
1.2 KB
CVE-2018-6242
Author: nikameru

Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.

GitHub Link:
https://github.com/nikameru/nxboot