CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Github link:
https://github.com/mrmtwoj/CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Github link:
https://github.com/mrmtwoj/CVE-2023-25136
GitHub
GitHub - mrmtwoj/CVE-2023-25136: This vulnerability is of the "double-free" type, which occurs during the processing of key exchange…
This vulnerability is of the "double-free" type, which occurs during the processing of key exchange (KEX) algorithms in OpenSSH. A "double-free" vulnerability ha...
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
Github link:
https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner
Windows TCP/IP Remote Code Execution Vulnerability
Github link:
https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner
GitHub
GitHub - jip-0-0-0-0-0/CVE-2024-38063-scanner: A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems…
A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks - jip-0-0-0-0-0/CVE-2024-38063-scanner
CVE-2019-5029
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
Github link:
https://github.com/yZ1337/CVE-2019-5029
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
Github link:
https://github.com/yZ1337/CVE-2019-5029
GitHub
GitHub - yZ1337/CVE-2019-5029: This is a Python script PoC for CVE-2019-5029
This is a Python script PoC for CVE-2019-5029. Contribute to yZ1337/CVE-2019-5029 development by creating an account on GitHub.
CVE-2022-40684
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
Github link:
https://github.com/arsolutioner/fortigate-belsen-leak
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
Github link:
https://github.com/arsolutioner/fortigate-belsen-leak
GitHub
GitHub - arsolutioner/fortigate-belsen-leak: Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration…
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group - arsolutioner/fortigate-belsen-leak
CVE-2022-31814
pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.
Github link:
https://github.com/Inplex-sys/CVE-2022-31814
pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.
Github link:
https://github.com/Inplex-sys/CVE-2022-31814
GitHub
GitHub - Inplex-sys/CVE-2022-31814: Proof of concept for CVE-2022-31814
Proof of concept for CVE-2022-31814. Contribute to Inplex-sys/CVE-2022-31814 development by creating an account on GitHub.