CVE-2020-14882
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Github link:
https://github.com/KKC73/weblogic-cve-2020-14882
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Github link:
https://github.com/KKC73/weblogic-cve-2020-14882
GitHub
GitHub - KKC73/weblogic-cve-2020-14882: This is a repository that aims to provide research material on CVE-2020-14882 as part of…
This is a repository that aims to provide research material on CVE-2020-14882 as part of a project in partial fullfilment of ACS EDU Program. - KKC73/weblogic-cve-2020-14882
CVE-2022-34169
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Github link:
https://github.com/Disnaming/CVE-2022-34169
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Github link:
https://github.com/Disnaming/CVE-2022-34169
GitHub
Disnaming/CVE-2022-34169
A PoC for CVE-2022-34169, for the SU_PWN challenge from SUCTF 2025 - Disnaming/CVE-2022-34169
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Github link:
https://github.com/aulauniversal/CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Github link:
https://github.com/aulauniversal/CVE-2023-44487
GitHub
GitHub - aulauniversal/CVE-2023-44487: RapidResetClient
RapidResetClient. Contribute to aulauniversal/CVE-2023-44487 development by creating an account on GitHub.
CVE-2022-40684
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
Github link:
https://github.com/AKboss1221/fortigate-belsen-leak
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
Github link:
https://github.com/AKboss1221/fortigate-belsen-leak
CVE-2024-55591
None
Github link:
https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591
None
Github link:
https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591
GitHub
GitHub - souzatyler/fortios-auth-bypass-check-CVE-2024-55591: Checks for authentication bypass vulnerability inFortinet's FortiOS…
Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers. - souzatyler/fortios-auth-bypass-check-CVE-2024-55591
CVE-2023-46805
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Github link:
https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Github link:
https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
GitHub
GitHub - Hexastrike/Ivanti-Connect-Secure-Logs-Parser: A Python script for examining Ivanti Secure Connect (ICS) event logs, designed…
A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887. - Hexastrike/Ivanti-...