CVE-2024-55591
None
Github link:
https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591
None
Github link:
https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591
GitHub
GitHub - souzatyler/fortios-auth-bypass-check-CVE-2024-55591: Checks for authentication bypass vulnerability inFortinet's FortiOS…
Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers. - souzatyler/fortios-auth-bypass-check-CVE-2024-55591
CVE-2023-46805
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Github link:
https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Github link:
https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
GitHub
GitHub - Hexastrike/Ivanti-Connect-Secure-Logs-Parser: A Python script for examining Ivanti Secure Connect (ICS) event logs, designed…
A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887. - Hexastrike/Ivanti-...
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/AzrDll/CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/AzrDll/CVE-2024-6387
GitHub
GitHub - AzrDll/CVE-2024-6387: This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the…
This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the CVE through them. - AzrDll/CVE-2024-6387
CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/ZacharyZcR/CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/ZacharyZcR/CVE-2021-44228
GitHub
GitHub - ZacharyZcR/CVE-2021-44228: 调试环境
调试环境. Contribute to ZacharyZcR/CVE-2021-44228 development by creating an account on GitHub.
CVE-2024-9796
The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
Github link:
https://github.com/viniciuslazzari/CVE-2024-9796
The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
Github link:
https://github.com/viniciuslazzari/CVE-2024-9796
GitHub
GitHub - viniciuslazzari/CVE-2024-9796: Vulnerable website to the CVE-2024-9796
Vulnerable website to the CVE-2024-9796. Contribute to viniciuslazzari/CVE-2024-9796 development by creating an account on GitHub.
CVE-2024-41570
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE
GitHub
GitHub - HimmeL-Byte/CVE-2024-41570-SSRF-RCE: Havoc SSRF to RCE
Havoc SSRF to RCE. Contribute to HimmeL-Byte/CVE-2024-41570-SSRF-RCE development by creating an account on GitHub.
CVE-2021-1732
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.
Github link:
https://github.com/Sausageinforest/CVE-2021-1732
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.
Github link:
https://github.com/Sausageinforest/CVE-2021-1732
GitHub
GitHub - Sausageinforest/CVE-2021-1732: Compiled CVE-2021-1732(WIndows XP-10(till 20H1) LPE)
Compiled CVE-2021-1732(WIndows XP-10(till 20H1) LPE) - Sausageinforest/CVE-2021-1732
CVE-2024-43998
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3.
Github link:
https://github.com/Nxploited/CVE-2024-43998
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3.
Github link:
https://github.com/Nxploited/CVE-2024-43998
GitHub
GitHub - Nxploited/CVE-2024-43998: Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not…
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3. - Nxploited/CVE-2024...