CVE-2023-46805
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Github link:
https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Github link:
https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
GitHub
GitHub - Hexastrike/Ivanti-Connect-Secure-Logs-Parser: A Python script for examining Ivanti Secure Connect (ICS) event logs, designed…
A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887. - Hexastrike/Ivanti-...
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/AzrDll/CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/AzrDll/CVE-2024-6387
GitHub
GitHub - AzrDll/CVE-2024-6387: This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the…
This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the CVE through them. - AzrDll/CVE-2024-6387
CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/ZacharyZcR/CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/ZacharyZcR/CVE-2021-44228
GitHub
GitHub - ZacharyZcR/CVE-2021-44228: 调试环境
调试环境. Contribute to ZacharyZcR/CVE-2021-44228 development by creating an account on GitHub.
CVE-2024-9796
The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
Github link:
https://github.com/viniciuslazzari/CVE-2024-9796
The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
Github link:
https://github.com/viniciuslazzari/CVE-2024-9796
GitHub
GitHub - viniciuslazzari/CVE-2024-9796: Vulnerable website to the CVE-2024-9796
Vulnerable website to the CVE-2024-9796. Contribute to viniciuslazzari/CVE-2024-9796 development by creating an account on GitHub.
CVE-2024-41570
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE
GitHub
GitHub - HimmeL-Byte/CVE-2024-41570-SSRF-RCE: Havoc SSRF to RCE
Havoc SSRF to RCE. Contribute to HimmeL-Byte/CVE-2024-41570-SSRF-RCE development by creating an account on GitHub.
CVE-2021-1732
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.
Github link:
https://github.com/Sausageinforest/CVE-2021-1732
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.
Github link:
https://github.com/Sausageinforest/CVE-2021-1732
GitHub
GitHub - Sausageinforest/CVE-2021-1732: Compiled CVE-2021-1732(WIndows XP-10(till 20H1) LPE)
Compiled CVE-2021-1732(WIndows XP-10(till 20H1) LPE) - Sausageinforest/CVE-2021-1732
CVE-2024-43998
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3.
Github link:
https://github.com/Nxploited/CVE-2024-43998
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3.
Github link:
https://github.com/Nxploited/CVE-2024-43998
GitHub
GitHub - Nxploited/CVE-2024-43998: Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not…
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3. - Nxploited/CVE-2024...
CVE-2024-41570
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE
GitHub
GitHub - sebr-dev/Havoc-C2-SSRF-to-RCE: This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the…
This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the auth RCE exploit from @hyperreality. This exploit executes code remotely to a target due to multiple vulnera...
CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Github link:
https://github.com/Mephierr/DirtyPipe_exploit
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Github link:
https://github.com/Mephierr/DirtyPipe_exploit
GitHub
GitHub - Mephierr/DirtyPipe_exploit: CVE-2022-0847
CVE-2022-0847. Contribute to Mephierr/DirtyPipe_exploit development by creating an account on GitHub.
CVE-2024-41570
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/kit4py/CVE-2024-41570
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
Github link:
https://github.com/kit4py/CVE-2024-41570
GitHub
GitHub - kit4py/CVE-2024-41570: Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE
Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE - kit4py/CVE-2024-41570