CVE-2024-36401
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.
The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGrap
Github link:
https://github.com/bmth666/GeoServer-Tools-CVE-2024-36401
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.
The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGrap
Github link:
https://github.com/bmth666/GeoServer-Tools-CVE-2024-36401
GitHub
GitHub - bmth666/GeoServer-Tools-CVE-2024-36401: CVE-2024-36401 图形化利用工具,支持各个JDK版本利用以及回显、内存马实现
CVE-2024-36401 图形化利用工具,支持各个JDK版本利用以及回显、内存马实现. Contribute to bmth666/GeoServer-Tools-CVE-2024-36401 development by creating an account on GitHub.
CVE-2023-20198
Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.
For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory
Cisco will provide updates on the status of this investigation and when a software patch is available.
Github link:
https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198
Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.
For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory
Cisco will provide updates on the status of this investigation and when a software patch is available.
Github link:
https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198
GitHub
GitHub - G4sul1n/Cisco-IOS-XE-CVE-2023-20198: Exploit PoC for CVE-2023-20198
Exploit PoC for CVE-2023-20198. Contribute to G4sul1n/Cisco-IOS-XE-CVE-2023-20198 development by creating an account on GitHub.
CVE-2019-10149
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Github link:
https://github.com/VoyagerOnne/Exim-CVE-2019-10149
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Github link:
https://github.com/VoyagerOnne/Exim-CVE-2019-10149
GitHub
GitHub - VoyagerOnne/Exim-CVE-2019-10149: PoC for exploitation of vulnerability CVE-2019-10149
PoC for exploitation of vulnerability CVE-2019-10149 - VoyagerOnne/Exim-CVE-2019-10149
CVE-2024-4367
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Github link:
https://github.com/BektiHandoyo/cve-pdf-host
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Github link:
https://github.com/BektiHandoyo/cve-pdf-host
GitHub
GitHub - BektiHandoyo/cve-pdf-host: PDF host for CVE-2024-4367
PDF host for CVE-2024-4367. Contribute to BektiHandoyo/cve-pdf-host development by creating an account on GitHub.
CVE-2024-36991
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Github link:
https://github.com/xploitnik/CVE-2024-36991-modified
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Github link:
https://github.com/xploitnik/CVE-2024-36991-modified
GitHub
GitHub - xploitnik/CVE-2024-36991-modified: The modified version of the original script can be described as a Proof of Concept…
The modified version of the original script can be described as a Proof of Concept (PoC) Exploit Script for CVE-2024-36991, designed to read sensitive files from a vulnerable Splunk Enterprise inst...
CVE-2024-4577
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Github link:
https://github.com/sug4r-wr41th/CVE-2024-4577
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Github link:
https://github.com/sug4r-wr41th/CVE-2024-4577
GitHub
GitHub - sug4r-wr41th/CVE-2024-4577: PHP CGI CVE-2024-4577 PoC
PHP CGI CVE-2024-4577 PoC. Contribute to sug4r-wr41th/CVE-2024-4577 development by creating an account on GitHub.
CVE-2023-1177
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
Github link:
https://github.com/paultheal1en/CVE-2023-1177-PoC-reproduce
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
Github link:
https://github.com/paultheal1en/CVE-2023-1177-PoC-reproduce
GitHub
GitHub - paultheal1en/CVE-2023-1177-PoC-reproduce: PoC of CVE-2023-1177 vulnerability in MLflow (Reproduce)
PoC of CVE-2023-1177 vulnerability in MLflow (Reproduce) - paultheal1en/CVE-2023-1177-PoC-reproduce
CVE-2023-28121
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
Github link:
https://github.com/sug4r-wr41th/CVE-2023-28121
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
Github link:
https://github.com/sug4r-wr41th/CVE-2023-28121
GitHub
GitHub - sug4r-wr41th/CVE-2023-28121: WooCommerce Payments (WordPress plugin) =< 5.6.1 CVE-2023-28121 PoC
WooCommerce Payments (WordPress plugin) =< 5.6.1 CVE-2023-28121 PoC - sug4r-wr41th/CVE-2023-28121
CVE-2011-2523
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Github link:
https://github.com/sug4r-wr41th/CVE-2011-2523
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Github link:
https://github.com/sug4r-wr41th/CVE-2011-2523
GitHub
GitHub - sug4r-wr41th/CVE-2011-2523: vsFTPd 2.3.4 CVE-2011-2523 PoC
vsFTPd 2.3.4 CVE-2011-2523 PoC. Contribute to sug4r-wr41th/CVE-2011-2523 development by creating an account on GitHub.