CVE-2019-9053
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/Hackheart-tech/-exploit-lab
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Github link:
https://github.com/Hackheart-tech/-exploit-lab
GitHub
GitHub - Hackheart-tech/-exploit-lab: Exploits Python cve-2019-9053– by HackHeart
Exploits Python cve-2019-9053– by HackHeart. Contribute to Hackheart-tech/-exploit-lab development by creating an account on GitHub.
CVE-2020-1054
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
Github link:
https://github.com/Naman2701B/CVE-2020-1054
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
Github link:
https://github.com/Naman2701B/CVE-2020-1054
GitHub
GitHub - Naman2701B/CVE-2020-1054: This is a modified version of CVE 2020 1054 PoC
This is a modified version of CVE 2020 1054 PoC. Contribute to Naman2701B/CVE-2020-1054 development by creating an account on GitHub.
CVE-2020-0665
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
Github link:
https://github.com/gunzf0x/CVE-2020-0665
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
Github link:
https://github.com/gunzf0x/CVE-2020-0665
GitHub
GitHub - gunzf0x/CVE-2020-0665: Proof of Concept for CVE-2020-0665, a.k.a. SID Filter Bypass.
Proof of Concept for CVE-2020-0665, a.k.a. SID Filter Bypass. - gunzf0x/CVE-2020-0665
CVE-2025-29927
None
Github link:
https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation
None
Github link:
https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation
GitHub
GitHub - Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation: Simulates CVE-2025-29927, a critical Next.js vulnerability allowing…
Simulates CVE-2025-29927, a critical Next.js vulnerability allowing attackers to bypass middleware authorization by exploiting the internal x-middleware-subrequest HTTP header. Demonstrates unautho...
CVE-2024-3094
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
Github link:
https://github.com/been22426/CVE-2024-3094
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
Github link:
https://github.com/been22426/CVE-2024-3094
GitHub
GitHub - been22426/CVE-2024-3094: CVE-2024-3094 실습 환경 구축 및 보고
CVE-2024-3094 실습 환경 구축 및 보고. Contribute to been22426/CVE-2024-3094 development by creating an account on GitHub.
CVE-2018-14847
MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
Github link:
https://github.com/tausifzaman/CVE-2018-14847
MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
Github link:
https://github.com/tausifzaman/CVE-2018-14847
GitHub
GitHub - tausifzaman/CVE-2018-14847: This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows…
This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this ...