CVE-2025-30065
None
Github link:
https://github.com/ThreatRadarAI/TRA-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation-
None
Github link:
https://github.com/ThreatRadarAI/TRA-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation-
GitHub
GitHub - ThreatRadarAI/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation: A CVSS 10.0-rated vulnerability…
A CVSS 10.0-rated vulnerability in the parquet-avro Java module allows remote code execution via unsafe deserialization when parsing schemas. Tracked as CVE-2025-30065, this flaw affects Apache Par...
CVE-2021-34371
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
Github link:
https://github.com/tavgar/CVE-2021-34371
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
Github link:
https://github.com/tavgar/CVE-2021-34371
GitHub
GitHub - tavgar/CVE-2021-34371: python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE) - tavgar/CVE-2021-34371
CVE-2024-28987
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
Github link:
https://github.com/alecclyde/CVE-2024-28987
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
Github link:
https://github.com/alecclyde/CVE-2024-28987
GitHub
GitHub - alecclyde/CVE-2024-28987: Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability
Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability - alecclyde/CVE-2024-28987
CVE-2025-24016
None
Github link:
https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
None
Github link:
https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
GitHub
GitHub - cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC: A critical RCE vulnerability has been identified…
A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in vers...
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Github link:
https://github.com/zanks08/cve-2023-44487-demo
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Github link:
https://github.com/zanks08/cve-2023-44487-demo
GitHub
GitHub - zanks08/cve-2023-44487-demo: Demo for detection and mitigation of HTTP/2 Rapid Reset vulnerability (CVE-2023-44487)
Demo for detection and mitigation of HTTP/2 Rapid Reset vulnerability (CVE-2023-44487) - zanks08/cve-2023-44487-demo
CVE-2024-49138
None
Github link:
https://github.com/CyprianAtsyor/letsdefend-cve-2024-49138-investigation
None
Github link:
https://github.com/CyprianAtsyor/letsdefend-cve-2024-49138-investigation
GitHub
GitHub - CyprianAtsyor/letsdefend-cve-2024-49138-investigation: Hands-on SOC investigation of CVE-2024-49138 using LetsDefend,…
Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT. - CyprianAtsyor/letsdefend-cve-2024-49138-investigation
CVE-2023-25157
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
Github link:
https://github.com/charis3306/CVE-2023-25157
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
Github link:
https://github.com/charis3306/CVE-2023-25157
GitHub
GitHub - charis3306/CVE-2023-25157: CVE-2023-25157 exp
CVE-2023-25157 exp. Contribute to charis3306/CVE-2023-25157 development by creating an account on GitHub.
CVE-2021-43857
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
Github link:
https://github.com/G4sp4rCS/CVE-2021-43857-POC
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
Github link:
https://github.com/G4sp4rCS/CVE-2021-43857-POC
GitHub
GitHub - G4sp4rCS/CVE-2021-43857-POC: Optimized exploit for CVE-2021-43857 affecting Gerapy < 0.9.8
Optimized exploit for CVE-2021-43857 affecting Gerapy < 0.9.8 - G4sp4rCS/CVE-2021-43857-POC
❤1
CVE-2023-30861
Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.
1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.
2. The application sets `session.permanent = True`
3. The application does not access or modify the session at any point during a request.
4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).
5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.
This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is ac
Github link:
https://github.com/fromitive/cve-2023-30861-poc
Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.
1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.
2. The application sets `session.permanent = True`
3. The application does not access or modify the session at any point during a request.
4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).
5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.
This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is ac
Github link:
https://github.com/fromitive/cve-2023-30861-poc
GitHub
GitHub - fromitive/cve-2023-30861-poc: Flask CVE-2023-30861 Poc 환경구축
Flask CVE-2023-30861 Poc 환경구축. Contribute to fromitive/cve-2023-30861-poc development by creating an account on GitHub.
❤1
CVE-2019-5420
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Github link:
https://github.com/sealldeveloper/CVE-2019-5420-PoC
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Github link:
https://github.com/sealldeveloper/CVE-2019-5420-PoC
GitHub
GitHub - sealldeveloper/CVE-2019-5420-PoC: A PoC of CVE-2019-5420 I made for PentesterLab
A PoC of CVE-2019-5420 I made for PentesterLab . Contribute to sealldeveloper/CVE-2019-5420-PoC development by creating an account on GitHub.