CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Github link:
https://github.com/zanks08/cve-2023-44487-demo
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Github link:
https://github.com/zanks08/cve-2023-44487-demo
GitHub
GitHub - zanks08/cve-2023-44487-demo: Demo for detection and mitigation of HTTP/2 Rapid Reset vulnerability (CVE-2023-44487)
Demo for detection and mitigation of HTTP/2 Rapid Reset vulnerability (CVE-2023-44487) - zanks08/cve-2023-44487-demo
CVE-2024-49138
None
Github link:
https://github.com/CyprianAtsyor/letsdefend-cve-2024-49138-investigation
None
Github link:
https://github.com/CyprianAtsyor/letsdefend-cve-2024-49138-investigation
GitHub
GitHub - CyprianAtsyor/letsdefend-cve-2024-49138-investigation: Hands-on SOC investigation of CVE-2024-49138 using LetsDefend,…
Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT. - CyprianAtsyor/letsdefend-cve-2024-49138-investigation
CVE-2023-25157
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
Github link:
https://github.com/charis3306/CVE-2023-25157
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
Github link:
https://github.com/charis3306/CVE-2023-25157
GitHub
GitHub - charis3306/CVE-2023-25157: CVE-2023-25157 exp
CVE-2023-25157 exp. Contribute to charis3306/CVE-2023-25157 development by creating an account on GitHub.
CVE-2021-43857
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
Github link:
https://github.com/G4sp4rCS/CVE-2021-43857-POC
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
Github link:
https://github.com/G4sp4rCS/CVE-2021-43857-POC
GitHub
GitHub - G4sp4rCS/CVE-2021-43857-POC: Optimized exploit for CVE-2021-43857 affecting Gerapy < 0.9.8
Optimized exploit for CVE-2021-43857 affecting Gerapy < 0.9.8 - G4sp4rCS/CVE-2021-43857-POC
❤1
CVE-2023-30861
Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.
1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.
2. The application sets `session.permanent = True`
3. The application does not access or modify the session at any point during a request.
4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).
5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.
This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is ac
Github link:
https://github.com/fromitive/cve-2023-30861-poc
Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.
1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.
2. The application sets `session.permanent = True`
3. The application does not access or modify the session at any point during a request.
4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).
5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.
This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is ac
Github link:
https://github.com/fromitive/cve-2023-30861-poc
GitHub
GitHub - fromitive/cve-2023-30861-poc: Flask CVE-2023-30861 Poc 환경구축
Flask CVE-2023-30861 Poc 환경구축. Contribute to fromitive/cve-2023-30861-poc development by creating an account on GitHub.
❤1
CVE-2019-5420
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Github link:
https://github.com/sealldeveloper/CVE-2019-5420-PoC
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Github link:
https://github.com/sealldeveloper/CVE-2019-5420-PoC
GitHub
GitHub - sealldeveloper/CVE-2019-5420-PoC: A PoC of CVE-2019-5420 I made for PentesterLab
A PoC of CVE-2019-5420 I made for PentesterLab . Contribute to sealldeveloper/CVE-2019-5420-PoC development by creating an account on GitHub.
CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/becrevex/CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/becrevex/CVE-2023-41425
GitHub
GitHub - becrevex/CVE-2023-41425: WonderCMS v3.4.2 NSE Discovery Script
WonderCMS v3.4.2 NSE Discovery Script. Contribute to becrevex/CVE-2023-41425 development by creating an account on GitHub.
CVE-2016-2098
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Github link:
https://github.com/sealldeveloper/CVE-2016-2098-PoC
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Github link:
https://github.com/sealldeveloper/CVE-2016-2098-PoC
GitHub
GitHub - sealldeveloper/CVE-2016-2098-PoC: A PoC of CVE-2016-2098 I made for PentesterLab
A PoC of CVE-2016-2098 I made for PentesterLab . Contribute to sealldeveloper/CVE-2016-2098-PoC development by creating an account on GitHub.
CVE-2016-10033
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Github link:
https://github.com/sealldeveloper/CVE-2016-10033-PoC
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Github link:
https://github.com/sealldeveloper/CVE-2016-10033-PoC
GitHub
GitHub - sealldeveloper/CVE-2016-10033-PoC: A PoC of CVE-2016-10033 I made for PentesterLab
A PoC of CVE-2016-10033 I made for PentesterLab . Contribute to sealldeveloper/CVE-2016-10033-PoC development by creating an account on GitHub.
CVE-2018-0114
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
Github link:
https://github.com/sealldeveloper/CVE-2018-0114-PoC
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
Github link:
https://github.com/sealldeveloper/CVE-2018-0114-PoC
GitHub
GitHub - sealldeveloper/CVE-2018-0114-PoC: A PoC of CVE-2018-0114 I made for PentesterLab
A PoC of CVE-2018-0114 I made for PentesterLab. Contribute to sealldeveloper/CVE-2018-0114-PoC development by creating an account on GitHub.
CVE-2023-1389
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Github link:
https://github.com/ibrahimsql/CVE2023-1389
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Github link:
https://github.com/ibrahimsql/CVE2023-1389
GitHub
GitHub - ibrahimsql/CVE2023-1389: TP-Link Archer AX21 Command Injection Exploit (CVE-2023-1389) This script exploits a command…
TP-Link Archer AX21 Command Injection Exploit (CVE-2023-1389) This script exploits a command injection vulnerability in TP-Link Archer AX21 routers through the unvalidated 'country'...