CVE-2019-5420
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Github link:
https://github.com/sealldeveloper/CVE-2019-5420-PoC
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Github link:
https://github.com/sealldeveloper/CVE-2019-5420-PoC
GitHub
GitHub - sealldeveloper/CVE-2019-5420-PoC: A PoC of CVE-2019-5420 I made for PentesterLab
A PoC of CVE-2019-5420 I made for PentesterLab . Contribute to sealldeveloper/CVE-2019-5420-PoC development by creating an account on GitHub.
CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/becrevex/CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Github link:
https://github.com/becrevex/CVE-2023-41425
GitHub
GitHub - becrevex/CVE-2023-41425: WonderCMS v3.4.2 NSE Discovery Script
WonderCMS v3.4.2 NSE Discovery Script. Contribute to becrevex/CVE-2023-41425 development by creating an account on GitHub.
CVE-2016-2098
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Github link:
https://github.com/sealldeveloper/CVE-2016-2098-PoC
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Github link:
https://github.com/sealldeveloper/CVE-2016-2098-PoC
GitHub
GitHub - sealldeveloper/CVE-2016-2098-PoC: A PoC of CVE-2016-2098 I made for PentesterLab
A PoC of CVE-2016-2098 I made for PentesterLab . Contribute to sealldeveloper/CVE-2016-2098-PoC development by creating an account on GitHub.
CVE-2016-10033
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Github link:
https://github.com/sealldeveloper/CVE-2016-10033-PoC
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Github link:
https://github.com/sealldeveloper/CVE-2016-10033-PoC
GitHub
GitHub - sealldeveloper/CVE-2016-10033-PoC: A PoC of CVE-2016-10033 I made for PentesterLab
A PoC of CVE-2016-10033 I made for PentesterLab . Contribute to sealldeveloper/CVE-2016-10033-PoC development by creating an account on GitHub.
CVE-2018-0114
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
Github link:
https://github.com/sealldeveloper/CVE-2018-0114-PoC
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
Github link:
https://github.com/sealldeveloper/CVE-2018-0114-PoC
GitHub
GitHub - sealldeveloper/CVE-2018-0114-PoC: A PoC of CVE-2018-0114 I made for PentesterLab
A PoC of CVE-2018-0114 I made for PentesterLab. Contribute to sealldeveloper/CVE-2018-0114-PoC development by creating an account on GitHub.
CVE-2023-1389
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Github link:
https://github.com/ibrahimsql/CVE2023-1389
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Github link:
https://github.com/ibrahimsql/CVE2023-1389
GitHub
GitHub - ibrahimsql/CVE2023-1389: TP-Link Archer AX21 Command Injection Exploit (CVE-2023-1389) This script exploits a command…
TP-Link Archer AX21 Command Injection Exploit (CVE-2023-1389) This script exploits a command injection vulnerability in TP-Link Archer AX21 routers through the unvalidated 'country'...
CVE-2021-42287
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291.
Github link:
https://github.com/DanielFEXKEX/CVE-Scanner
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291.
Github link:
https://github.com/DanielFEXKEX/CVE-Scanner
GitHub
GitHub - DanielFEXKEX/CVE-Scanner: CVE-2021-42287/CVE-2021-42278/OTHER Scanner & Exploiter.
CVE-2021-42287/CVE-2021-42278/OTHER Scanner & Exploiter. - DanielFEXKEX/CVE-Scanner
CVE-2019-19781
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
Github link:
https://github.com/hyunjin0334/CVE-2019-19781
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
Github link:
https://github.com/hyunjin0334/CVE-2019-19781
GitHub
GitHub - hyunjin0334/CVE-2019-19781: Whitehat school_Docker assignement_CVE-2019-19781_PoC
Whitehat school_Docker assignement_CVE-2019-19781_PoC - hyunjin0334/CVE-2019-19781
CVE-2022-42092
Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via 'themes' that allows attackers to Remote Code Execution.
Github link:
https://github.com/ajdumanhug/CVE-2022-42092
Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via 'themes' that allows attackers to Remote Code Execution.
Github link:
https://github.com/ajdumanhug/CVE-2022-42092
GitHub
GitHub - ajdumanhug/CVE-2022-42092: CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution…
CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution (RCE) - ajdumanhug/CVE-2022-42092
CVE-2017-7529
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
Github link:
https://github.com/portfolio10/nginx
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
Github link:
https://github.com/portfolio10/nginx
GitHub
GitHub - portfolio10/nginx: cve-2017-7529
cve-2017-7529. Contribute to portfolio10/nginx development by creating an account on GitHub.
CVE-2024-27956
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
Github link:
https://github.com/m4nInTh3mIdDle/wordpress-CVE-2024-27956
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
Github link:
https://github.com/m4nInTh3mIdDle/wordpress-CVE-2024-27956
GitHub
GitHub - m4nInTh3mIdDle/wordpress-CVE-2024-27956: Attacks a vulnerable WordPress site with the wp-automatic plugin. Inserts a…
Attacks a vulnerable WordPress site with the wp-automatic plugin. Inserts a new user called eviladmin directly into the database (INSERT INTO wp_users). Searches for the ID of the newly created...
CVE-2021-43798
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
Github link:
https://github.com/suljov/Grafana-LFI-exploit
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
Github link:
https://github.com/suljov/Grafana-LFI-exploit
GitHub
GitHub - suljov/Grafana-LFI-exploit: Updated exploit script for the CVE-2021-43798
Updated exploit script for the CVE-2021-43798 . Contribute to suljov/Grafana-LFI-exploit development by creating an account on GitHub.
CVE-2022-3552
Unrestricted Upload of File with Dangerous Type in GitHub repository boxbilling/boxbilling prior to 0.0.1.
Github link:
https://github.com/BakalMode/CVE-2022-3552
Unrestricted Upload of File with Dangerous Type in GitHub repository boxbilling/boxbilling prior to 0.0.1.
Github link:
https://github.com/BakalMode/CVE-2022-3552
GitHub
GitHub - BakalMode/CVE-2022-3552: CVE-2022-3552 RCE with explanation
CVE-2022-3552 RCE with explanation. Contribute to BakalMode/CVE-2022-3552 development by creating an account on GitHub.