CVE-2025-24203
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system.
Github link:
https://github.com/pxx917144686/iDevice_ZH
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system.
Github link:
https://github.com/pxx917144686/iDevice_ZH
GitHub
GitHub - pxx917144686/iDevice_ZH: CVE-2025-24203漏洞
CVE-2025-24203漏洞. Contribute to pxx917144686/iDevice_ZH development by creating an account on GitHub.
CVE-2024-42008
A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
Github link:
https://github.com/Foxer131/CVE-2024-42008-9-exploit
A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
Github link:
https://github.com/Foxer131/CVE-2024-42008-9-exploit
GitHub
GitHub - Foxer131/CVE-2024-42008-9-exploit: The scripts in this repository are made to abuse CVE-2024-42008 and CVE-2024-42009.…
The scripts in this repository are made to abuse CVE-2024-42008 and CVE-2024-42009. Both of these CVEs are vulnerabilities found on Roundcube 1.6.7 - Foxer131/CVE-2024-42008-9-exploit
CVE-2025-22457
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Github link:
https://github.com/TRone-ux/CVE-2025-22457
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Github link:
https://github.com/TRone-ux/CVE-2025-22457
GitHub
GitHub - TRone-ux/CVE-2025-22457: PoC CVE-2025-22457
PoC CVE-2025-22457. Contribute to TRone-ux/CVE-2025-22457 development by creating an account on GitHub.
CVE-2024-0204
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Github link:
https://github.com/ibrahimsql/CVE-2024-0204
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Github link:
https://github.com/ibrahimsql/CVE-2024-0204
GitHub
GitHub - ibrahimsql/CVE-2024-0204: CVE-2024-0204 was discovered in January 2024 and affects all GoAnywhere MFT versions prior to…
CVE-2024-0204 was discovered in January 2024 and affects all GoAnywhere MFT versions prior to 7.4.1. This vulnerability has been rated as Critical (CVSS 9.8) due to its ease of exploitation and the...
CVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/sagsooz/CVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/sagsooz/CVE-2025-29927
GitHub
GitHub - sagsooz/CVE-2025-29927: 🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability.…
🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more. - sagsooz/CVE-2025-29927
CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/f4dee-backup/CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/f4dee-backup/CVE-2025-24071
GitHub
GitHub - f4dee-backup/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 - f4dee-backup/CVE-2025-24071
CVE-2025-4664
Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
Github link:
https://github.com/Leviticus-Triage/ChromSploit-Framework
Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
Github link:
https://github.com/Leviticus-Triage/ChromSploit-Framework
GitHub
GitHub - Leviticus-Triage/ChromSploit-Framework: Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 &…
Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 | - GitHub - Leviticus-Triage/ChromSploit-Framework: Advance...
CVE-2024-38014
Windows Installer Elevation of Privilege Vulnerability
Github link:
https://github.com/Naman2701B/DLL-for-2024-38014
Windows Installer Elevation of Privilege Vulnerability
Github link:
https://github.com/Naman2701B/DLL-for-2024-38014
CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/SerpilRivas/log4shell-homework9
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/SerpilRivas/log4shell-homework9
GitHub
GitHub - SerpilRivas/log4shell-homework9: Log4Shell (CVE-2021-44228) exploit demo for SEAS 8405. Includes a vulnerable Spring Boot…
Log4Shell (CVE-2021-44228) exploit demo for SEAS 8405. Includes a vulnerable Spring Boot app, fake LDAP server, Docker setup, MITRE mapping, incident response, and a full screen recording. - Serpil...
CVE-2025-3248
Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.
Github link:
https://github.com/Vip3rLi0n/CVE-2025-3248
Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.
Github link:
https://github.com/Vip3rLi0n/CVE-2025-3248
GitHub
GitHub - Vip3rLi0n/CVE-2025-3248: Perform Remote Code Execution using vulnerable API endpoint.
Perform Remote Code Execution using vulnerable API endpoint. - Vip3rLi0n/CVE-2025-3248
CVE-1999-0524
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Github link:
https://github.com/Ransc0rp1on/ICMP-Timestamp-POC
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Github link:
https://github.com/Ransc0rp1on/ICMP-Timestamp-POC
GitHub
GitHub - Ransc0rp1on/ICMP-Timestamp-POC: A reconnaissance tool to detect CVE-1999-0524 (ICMP Timestamp Disclosure) by automating…
A reconnaissance tool to detect CVE-1999-0524 (ICMP Timestamp Disclosure) by automating timestamp extraction via nping or hping3. Converts raw ICMP timestamps into human-readable remote system time...
CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/LOOKY243/CVE-2025-24071-PoC
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/LOOKY243/CVE-2025-24071-PoC
GitHub
GitHub - LOOKY243/CVE-2025-24071-PoC: CVE-2025-24071 Proof Of Concept
CVE-2025-24071 Proof Of Concept. Contribute to LOOKY243/CVE-2025-24071-PoC development by creating an account on GitHub.
CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/ex-cal1bur/SMB_CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/ex-cal1bur/SMB_CVE-2025-24071
GitHub
GitHub - ex-cal1bur/SMB_CVE-2025-24071: Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using…
Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures t...