CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/SerpilRivas/log4shell-homework9
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Github link:
https://github.com/SerpilRivas/log4shell-homework9
GitHub
GitHub - SerpilRivas/log4shell-homework9: Log4Shell (CVE-2021-44228) exploit demo for SEAS 8405. Includes a vulnerable Spring Boot…
Log4Shell (CVE-2021-44228) exploit demo for SEAS 8405. Includes a vulnerable Spring Boot app, fake LDAP server, Docker setup, MITRE mapping, incident response, and a full screen recording. - Serpil...
CVE-2025-3248
Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.
Github link:
https://github.com/Vip3rLi0n/CVE-2025-3248
Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.
Github link:
https://github.com/Vip3rLi0n/CVE-2025-3248
GitHub
GitHub - Vip3rLi0n/CVE-2025-3248: Perform Remote Code Execution using vulnerable API endpoint.
Perform Remote Code Execution using vulnerable API endpoint. - Vip3rLi0n/CVE-2025-3248
CVE-1999-0524
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Github link:
https://github.com/Ransc0rp1on/ICMP-Timestamp-POC
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Github link:
https://github.com/Ransc0rp1on/ICMP-Timestamp-POC
GitHub
GitHub - Ransc0rp1on/ICMP-Timestamp-POC: A reconnaissance tool to detect CVE-1999-0524 (ICMP Timestamp Disclosure) by automating…
A reconnaissance tool to detect CVE-1999-0524 (ICMP Timestamp Disclosure) by automating timestamp extraction via nping or hping3. Converts raw ICMP timestamps into human-readable remote system time...
CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/LOOKY243/CVE-2025-24071-PoC
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/LOOKY243/CVE-2025-24071-PoC
GitHub
GitHub - LOOKY243/CVE-2025-24071-PoC: CVE-2025-24071 Proof Of Concept
CVE-2025-24071 Proof Of Concept. Contribute to LOOKY243/CVE-2025-24071-PoC development by creating an account on GitHub.
CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/ex-cal1bur/SMB_CVE-2025-24071
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Github link:
https://github.com/ex-cal1bur/SMB_CVE-2025-24071
GitHub
GitHub - ex-cal1bur/SMB_CVE-2025-24071: Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using…
Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures t...
CVE-2024-28995
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Github link:
https://github.com/ibrahimsql/CVE-2024-28995
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Github link:
https://github.com/ibrahimsql/CVE-2024-28995
GitHub
GitHub - ibrahimsql/CVE-2024-28995: SolarWinds Serv-U Directory Traversal
SolarWinds Serv-U Directory Traversal. Contribute to ibrahimsql/CVE-2024-28995 development by creating an account on GitHub.
CVE-2018-8097
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
Github link:
https://github.com/StellarDriftLabs/CVE-2018-8097-PoC
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
Github link:
https://github.com/StellarDriftLabs/CVE-2018-8097-PoC
GitHub
GitHub - StellarDriftLabs/CVE-2018-8097-PoC: POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and…
POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method. - StellarDriftLabs/CVE-2018-8097-PoC
CVE-2017-9248
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
Github link:
https://github.com/0xsharz/telerik-scanner-cve-2017-9248
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
Github link:
https://github.com/0xsharz/telerik-scanner-cve-2017-9248
GitHub
GitHub - 0xsharz/telerik-scanner-cve-2017-9248: Telerik CVE-2017-9248 Vulnerability Scanner
Telerik CVE-2017-9248 Vulnerability Scanner. Contribute to 0xsharz/telerik-scanner-cve-2017-9248 development by creating an account on GitHub.
CVE-2024-49138
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Github link:
https://github.com/Humbug52542/DLang-file-encryptor
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Github link:
https://github.com/Humbug52542/DLang-file-encryptor
GitHub
GitHub - Humbug52542/DLang-file-encryptor: This is my biggest project yet: a DLang file encryptor that escalates privileges using…
This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender. - Humbug52542/DLang-file-encryptor
CVE-2021-22911
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
Github link:
https://github.com/octodi/CVE-2021-22911
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
Github link:
https://github.com/octodi/CVE-2021-22911
GitHub
GitHub - octodi/CVE-2021-22911: Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated))
Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated)) - octodi/CVE-2021-22911
CVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927
GitHub
GitHub - SugiB3o/vulnerable-nextjs-14-CVE-2025-29927: vulnerable-nextjs-14-CVE-2025-29927
vulnerable-nextjs-14-CVE-2025-29927. Contribute to SugiB3o/vulnerable-nextjs-14-CVE-2025-29927 development by creating an account on GitHub.