CVE-2025-24813
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial
Github link:
https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial
Github link:
https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC
GitHub
GitHub - sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC: Proof of Concept for CVE-2025-24813, a Remote Code Execution vulnerability…
Proof of Concept for CVE-2025-24813, a Remote Code Execution vulnerability in Apache Tomcat. This PoC exploits unsafe deserialization via crafted session files uploaded through HTTP PUT requests, a...
CVE-2011-2523
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Github link:
https://github.com/krill-x7/CVE-2011-2523
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Github link:
https://github.com/krill-x7/CVE-2011-2523
GitHub
GitHub - krill-x7/CVE-2011-2523: Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution - GitHub - krill-x7/CVE-2011-2523: Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
CVE-2025-24201
None
Github link:
https://github.com/The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-
None
Github link:
https://github.com/The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-
GitHub
GitHub - The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-: CVE-2025-24201 WebKit Vulnerability Detector (PoC)
CVE-2025-24201 WebKit Vulnerability Detector (PoC) - The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-
CVE-2025-34085
An unrestricted file upload vulnerability in the WordPress Simple File List plugin prior to version 4.2.3 allows unauthenticated remote attackers to achieve remote code execution. The plugin's upload endpoint (ee-upload-engine.php) restricts file uploads based on extension, but lacks proper validation after file renaming. An attacker can first upload a PHP payload disguised as a .png file, then use the plugin’s ee-file-engine.php rename functionality to change the extension to .php. This bypasses upload restrictions and results in the uploaded payload being executable on the server.
Github link:
https://github.com/ill-deed/CVE-2025-34085-Multi-target
An unrestricted file upload vulnerability in the WordPress Simple File List plugin prior to version 4.2.3 allows unauthenticated remote attackers to achieve remote code execution. The plugin's upload endpoint (ee-upload-engine.php) restricts file uploads based on extension, but lacks proper validation after file renaming. An attacker can first upload a PHP payload disguised as a .png file, then use the plugin’s ee-file-engine.php rename functionality to change the extension to .php. This bypasses upload restrictions and results in the uploaded payload being executable on the server.
Github link:
https://github.com/ill-deed/CVE-2025-34085-Multi-target
GitHub
GitHub - ill-deed/CVE-2025-34085-Multi-target: Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress…
Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets. - ill-deed/CVE-2025-3...
CVE-2025-22457
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Github link:
https://github.com/B1ack4sh/Blackash-CVE-2025-22457
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Github link:
https://github.com/B1ack4sh/Blackash-CVE-2025-22457
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-22457: CVE-2025-22457
CVE-2025-22457. Contribute to B1ack4sh/Blackash-CVE-2025-22457 development by creating an account on GitHub.
CVE-2022-46689
A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
Github link:
https://github.com/daviszhto/overwrite
A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
Github link:
https://github.com/daviszhto/overwrite
GitHub
daviszhto/overwrite
Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. - daviszhto/overwrite
CVE-2025-27591
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Github link:
https://github.com/BridgerAlderson/CVE-2025-27591-PoC
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Github link:
https://github.com/BridgerAlderson/CVE-2025-27591-PoC
GitHub
GitHub - BridgerAlderson/CVE-2025-27591-PoC: CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service…
CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0 - BridgerAlderson/CVE-2025-27591-PoC
CVE-2025-31125
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
Github link:
https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
Github link:
https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-
GitHub
GitHub - harshgupptaa/Path-Transversal-CVE-2025-31125-: Vite is a frontend tooling framework for javascript. Vite exposes content…
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the ...
CVE-2015-8562
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Github link:
https://github.com/Anonydra/joomla-1.5-3.4.5-rce
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Github link:
https://github.com/Anonydra/joomla-1.5-3.4.5-rce
GitHub
GitHub - Anonydra/joomla-1.5-3.4.5-rce: Modified PoC exploit demonstrating remote code execution via object injection vulnerability…
Modified PoC exploit demonstrating remote code execution via object injection vulnerability in Joomla! 1.5.0 through 3.4.5 (CVE-2015-8562). - Anonydra/joomla-1.5-3.4.5-rce
CVE-2023-30258
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
Github link:
https://github.com/AdityaBhatt3010/TryHackMe-Room-Walkthrough-Billing
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
Github link:
https://github.com/AdityaBhatt3010/TryHackMe-Room-Walkthrough-Billing
GitHub
GitHub - AdityaBhatt3010/TryHackMe-Room-Walkthrough-Billing: A detailed semi-professional walkthrough of TryHackMe's Billing room…
A detailed semi-professional walkthrough of TryHackMe's Billing room exploiting CVE-2023-30258 and escalating via fail2ban misconfig - AdityaBhatt3010/TryHackMe-Room-Walkthrough-Billing
CVE-2017-0143
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/Cedric-Martz/EthernalBlue_report
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Github link:
https://github.com/Cedric-Martz/EthernalBlue_report
GitHub
GitHub - Cedric-Martz/EthernalBlue_report: This is a security assessment report regarding the EthernalBlue vulnerability (CVE-2017…
This is a security assessment report regarding the EthernalBlue vulnerability (CVE-2017-0143). - Cedric-Martz/EthernalBlue_report
CVE-2025-24016
Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.
Github link:
https://github.com/guinea-offensive-security/Wazuh-RCE
Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.
Github link:
https://github.com/guinea-offensive-security/Wazuh-RCE
GitHub
GitHub - guinea-offensive-security/Wazuh-RCE: Wazuh 8.4 CVE-2025-24016
Wazuh 8.4 CVE-2025-24016. Contribute to guinea-offensive-security/Wazuh-RCE development by creating an account on GitHub.
CVE-2025-48827
vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
Github link:
https://github.com/SystemVll/CVE-2025-48827
vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
Github link:
https://github.com/SystemVll/CVE-2025-48827
GitHub
GitHub - SystemVll/CVE-2025-48827: This repository contains a proof-of-concept exploit for CVE-2025-48827, a critical authentication…
This repository contains a proof-of-concept exploit for CVE-2025-48827, a critical authentication bypass vulnerability affecting vBulletin 5.0.0–5.7.5 and 6.0.0–6.0.3 when running on PHP 8.1 or lat...