CVE-2025-49493
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
Github link:
https://github.com/SystemVll/CVE-2025-49493
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
Github link:
https://github.com/SystemVll/CVE-2025-49493
GitHub
GitHub - SystemVll/CVE-2025-49493: This is a Python-based exploit for **CVE-2025-49493**, which affects Akamai CloudTest versions…
This is a Python-based exploit for **CVE-2025-49493**, which affects Akamai CloudTest versions before 60 2025.06.02 (12988). The vulnerability allows for XML External Entity (XXE) injection through...
CVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/mickhacking/thank-u-next
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/mickhacking/thank-u-next
GitHub
GitHub - mickhacking/Thank-u-Next: CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability…
CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit - mickhacking/Thank-u-Next
CVE-2023-5360
The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
Github link:
https://github.com/X3RX3SSec/CVE-2023-5360
The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
Github link:
https://github.com/X3RX3SSec/CVE-2023-5360
GitHub
GitHub - X3RX3SSec/CVE-2023-5360: Royal Elementor Addons - Unauthenticated Remote Code Execution
Royal Elementor Addons - Unauthenticated Remote Code Execution - X3RX3SSec/CVE-2023-5360
CVE-2025-32463
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Github link:
https://github.com/dbarquero/cve-2025-32463-lab
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Github link:
https://github.com/dbarquero/cve-2025-32463-lab
GitHub
GitHub - dbarquero/cve-2025-32463-lab: Educational Docker lab to simulate privilege escalation via CVE-2025-32463
Educational Docker lab to simulate privilege escalation via CVE-2025-32463 - dbarquero/cve-2025-32463-lab
❤1
CVE-2025-27591
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Github link:
https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Github link:
https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
GitHub
GitHub - dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591: CVE-2025-27591 is a known privilege escalation vulnerability…
CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0) - dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
CVE-2025-27591
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Github link:
https://github.com/DarksBlackSk/CVE-2025-27591-Proof-Of-Concept
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Github link:
https://github.com/DarksBlackSk/CVE-2025-27591-Proof-Of-Concept
GitHub
GitHub - DarksBlackSk/CVE-2025-27591-Proof-Of-Concept: CVE-2025-27591
CVE-2025-27591. Contribute to DarksBlackSk/CVE-2025-27591-Proof-Of-Concept development by creating an account on GitHub.
CVE-2025-5777
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Github link:
https://github.com/SleepNotF0und/CVE-2025-5777
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Github link:
https://github.com/SleepNotF0und/CVE-2025-5777
GitHub
GitHub - SleepNotF0und/CVE-2025-5777: CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway]
CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway] - SleepNotF0und/CVE-2025-5777
CVE-2025-32463
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Github link:
https://github.com/9Insomnie/CVE-2025-32463
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Github link:
https://github.com/9Insomnie/CVE-2025-32463
GitHub
GitHub - 9Insomnie/CVE-2025-32463: CVE-2025-32463 漏洞概念验证
CVE-2025-32463 漏洞概念验证. Contribute to 9Insomnie/CVE-2025-32463 development by creating an account on GitHub.
CVE-2016-0792
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
Github link:
https://github.com/gonn4cry/CVE-2016-0792
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
Github link:
https://github.com/gonn4cry/CVE-2016-0792
GitHub
GitHub - gonn4cry/CVE-2016-0792: CVE-2016-0792 Exploit By XBOW AI
CVE-2016-0792 Exploit By XBOW AI. Contribute to gonn4cry/CVE-2016-0792 development by creating an account on GitHub.
CVE-2024-4577
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Github link:
https://github.com/Skycritch/CVE-2024-4577
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Github link:
https://github.com/Skycritch/CVE-2024-4577
GitHub
GitHub - Skycritch/CVE-2024-4577: Exploit for php-cgi
Exploit for php-cgi. Contribute to Skycritch/CVE-2024-4577 development by creating an account on GitHub.
CVE-2023-2640
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
Github link:
https://github.com/filippo-zullo98/phpMyAdmin-RCE-Exploit-Lab
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
Github link:
https://github.com/filippo-zullo98/phpMyAdmin-RCE-Exploit-Lab
GitHub
GitHub - filippo-zullo98/phpMyAdmin-RCE-Exploit-Lab: Dimostrazione di una vulnerabilità RCE (Remote Code Execution) in phpMyAdmin…
Dimostrazione di una vulnerabilità RCE (Remote Code Execution) in phpMyAdmin 4.8.1, con exploit per reverse shell e analisi di privilege escalation tramite la vulnerabilità CVE-2023-2640/CVE-2023-3...
CVE-2025-32463
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Github link:
https://github.com/MohamedKarrab/CVE-2025-32463
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Github link:
https://github.com/MohamedKarrab/CVE-2025-32463
GitHub
GitHub - MohamedKarrab/CVE-2025-32463: Privilege escalation to root using sudo chroot, NO NEED for gcc installed.
Privilege escalation to root using sudo chroot, NO NEED for gcc installed. - MohamedKarrab/CVE-2025-32463
CVE-2025-47812
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Github link:
https://github.com/rxerium/CVE-2025-47812
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Github link:
https://github.com/rxerium/CVE-2025-47812
GitHub
GitHub - rxerium/CVE-2025-47812: Detection for CVE-2025-47812
Detection for CVE-2025-47812. Contribute to rxerium/CVE-2025-47812 development by creating an account on GitHub.
CVE-2025-27210
None
Github link:
https://github.com/absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit
None
Github link:
https://github.com/absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit
GitHub
GitHub - absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit: (PoC) CVE-2025-27210, a precise Path Traversal vulnerability…
(PoC) CVE-2025-27210, a precise Path Traversal vulnerability affecting Node.js applications running on Microsoft Windows. This vulnerability leverages the specific way Windows handles reserved devi...