CVE-2023-2598
A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.
Github link:
https://github.com/SpongeBob-369/CVE-2023-2598
A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.
Github link:
https://github.com/SpongeBob-369/CVE-2023-2598
GitHub
GitHub - SpongeBob-369/CVE-2023-2598: The exploitation of CVE-2023-2598 about io_uring
The exploitation of CVE-2023-2598 about io_uring. Contribute to SpongeBob-369/CVE-2023-2598 development by creating an account on GitHub.
CVE-2024-4947
Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Github link:
https://github.com/DiabloX90911/CVE-2024-4947
Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Github link:
https://github.com/DiabloX90911/CVE-2024-4947
GitHub
GitHub - DiabloX90911/CVE-2024-4947: Explore CVE-2024-4947, a V8 type confusion bug, with analysis and PoCs. Join the discussion…
Explore CVE-2024-4947, a V8 type confusion bug, with analysis and PoCs. Join the discussion on GitHub! 🐙💻 - DiabloX90911/CVE-2024-4947
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
Github link:
https://github.com/Skac44/CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
Github link:
https://github.com/Skac44/CVE-2024-38063
GitHub
GitHub - Skac44/CVE-2024-38063
Contribute to Skac44/CVE-2024-38063 development by creating an account on GitHub.
CVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/Kamal-Hegazi/CVE-2025-29927-Next.js-Middleware-Authorization-Bypass
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Github link:
https://github.com/Kamal-Hegazi/CVE-2025-29927-Next.js-Middleware-Authorization-Bypass
GitHub
GitHub - Kamal-Hegazi/CVE-2025-29927-Next.js-Middleware-Authorization-Bypass: CVE‑2025‑29927 is a critical vulnerability (CVSS…
CVE‑2025‑29927 is a critical vulnerability (CVSS 9.1) in Next.js that allows attackers to bypass middleware‑based security checks. - Kamal-Hegazi/CVE-2025-29927-Next.js-Middleware-Authorization-Bypass
CVE-2025-30397
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
Github link:
https://github.com/B1ack4sh/Blackash-CVE-2025-30397
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
Github link:
https://github.com/B1ack4sh/Blackash-CVE-2025-30397
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-30397: CVE-2025-30397
CVE-2025-30397. Contribute to B1ack4sh/Blackash-CVE-2025-30397 development by creating an account on GitHub.
CVE-2024-6387
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/xiw1ll/CVE-2024-6387_Checker
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Github link:
https://github.com/xiw1ll/CVE-2024-6387_Checker
GitHub
GitHub - xiw1ll/CVE-2024-6387_Checker: Nuclei template to detect CVE-2024-6387. All latest patched versions are excluded.
Nuclei template to detect CVE-2024-6387. All latest patched versions are excluded. - xiw1ll/CVE-2024-6387_Checker
CVE-2021-45046
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
Github link:
https://github.com/ifconfig-me/Log4Shell-Payloads
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
Github link:
https://github.com/ifconfig-me/Log4Shell-Payloads
GitHub
GitHub - ifconfig-me/Log4Shell-Payloads: Log4Shell / Log4J Payload - CVE-2021-45046 and CVE-2022-42889
Log4Shell / Log4J Payload - CVE-2021-45046 and CVE-2022-42889 - ifconfig-me/Log4Shell-Payloads
CVE-2017-12637
None
Github link:
https://github.com/abrewer251/CVE-2017-12637_SAP-NetWeaver-URL-Traversal
None
Github link:
https://github.com/abrewer251/CVE-2017-12637_SAP-NetWeaver-URL-Traversal
GitHub
GitHub - abrewer251/CVE-2017-12637_SAP-NetWeaver-URL-Traversal: Proof-of-concept LFI Scanner: Automated detection of /etc/passwd…
Proof-of-concept LFI Scanner: Automated detection of /etc/passwd exposures via directory traversal and regex matching. - abrewer251/CVE-2017-12637_SAP-NetWeaver-URL-Traversal