Exploits from Github
537 subscribers
1 photo
624 files
3.56K links
Download Telegram
CVE-2025-24813.zip
284.4 KB
CVE-2025-24813
Author: brs6412

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious u...
CVE-2025-31161.zip
2.5 KB
CVE-2025-31161
Author: acan0007

CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to loginuserpass() with no password requirement. This will authenticate the session through the HMAC verification process and up until the server checks for user verification once more. The vulnerability can be further stabilized, eliminating the need for successfully triggering a race condition, by sending a mangled AWS4-HMAC header. By providing only the username and a following slash (/), the server will successfully find a username...
CVE-2019-3396.zip
88.5 KB
CVE-2019-3396
Author: kh4sh3i

The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.

GitHub Link:
https://github.com/kh4sh3i/CVE-2019-3396
CVE-2018-20062.zip
24.6 KB
CVE-2018-20062
Author: shenhui35

An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.

GitHub Link:
https://github.com/shenhui35/RedArrow
CVE-2025-3248.zip
2.8 KB
CVE-2025-3248
Author: EQSTLab

Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.

GitHub Link:
https://github.com/EQSTLab/CVE-2025-3248
CVE-2025-27210.zip
13.2 KB
CVE-2025-27210
Author: mindeddu

An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX.

This vulnerability affects Windows users of path.join API.

GitHub Link:
https://github.com/mindeddu/Vulnerable-CVE-2025-27210
CVE-2014-6287.zip
14.8 KB
CVE-2014-6287
Author: nika0x38

The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.

GitHub Link:
https://github.com/nika0x38/CVE-2014-6287
CVE-2025-24799.zip
7.2 KB
CVE-2025-24799
Author: airbus-cert

GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18.

GitHub Link:
https://github.com/airbus-cert/CVE-2025-24799-scanner
CVE-2023-5612.zip
7.3 KB
CVE-2023-5612
Author: mad3E7cat

An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled.

GitHub Link:
https://github.com/mad3E7cat/CVE-2023-5612
CVE-2024-1709.zip
6.9 KB
CVE-2024-1709
Author: Teexo

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel

vulnerability, which may allow an attacker direct access to confidential information or

critical systems.



GitHub Link:
https://github.com/Teexo/ScreenConnect-CVE-2024-1709-Exploit
CVE-2025-3248.zip
3.1 KB
CVE-2025-3248
Author: wand3rlust

Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.

GitHub Link:
https://github.com/wand3rlust/CVE-2025-3248
CVE-2025-29927.zip
152.4 KB
CVE-2025-29927
Author: adjscent

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

GitHub Link:
https://github.com/adjscent/vulnerable-nextjs-14-CVE-2025-29927