Exploits from Github
537 subscribers
1 photo
616 files
3.55K links
Download Telegram
CVE-2023-1545.zip
552.1 KB
CVE-2023-1545
Author: lineeralgebra

SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.

GitHub Link:
https://github.com/lineeralgebra/CVE-2023-1545-POC
CVE-2018-7600.zip
19.2 KB
CVE-2018-7600
Author: nika0x38

Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

GitHub Link:
https://github.com/nika0x38/CVE-2018-7600
CVE-2020-0796.zip
407.3 KB
CVE-2020-0796
Author: Jagadeesh7532

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

GitHub Link:
https://github.com/Jagadeesh7532/-CVE-2020-0796-SMBGhost-Windows-10-SMBv3-Remote-Code-Execution-Vulnerability
CVE-2025-34152.zip
5 KB
CVE-2025-34152
Author: kh4sh3i

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

GitHub Link:
https://github.com/kh4sh3i/CVE-2025-34152
CVE-2023-20048.zip
4.3 KB
CVE-2023-20048
Author: oguzhanozuzun301

A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.

GitHub Link:
https://github.com/oguzhanozuzun301/cisco-rv-rce-poc
CVE-2023-20048.zip
4.3 KB
CVE-2023-20048
Author: oguzhanozuzun301

A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.

GitHub Link:
https://github.com/oguzhanozuzun301/cisco-rv-rce-poc
CVE-2025-25257.zip
5.3 KB
CVE-2025-25257
Author: kityzed2003

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability CWE-89 in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.

GitHub Link:
https://github.com/kityzed2003/CVE-2025-25257
CVE-2025-48799.zip
298.5 KB
CVE-2025-48799
Author: ukisshinaah

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

GitHub Link:
https://github.com/ukisshinaah/CVE-2025-48799
CVE-2015-6668.zip
15.8 KB
CVE-2015-6668
Author: nika0x38

The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary CV files via a brute force attack to the WordPress upload directory structure, related to an insecure direct object reference.

GitHub Link:
https://github.com/nika0x38/CVE-2015-6668
CVE-2025-32432.zip
11.2 KB
CVE-2025-32432
Author: bambooqj

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.

GitHub Link:
https://github.com/bambooqj/CVE-2025-32432
CVE-2025-29927.zip
14.5 KB
CVE-2025-29927
Author: sermikr0

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

GitHub Link:
https://github.com/sermikr0/nextjs-middleware-auth-bypass