Exploits from Github
537 subscribers
1 photo
620 files
3.56K links
Download Telegram
CVE-2025-32432.zip
11.2 KB
CVE-2025-32432
Author: bambooqj

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.

GitHub Link:
https://github.com/bambooqj/CVE-2025-32432
CVE-2025-29927.zip
14.5 KB
CVE-2025-29927
Author: sermikr0

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

GitHub Link:
https://github.com/sermikr0/nextjs-middleware-auth-bypass
CVE-2025-32463.zip
63.9 KB
CVE-2025-32463
Author: no-speech-to-text

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

GitHub Link:
https://github.com/no-speech-to-text/CVE-2025-32463
CVE-2025-25257.zip
5.3 KB
CVE-2025-25257
Author: kityzed2003

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability CWE-89 in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.

GitHub Link:
https://github.com/kityzed2003/CVE-2025-25257
CVE-2025-48799.zip
298.5 KB
CVE-2025-48799
Author: ukisshinaah

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

GitHub Link:
https://github.com/ukisshinaah/CVE-2025-48799
CVE-2015-6668.zip
15.8 KB
CVE-2015-6668
Author: nika0x38

The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary CV files via a brute force attack to the WordPress upload directory structure, related to an insecure direct object reference.

GitHub Link:
https://github.com/nika0x38/CVE-2015-6668
CVE-2025-0133.zip
1.5 KB
CVE-2025-0133
Author: adhamelhansye

A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.

There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal.



For GlobalProtect users with Clientless VPN enabled, there is a limi...
CVE-2025-32463.zip
3.5 KB
CVE-2025-32463
Author: nelissandro

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

GitHub Link:
https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape
CVE-2025-34100
Author: hyeonyeonglee

An unrestricted file upload vulnerability exists in BuilderEngine 3.5.0 via the integration of the elFinder 2.0 file manager and its use of the jQuery File Upload plugin. The plugin fails to properly validate or restrict file types or locations during upload operations, allowing an attacker to upload a malicious .php file and subsequently execute arbitrary PHP code on the server under the context of the web server process. While the root vulnerability lies within the jQuery File Upload component, BuilderEngine’s improper integration and lack of access controls expose this functionality to unauthenticated users, resulting in full remote code execution.

GitHub Link:
https://github.com/hyeonyeonglee/CVE-2025-34100
CVE-2025-32433
Author: mirmeweu

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

GitHub Link:
https://github.com/mirmeweu/cve-2025-32433
CVE-2018-7600
Author: tea-celikik

Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

GitHub Link:
https://github.com/tea-celikik/Drupal-Exploit-Lab