CVE-2021-42013.zip
6.9 KB
CVE-2021-42013
Author: drackyjr
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
GitHub Link:
https://github.com/drackyjr/CVE-2021-42013
Author: drackyjr
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
GitHub Link:
https://github.com/drackyjr/CVE-2021-42013
CVE-2025-27591.zip
2.8 KB
CVE-2025-27591
Author: 0x00Jeff
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
GitHub Link:
https://github.com/0x00Jeff/CVE-2025-27591
Author: 0x00Jeff
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
GitHub Link:
https://github.com/0x00Jeff/CVE-2025-27591
CVE-2021-43008.zip
3.6 KB
CVE-2021-43008
Author: DaturaSaturated
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
GitHub Link:
https://github.com/DaturaSaturated/Adminer-CVE-2021-43008
Author: DaturaSaturated
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
GitHub Link:
https://github.com/DaturaSaturated/Adminer-CVE-2021-43008
CVE-2025-3248.zip
9 KB
CVE-2025-3248
Author: drackyjr
Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.
GitHub Link:
https://github.com/drackyjr/cve-2025-3248-exploit
Author: drackyjr
Langflow versions prior to 1.3.0 are susceptible to code injection in
the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary
code.
GitHub Link:
https://github.com/drackyjr/cve-2025-3248-exploit
CVE-2022-22965.zip
5.4 KB
CVE-2022-22965
Author: mylo-2001
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
GitHub Link:
https://github.com/mylo-2001/GhostStrike
Author: mylo-2001
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
GitHub Link:
https://github.com/mylo-2001/GhostStrike
CVE-2025-53772
Author: SleepNotF0und
None
GitHub Link:
https://github.com/SleepNotF0und/CVE-2025-53772-IIS-WebDeploy-RCE-POC
Author: SleepNotF0und
None
GitHub Link:
https://github.com/SleepNotF0und/CVE-2025-53772-IIS-WebDeploy-RCE-POC
CVE-2023-22527.zip
5.6 KB
CVE-2023-22527
Author: mylo-2001
Summary of Vulnerability
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.
Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
See “What You Need to Do” for detailed instructions.
{panel:bgColor=#deebff}
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this...
Author: mylo-2001
Summary of Vulnerability
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.
Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
See “What You Need to Do” for detailed instructions.
{panel:bgColor=#deebff}
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this...