Exploits from Github
764 subscribers
1 photo
1.44K files
4.44K links
Download Telegram
CVE-2025-6218.zip
6 KB
CVE-2025-6218
Author: hatchepsoout

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

GitHub Link:
https://github.com/hatchepsoout/sigma-rules
CVE-2024-27348.zip
2.7 KB
CVE-2024-27348
Author: wqfh

RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11

Users are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.



GitHub Link:
https://github.com/wqfh/MasterOfTheIndestry
CVE-2025-2539.zip
8.3 KB
CVE-2025-2539
Author: fazaroot

The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.

GitHub Link:
https://github.com/fazaroot/CVE-2025-2539---File-Away-WordPress-Plugin-Arbitrary-File-Read
CVE-2016-2183.zip
14.2 KB
CVE-2016-2183
Author: ZakyHermawan

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

GitHub Link:
https://github.com/ZakyHermawan/Simple-Sweet32