mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Recently updated Proof-of-Concepts
2025
Latest 20 of 13 Repositories
Stars | Updated | Name | Description |
---|---|---|---|
488⭐ | 89 days ago | CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execution-from-winrar |
25⭐ | 1373 days ago | CVE-2018-20250 | 010 Editor template for ACE archive format & CVE-2018-2025[0-3] |
34⭐ | 7 days ago | CVE-2025-0282 | PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways |
23⭐ | 4 days ago | CVE-2025-0108-PoC | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108) |
22⭐ | 6 days ago | CVE-2025-0282 | Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282) |
42⭐ | 6 days ago | CVE-2025-0282-Ivanti-exploit | CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit. |
33⭐ | 2 days ago | CVE-2025-24016 | CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE) |
41⭐ | 3 days ago | CVE-2025-24118 | An XNU kernel race condition bug |
33⭐ | 5 days ago | CVE-2025-23369 | GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit |
9⭐ | 2 days ago | CVE-2025-1302 | JSONPath-plus Remote Code Execution |
3⭐ | 12 days ago | CVE-2025-1015 | an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript |
3⭐ | 4 days ago | CVE-2025-24893-PoC | XWiki SolrSearchMacros 远程代码执行漏洞PoC(CVE-2025-24893) |
3⭐ | 20 days ago | CVE-2025-0282-Full-version | # CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS] |
2024
Latest 20 of 535 Repositories
Stars | Updated | Name | Description |
---|---|---|---|
2350⭐ | 13 hours ago | CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. |
651⭐ | 1 day ago | CVE-2024-38063 | poc for CVE-2024-38063 (RCE in tcpip.sys) |
474⭐ | 16 days ago | cve-2024-6387-poc | a signal handler race condition in OpenSSH's server (sshd) |
483⭐ | 13 hours ago | CVE-2024-49113 | LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 |
473⭐ | 4 days ago | CVE-2024-6387_Check | CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH |
377⭐ | 1 day ago | cve-2024-6387-poc | 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc |
212⭐ | 16 days ago | CVE-2024-38077 | RDL的堆溢出导致的RCE |
338⭐ | 3 days ago | CVE-2024-26229 | CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code |
282⭐ | 4 days ago | CVE-2024-0044 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 |
288⭐ | 1 day ago | CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. |
275⭐ | 11 days ago | CVE-2024-35250 | PoC for the Untrusted Pointer Dereference in the ks.sys driver |
249⭐ | 3 days ago | CVE-2024-4577 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC |
723⭐ | 3 days ago | CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Microsoft-Outlook-Remote-Code-Execution-Vulnerability |
236⭐ | 20 days ago | CVE_2024_30078_POC_WIFI | basic concept for the latest windows wifi driver CVE |
8⭐ | 42 days ago | CVE-2024-38077-POC | |
196⭐ | 2 days ago | CVE-2024-23897 | CVE-2024-23897 |
157⭐ | 3 days ago | CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 |
159⭐ | 28 days ago | CVE-2024-21413 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC |
137⭐ | 32 days ago | cve-2024-20017 | exploits for CVE-2024-20017 |
119⭐ | 2 days ago | cve-2024-6387-poc | MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc |
2023
Latest 20 of 473 Repositories
Stars | Updated | Name | Description |
---|---|---|---|
784⭐ | 2 days ago | CVE-2023-38831-winrar-exploit | CVE-2023-38831 winrar exploit generator |
370⭐ | 5 days ago | CVE-2023-32233 | CVE-2023-32233: Linux内核中的安全漏洞 |
487⭐ | 5 days ago | Windows_LPE_AFD_CVE-2023-21768 | LPE exploit for CVE-2023-21768 |
388⭐ | 11 days ago | CVE-2023-0386 | CVE-2023-0386在ubuntu22.04上的提权 |
384⭐ | 16 days ago | CVE-2023-4911 | PoC for CVE-2023-4911 |
74⭐ | 12 hours ago | CVE-2023-21839 | Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE) |
270⭐ | 5 days ago | CVE-2023-21608 | Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit |
317⭐ | 10 days ago | CVE-2023-4863 | |
228⭐ | 2 days ago | CVE-2023-44487 | Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487 |
162⭐ | 47 days ago | CVE-2023-36745 | |
231⭐ | 16 days ago | CVE-2023-20887 | VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887) |
341⭐ | 66 days ago | CVE-2023-23397-POC-Powershell | |
240⭐ | 18 days ago | CVE-2023-7028 | This repository presents a proof-of-concept of CVE-2023-7028 |
221⭐ | 2 days ago | CVE-2023-3519 | RCE exploit for CVE-2023-3519 |
177⭐ | 8 days ago | CVE-2023-28252 | |
234⭐ | 8 days ago | Weblogic-CVE-2023-21839 | |
203⭐ | 2 days ago | CVE-2023-46747-RCE | exploit for f5-big-ip RCE cve-2023-46747 |
229⭐ | 2 days ago | CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
165⭐ | 2 days ago | CVE-2023-25157 | CVE-2023-25157 - GeoServer SQL Injection - PoC |
123⭐ | 24 days ago | CVE-2023-2640-CVE-2023-32629 | GameOver(lay) Ubuntu Privilege Escalation |
2022
Latest 20 of 540 Repositories
Stars | Updated | Name | Description |
---|---|---|---|
1093⭐ | 15 days ago | CVE-2022-0847-DirtyPipe-Exploit | A root exploit for CVE-2022-0847 (Dirty Pipe) |
565⭐ | 7 days ago | CVE-2022-23222 | CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation |
361⭐ | 40 days ago | CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 |
369⭐ | 78 days ago | CVE-2022-29464 | WSO2 RCE (CVE-2022-29464) exploit and writeup. |
428⭐ | 34 days ago | CVE-2022-25636 | CVE-2022-25636 |
349⭐ | 2 days ago | CVE-2022-40684 | A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager |
497⭐ | 3 days ago | CVE-2022-0995 | CVE-2022-0995 exploit |
476⭐ | 16 days ago | CVE-2022-2588 | exploit for CVE-2022-2588 |
379⭐ | 5 days ago | CVE-2022-39197 | CobaltStrike <= 4.7.1 RCE |
582⭐ | 4 hours ago | CVE-2022-0847-DirtyPipe-Exploits | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. |
398⭐ | 16 days ago | CVE-2022-33679 | One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html |
277⭐ | 18 days ago | CVE-2022-0847 | CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe” |
317⭐ | 8 days ago | CVE-2022-21894 | baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability |
368⭐ | 5 days ago | CVE-2022-0185 | CVE-2022-0185 |
267⭐ | 2 days ago | CVE-2022-39952 | POC for CVE-2022-39952 |
275⭐ | 16 days ago | cve-2022-27255 | |
217⭐ | 102 days ago | CVE-2022-30075 | Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075) |
239⭐ | 22 days ago | CVE-2022-20699 | Cisco Anyconnect VPN unauth RCE (rwx stack) |
218⭐ | 4 days ago | CVE-2022-34918 | CVE-2022-34918 netfilter nf_tables 本地提权 POC |
230⭐ | 2 days ago | CVE-2022-1388 | POC for CVE-2022-1388 |
Languages
Python
100%