Shell Exploits

54 exploits tracked across all sources.

Sort: Newest Stars
CVE-2025-6019 GITHUB HIGH shell
libblockdev - Privilege Escalation
A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
by muyuanlove
9 stars
CVSS 7.0
CVE-2025-66478 GITHUB shell
(pending title)
Rejected reason: This CVE is a duplicate of CVE-2025-55182.
by rix4uni
2 stars
CVE-2025-66478 GITHUB shell
(pending title)
Rejected reason: This CVE is a duplicate of CVE-2025-55182.
by chrahman
3 stars
CVE-2025-66478 GITHUB shell
(pending title)
Rejected reason: This CVE is a duplicate of CVE-2025-55182.
by mounta11n
1 stars
CVE-2025-66478 GITHUB shell
(pending title)
Rejected reason: This CVE is a duplicate of CVE-2025-55182.
by TheStingR
3 stars
CVE-2025-66478 GITHUB shell
(pending title)
Rejected reason: This CVE is a duplicate of CVE-2025-55182.
by pax-k
5 stars
CVE-2021-43798 GITHUB HIGH shell
Grafana Plugin Path Traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
by theeldruin
CVSS 7.5
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by NewComrade12211
1 stars
CVSS 9.3
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by muhammedkayag
CVSS 9.3
CVE-2025-59287 GITHUB CRITICAL shell
Microsoft Windows Server 2012 - Insecure Deserialization
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
by Lupovis
26 stars
CVSS 9.8
CVE-2025-61984 GITHUB LOW shell
OpenSSH <10.1 - RCE
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
by flyskyfire
CVSS 3.6
CVE-2025-49844 GITHUB CRITICAL shell
Redis < 6.2.20 - Use After Free
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
by gopinaath
CVSS 9.9
CVE-2025-48384 GITHUB HIGH shell
Git - Info Disclosure
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
by mukesh-610
CVSS 8.0
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by cybershaolin47
1 stars
CVSS 9.3
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by shazed-x
CVSS 9.3
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by 0x3c4dfa1
CVSS 9.3
CVE-2025-61984 GITHUB LOW shell
OpenSSH <10.1 - RCE
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
by dgl
7 stars
CVSS 3.6
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by r3dBust3r
1 stars
CVSS 9.3
CVE-2025-56132 GITHUB HIGH shell
LiquidFiles <4.2 - Info Disclosure
LiquidFiles filetransfer server is vulnerable to a user enumeration issue in its password reset functionality. The application returns distinguishable responses for valid and invalid email addresses, allowing unauthenticated attackers to determine the existence of user accounts. Version 4.2 introduces user-based lockout mechanisms to mitigate brute-force attacks, user enumeration remains possible by default. In versions prior to 4.2, no such user-level protection is in place, only basic IP-based rate limiting is enforced. This IP-based protection can be bypassed by distributing requests across multiple IPs (e.g., rotating IP or proxies). Effectively bypassing both login and password reset security controls. Successful exploitation allows an attacker to enumerate valid email addresses registered for the application, increasing the risk of follow-up attacks such as password spraying.
by fredericgoossens
CVSS 7.3
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by onniio
CVSS 9.3
CVE-2025-27591 GITHUB MEDIUM shell
Facebook Below < 0.9.0 - Incorrect Permission Assignment
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
by Diabl0xE
2 stars
CVSS 6.8
CVE-2025-53770 GITHUB CRITICAL shell
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
by behnamvanda
CVSS 9.8
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by behnamvanda
4 stars
CVSS 9.3
CVE-2025-32463 GITHUB CRITICAL shell
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by MAAYTHM
5 stars
CVSS 9.3
CVE-2025-26466 GITHUB MEDIUM shell
Openbsd Openssh - Resource Allocation Without Limits
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
by dolutech
1 stars
CVSS 5.9