Github Exploits

2,225 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-32463 GITHUB CRITICAL python
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by XiaomingX
10 stars
CVSS 9.3
CVE-2025-2304 GITHUB CRITICAL python
Rubygems Camaleon Cms < 2.9.1 - Privilege Escalation
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
by XiaomingX
10 stars
CVE-2025-15556 GITHUB HIGH python
Notepad-plus-plus Notepad++ < 8.8.9 - Download Without Integrity Check
Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges of the user.
by XiaomingX
10 stars
CVSS 7.5
CVE-2025-15368 GITHUB HIGH python
SportsPress <2.7.26 - RCE
The SportsPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.7.26 via shortcodes 'template_name' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
by XiaomingX
10 stars
CVSS 8.8
CVE-2025-14174 GITHUB HIGH python
Google Chrome <143.0.7499.110 - Memory Corruption
Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
by XiaomingX
10 stars
CVSS 8.8
CVE-2025-10042 GITHUB MEDIUM python
Ays-pro Quiz Maker < 6.7.0.57 - SQL Injection
The Quiz Maker plugin for WordPress is vulnerable to SQL Injection via spoofed IP headers in all versions up to, and including, 6.7.0.56 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable in configurations where the server is set up to retrieve the IP from a user-supplied field like `X-Forwarded-For` and limit users by IP is enabled.
by XiaomingX
10 stars
CVSS 5.9
CVE-2026-28275 GITHUB HIGH
Initiative <0.32.4 - Auth Bypass
Initiative is a self-hosted project management platform. Versions of the application prior to 0.32.4 do not invalidate previously issued JWT access tokens after a user changes their password. As a result, older tokens remain valid until expiration and can still be used to access protected API endpoints. This behavior allows continued authenticated access even after the account password has been updated. Version 0.32.4 fixes the issue.
by G3XAR
CVSS 8.1
CVE-2026-28274 GITHUB HIGH
Initiative <0.32.4 - Stored XSS
Initiative is a self-hosted project management platform. Versions of the application prior to 0.32.4 are vulnerable to Stored Cross-Site Scripting (XSS) in the document upload functionality. Any user with upload permissions within the "Initiatives" section can upload a malicious `.html` or `.htm` file as a document. Because the uploaded HTML file is served under the application's origin without proper sandboxing, the embedded JavaScript executes in the context of the application. As a result, authentication tokens, session cookies, or other sensitive data can be exfiltrated to an attacker-controlled server. Additionally, since the uploaded file is hosted under the application's domain, simply sharing the direct file link may result in execution of the malicious script when accessed. Version 0.32.4 fixes the issue.
by G3XAR
CVSS 8.7
CVE-2026-27198 GITHUB HIGH
Formwork 2.0.0-2.3.3 - Privilege Escalation
Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exists, it does not verify whether the current user has sufficient privileges to assign highly privileged roles such as admin. As a result, an authenticated user with the editor role can create a new account with administrative privileges, leading to full administrative access and complete compromise of the CMS. This issue has been fixed in version 2.3.4.
by G3XAR
CVSS 8.8
CVE-2026-26993 GITHUB MEDIUM
Flare <=1.7.0 - Stored XSS
Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Versions 1.7.0 and below allow users to upload files without proper content validation or sanitization. By embedding malicious JavaScript within an SVG (or other active content formats such as HTML or XML), an attacker can achieve script execution in the context of the application's origin when a victim views the file in “raw” mode. This results in a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to exfiltrate user data. This issue has been fixed in version 1.7.1.
by G3XAR
CVSS 4.6
CVE-2025-55944 GITHUB MEDIUM
Slink v1.4.9 - XSS
Slink v1.4.9 allows stored cross-site scripting (XSS) via crafted SVG uploads. When a user views the shared image in a new browser tab, the embedded JavaScript executes. The issue affects both authenticated and unauthenticated users.
by G3XAR
CVSS 6.1
CVE-2025-2294 GITHUB CRITICAL javascript
Kubio AI Page Builder <2.5.1 - Local File Inclusion
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
by AikidoSec
6 stars
CVSS 9.8
CVE-2025-32020 GITHUB CRITICAL javascript
NPM Crud-query-parser < 0.1.0 - SQL Injection
The crud-query-parser library parses query parameters from HTTP requests and converts them to database queries. Improper neutralization of the order/sort parameter in the TypeORM adapter, which allows SQL injection. You are impacted by this vulnerability if you are using the TypeORM adapter, ordering is enabled and you have not set-up a property filter. This vulnerability is fixed in 0.1.0.
by AikidoSec
6 stars
CVE-2025-27152 GITHUB MEDIUM javascript
axios <1.8.2 - SSRF
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if ⁠baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
by AikidoSec
6 stars
CVSS 5.3
CVE-2025-25977 GITHUB CRITICAL javascript
Canvg < 3.0.11 - Prototype Pollution
An issue in canvg v.4.0.2 allows an attacker to execute arbitrary code via the Constructor of the class StyleElement.
by AikidoSec
6 stars
CVSS 9.8
CVE-2025-25975 GITHUB HIGH javascript
Jonschlinkert Parse-git-config - Information Disclosure
An issue in parse-git-config v.3.0.0 allows an attacker to obtain sensitive information via the expandKeys function
by AikidoSec
6 stars
CVSS 7.5
CVE-2025-23084 GITHUB MEDIUM javascript
Nodejs Node.js < 18.20.6 - Path Traversal
A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory. On Windows, a path that does not start with the file separator is treated as relative to the current directory. This vulnerability affects Windows users of `path.join` API.
by AikidoSec
6 stars
CVSS 5.5
CVE-2024-53900 GITHUB CRITICAL javascript
Mongoose <8.8.3 - SQL Injection
Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.
by AikidoSec
6 stars
CVSS 9.1
CVE-2024-39338 GITHUB HIGH javascript
Axios < 1.7.4 - SSRF
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
by AikidoSec
6 stars
CVSS 7.5
CVE-2024-24806 GITHUB HIGH javascript
libuv - Info Disclosure
libuv is a multi-platform support library with a focus on asynchronous I/O. The `uv_getaddrinfo` function in `src/unix/getaddrinfo.c` (and its windows counterpart `src/win/getaddrinfo.c`), truncates hostnames to 256 characters before calling `getaddrinfo`. This behavior can be exploited to create addresses like `0x00007f000001`, which are considered valid by `getaddrinfo` and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulnerability arises due to how the `hostname_ascii` variable (with a length of 256 bytes) is handled in `uv_getaddrinfo` and subsequently in `uv__idna_toascii`. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result attackers may be able to access internal APIs or for websites (similar to MySpace) that allows users to have `username.example.com` pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue has been addressed in release version 1.48.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
by AikidoSec
6 stars
CVSS 7.3
CVE-2023-31719 GITHUB CRITICAL javascript
FUXA <= 1.1.12 - SQL Injection
FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin.
by AikidoSec
6 stars
CVSS 9.8
CVE-2020-8116 GITHUB HIGH javascript
dot-prop <4.2.1, <5.1.1 - Prototype Pollution
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
by AikidoSec
6 stars
CVSS 7.3
CVE-2020-7765 GITHUB MEDIUM javascript
@firebase/util <0.3.4 - Code Injection
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
by AikidoSec
6 stars
CVSS 5.6
CVE-2020-7687 GITHUB HIGH javascript
Fast-http - Path Traversal
This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.
by AikidoSec
6 stars
CVSS 7.5
CVE-2020-26301 GITHUB HIGH javascript
ssh2 <1.4.0 - Command Injection
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
by AikidoSec
6 stars
CVSS 7.5