Github Exploits

2,250 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-24514 GITHUB HIGH go
K8s.io Ingress-nginx < 1.11.5 - Improper Input Validation
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
by Esonhugh
92 stars
CVSS 8.8
CVE-2025-1098 GITHUB HIGH go
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
by Esonhugh
92 stars
CVSS 8.8
CVE-2025-1097 GITHUB HIGH go
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
by Esonhugh
92 stars
CVSS 8.8
CVE-2024-55591 GITHUB CRITICAL python
Fortinet Fortiproxy < 7.0.20 - Authentication Bypass
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
by binarywarm
CVSS 9.8
CVE-2025-43919 GITHUB MEDIUM python
GNU Mailman < 2.1.39 - Path Traversal
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
by JawadPy
1 stars
CVSS 5.8
CVE-2023-43804 GITHUB MEDIUM python
urllib3 <1.26.17, <2.0.5 - Info Disclosure
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
by JawadPy
1 stars
CVSS 5.9
CVE-2023-41105 GITHUB HIGH python
Python <3.11.4 - Info Disclosure
An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
by JawadPy
1 stars
CVSS 7.5
CVE-2023-30861 GITHUB HIGH python
Flask - Info Disclosure
Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met. 1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies. 2. The application sets `session.permanent = True` 3. The application does not access or modify the session at any point during a request. 4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default). 5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached. This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified. This issue has been fixed in versions 2.3.2 and 2.2.5.
by JawadPy
1 stars
CVSS 7.5
CVE-2023-24329 GITHUB HIGH python
Python <3.11.4 - Open Redirect
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
by JawadPy
1 stars
CVSS 7.5
CVE-2022-22817 GITHUB CRITICAL python
Pillow <9.0.0 - Code Injection
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
by JawadPy
1 stars
CVSS 9.8
CVE-2021-24891 GITHUB MEDIUM python
Elementor <3.4.8 - XSS
The Elementor Website Builder WordPress plugin before 3.4.8 does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue.
by JawadPy
1 stars
CVSS 6.1
CVE-2021-24321 GITHUB CRITICAL python
Bold-themes Bello < 1.6.0 - SQL Injection
The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues
by JawadPy
1 stars
CVSS 9.8
CVE-2025-32433 GITHUB CRITICAL python
Erlang OTP Pre-Auth RCE Scanner and Exploit
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
by TeneBrae93
7 stars
CVSS 10.0
CVE-2024-9474 GITHUB HIGH python
Paloaltonetworks Pan-os < 10.1.14 - OS Command Injection
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
by dcollaoa
4 stars
CVSS 7.2
CVE-2025-24071 GITHUB MEDIUM python
Microsoft Windows 10 1507 < 10.0.10240.20947 - Information Disclosure
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
by basekilll
3 stars
CVSS 6.5
CVE-2025-24813 GITHUB CRITICAL python
Tomcat Partial PUT Java Deserialization
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
by Anzinius
CVSS 9.8
CVE-2024-4577 GITHUB CRITICAL python
PHP CGI Argument Injection Remote Code Execution
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
by Anzinius
CVSS 9.8
CVE-2017-5487 GITHUB MEDIUM python
Wordpress < 4.7 - Information Disclosure
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
by Anzinius
CVSS 5.3
CVE-2021-3984 GITHUB HIGH
Vim < 8.2.3625 - Out-of-Bounds Write
vim is vulnerable to Heap-based Buffer Overflow
by cemonatk
3 stars
CVSS 7.8
CVE-2021-3974 GITHUB HIGH
Vim < 8.2.3612 - Use After Free
vim is vulnerable to Use After Free
by cemonatk
3 stars
CVSS 7.8
CVE-2021-3973 GITHUB HIGH
Vim < 8.2.3611 - Out-of-Bounds Write
vim is vulnerable to Heap-based Buffer Overflow
by cemonatk
3 stars
CVSS 7.8
CVE-2021-3928 GITHUB HIGH
Vim < 8.2.3582 - Use of Uninitialized Resource
vim is vulnerable to Use of Uninitialized Variable
by cemonatk
3 stars
CVSS 7.8
CVE-2021-3927 GITHUB HIGH
Vim < 8.2.3581 - Out-of-Bounds Write
vim is vulnerable to Heap-based Buffer Overflow
by cemonatk
3 stars
CVSS 7.8
CVE-2021-3903 GITHUB HIGH
Vim < 8.2.3564 - Out-of-Bounds Write
vim is vulnerable to Heap-based Buffer Overflow
by cemonatk
3 stars
CVSS 7.8
CVE-2021-35346 GITHUB CRITICAL
tsMuxer <2.6.16 - Buffer Overflow
tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function HevcSpsUnit::short_term_ref_pic_set(int) in hevc.cpp.
by cemonatk
3 stars
CVSS 9.8