Github Exploits

2,253 exploits tracked across all sources.

Sort: Activity Stars
CVE-2024-0200 GITHUB HIGH python
Github Enterprise Server < 3.8.13 - Remote Code Execution
An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.
by convisolabs
CVSS 7.2
CVE-2024-1800 GITHUB CRITICAL python
Progress Telerik Report Server - Insecure Deserialization
In Progress® Telerik® Report Server versions prior to 2024 Q1 (10.0.24.130), a remote code execution attack is possible through an insecure deserialization vulnerability.
by gh-ost00
4 stars
CVSS 9.9
CVE-2024-40893 GITHUB MEDIUM go
Firewalla Box Software <1.979 - Command Injection
Multiple authenticated operating system (OS) command injection vulnerabilities exist in Firewalla Box Software versions before 1.979. A physically close attacker that is authenticated to the Bluetooth Low-Energy (BTLE) interface can use the network configuration service to inject commands in various configuration parameters including networkConfig.Interface.Phy.Eth0.Extra.PingTestIP, networkConfig.Interface.Phy.Eth0.Extra.DNSTestDomain, and networkConfig.Interface.Phy.Eth0.Gateway6. Additionally, because the configuration can be synced to the Firewalla cloud, the attacker may be able to persist access even after hardware resets and firmware re-flashes.
by xen0bit
5 stars
CVSS 6.8
CVE-2024-35540 GITHUB CRITICAL go
Typecho < 1.2.1 - XSS
A stored cross-site scripting (XSS) vulnerability in Typecho v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
by cyberaz0r
1 stars
CVSS 9.0
CVE-2024-35539 GITHUB MEDIUM go
Typecho - Authentication Bypass by Spoofing
Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently.
by cyberaz0r
1 stars
CVSS 6.5
CVE-2024-7321 GITHUB MEDIUM
Adonesevangelista Online Blood Bank Management System - XSS
A vulnerability classified as problematic was found in itsourcecode Online Blood Bank Management System 1.0. This vulnerability affects unknown code of the file signup.php of the component User Registration Handler. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273232.
by cl4irv0yance
CVSS 4.3
CVE-2024-7320 GITHUB HIGH
Adonesevangelista Online Blood Bank Management System - SQL Injection
A vulnerability classified as critical has been found in itsourcecode Online Blood Bank Management System 1.0. This affects an unknown part of the file /admin/index.php of the component Admin Login. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273231.
by cl4irv0yance
CVSS 7.3
CVE-2024-7303 GITHUB LOW
Adonesevangelista Online Blood Bank Management System - XSS
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /request.php of the component Send Blood Request Page. The manipulation of the argument Address/bloodgroup leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273185 was assigned to this vulnerability.
by cl4irv0yance
CVSS 3.5
CVE-2007-2447 GITHUB python
Samba 3.0.0-3.0.25rc3 - Command Injection
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
by dugisan3rd
CVE-2022-28368 GITHUB CRITICAL python
Dompdf 1.2.1 - RCE
Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
by dugisan3rd
CVSS 9.8
CVE-2022-25765 GITHUB HIGH python
Pdfkit < 0.8.7.2 - Command Injection
The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized.
by dugisan3rd
CVSS 7.3
CVE-2021-45010 GITHUB HIGH python
Prasathmani Tiny File Manager < 2.4.7 - Path Traversal
A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution.
by dugisan3rd
CVSS 8.8
CVE-2018-7600 GITHUB CRITICAL python
Drupal Drupalgeddon 2 Forms API Property Injection
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
by dugisan3rd
CVSS 9.8
CVE-2017-1000119 GITHUB HIGH python
October CMS <build 412 - Code Injection
October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server.
by dugisan3rd
CVSS 7.2
CVE-2015-6668 GITHUB HIGH python
Wp-jobmanager Job Manager < 0.7.24 - Information Disclosure
The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary CV files via a brute force attack to the WordPress upload directory structure, related to an insecure direct object reference.
by dugisan3rd
CVSS 7.5
CVE-2014-6287 GITHUB CRITICAL python
Rejetto HTTP File Server <2.3c - RCE
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
by dugisan3rd
CVSS 9.8
CVE-2009-2265 GITHUB python
FCKeditor <2.6.4.1 - Path Traversal
Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.
by dugisan3rd
CVE-2022-45476 GITHUB CRITICAL python
Prasathmani Tiny File Manager - Unrestricted File Upload
Tiny File Manager version 2.4.8 executes the code of files uploaded by users of the application, instead of just returning them for download. This is possible because the application is vulnerable to insecure file upload.
by dugisan3rd
CVSS 9.8
CVE-2022-44268 GITHUB MEDIUM python
ImageMagick 7.1.0-49 - Info Disclosure
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).
by dugisan3rd
CVSS 6.5
CVE-2023-4220 GITHUB HIGH python
Chamilo v1.11.24 Unrestricted File Upload PHP Webshell
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
by dugisan3rd
CVSS 8.1
CVE-2023-27163 GITHUB MEDIUM python
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
by dugisan3rd
CVSS 6.5
CVE-2024-27199 GITHUB HIGH python
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
by Stuub
34 stars
CVSS 7.3
CVE-2024-40898 GITHUB HIGH python
Apache HTTP Server <2.4.62 - SSRF
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
by TAM-K592
83 stars
CVSS 7.5
CVE-2024-28955 GITHUB MEDIUM python
Affected Devices - Info Disclosure
Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
by Stuub
34 stars
CVSS 5.9
CVE-2024-29976 GITHUB MEDIUM python
Zyxel NAS326 <V5.21(AAZF.17)C0 - Privilege Escalation
** UNSUPPORTED WHEN ASSIGNED ** The improper privilege management vulnerability in the command “show_allsessions” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated attacker to obtain a logged-in administrator’s session information containing cookies on an affected device.
by Pommaq
4 stars
CVSS 6.5