CVE-2025-55182
Author: VolksRat71
None
GitHub Link:
https://github.com/VolksRat71/react2shellexploitvisualized
Author: VolksRat71
None
GitHub Link:
https://github.com/VolksRat71/react2shellexploitvisualized
CVE-2020-0014.zip
4.5 MB
CVE-2020-0014
Author: doudoudedi
It is possible for a malicious application to construct a TYPETOAST window manually and make that window clickable. This could lead to a local escalation of privilege with no additional execution privileges needed. User action is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-128674520
GitHub Link:
https://github.com/doudoudedi/CVE-2020-0014Toast
Author: doudoudedi
It is possible for a malicious application to construct a TYPETOAST window manually and make that window clickable. This could lead to a local escalation of privilege with no additional execution privileges needed. User action is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-128674520
GitHub Link:
https://github.com/doudoudedi/CVE-2020-0014Toast
CVE-2019-11043.zip
8.9 KB
CVE-2019-11043
Author: gon905332-jpg
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
GitHub Link:
https://github.com/gon905332-jpg/cve-2019-11043.py
Author: gon905332-jpg
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
GitHub Link:
https://github.com/gon905332-jpg/cve-2019-11043.py