CVE-2023-27350.zip
936.1 KB
CVE-2023-27350
Author: dezso-dfield
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
GitHub Link:
https://github.com/dezso-dfield/CVE-2023-27350
Author: dezso-dfield
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
GitHub Link:
https://github.com/dezso-dfield/CVE-2023-27350
CVE-2024-48990.zip
3.3 KB
CVE-2024-48990
Author: tahsinunluturk
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
GitHub Link:
https://github.com/tahsinunluturk/needrestart-privesc-cve-2024-48990
Author: tahsinunluturk
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
GitHub Link:
https://github.com/tahsinunluturk/needrestart-privesc-cve-2024-48990
CVE-2025-55184
Author: shubham-01-star
None
GitHub Link:
https://github.com/shubham-01-star/OpsGuard-simulation
Author: shubham-01-star
None
GitHub Link:
https://github.com/shubham-01-star/OpsGuard-simulation
CVE-2019-9506
Author: coffeeesd
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
GitHub Link:
https://github.com/coffeeesd/knob
Author: coffeeesd
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
GitHub Link:
https://github.com/coffeeesd/knob