Skip to content

fankh/attackwatch-vulnerability-poc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5,744 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Vulnerability POC Repository

This repository contains Proof of Concept (POC) code for high severity CVEs for educational and authorized security testing purposes only.

⚠️ Disclaimer

This code is provided for educational purposes, authorized penetration testing, CTF challenges, and security research only.

Do NOT use these POCs against systems without explicit written authorization. Unauthorized access to computer systems is illegal.

CVE Index

2022 CVEs

CVE ID Severity Vendor Description
CVE-2022-22963 Critical (9.8) VMware Spring Cloud Function SpEL Injection RCE
CVE-2022-22965 Critical (9.8) VMware Spring Framework RCE (Spring4Shell)
CVE-2022-47966 Critical (9.8) Zoho ManageEngine SAML RCE

2023 CVEs

CVE ID Severity Vendor Description
CVE-2023-20198 Critical (10.0) Cisco IOS XE Web UI Privilege Escalation
CVE-2023-27350 Critical (9.8) PaperCut NG/MF Authentication Bypass RCE
CVE-2023-46604 Critical (10.0) Apache ActiveMQ RCE
CVE-2023-44487 High (7.5) Multiple HTTP/2 Rapid Reset Attack
CVE-2023-29357 Critical (9.8) Microsoft SharePoint Server Privilege Escalation

2024 CVEs

CVE ID Severity Vendor Description
CVE-2024-21762 Critical (9.8) Fortinet FortiOS SSL VPN Out-of-Bounds Write RCE
CVE-2024-45387 High (8.1) Apache Traffic Server HTTP Request Smuggling
CVE-2024-50623 Critical (9.8) Cleo File Transfer Unrestricted Upload RCE
CVE-2024-3400 Critical (10.0) Palo Alto PAN-OS GlobalProtect Command Injection
CVE-2024-27198 Critical (9.8) JetBrains TeamCity Authentication Bypass

2025 CVEs

CVE ID Severity Vendor Description
CVE-2025-0282 Critical (9.0) Ivanti Connect Secure Stack Buffer Overflow RCE
CVE-2025-21298 Critical (9.8) Microsoft Windows OLE Remote Code Execution
CVE-2025-22224 Critical (9.3) VMware vCenter Server Heap Overflow RCE
CVE-2025-24813 Critical (9.8) Apache Tomcat Path Equivalence RCE
CVE-2025-29927 Critical (9.1) Vercel Next.js Middleware Authorization Bypass

2026 CVEs

CVE ID Severity Vendor Description
CVE-2026-33557 Critical (9.1) Apache Kafka JWT Validation Bypass (OAUTHBEARER)

Repository Structure

vulnerability-poc/
├── README.md
├── 2022/                       # 2022 CVEs (3 entries)
│   └── CVE-2022-XXXXX/
├── 2023/                       # 2023 CVEs (45 entries)
│   └── CVE-2023-XXXXX/
├── 2024/                       # 2024 CVEs (413 entries)
│   └── CVE-2024-XXXXX/
│       ├── README.md           # English documentation
│       ├── README_KO.md        # Korean documentation (한국어)
│       ├── poc.py              # POC exploit code
│       └── prevention/
│           ├── README.md       # Mitigation guide
│           ├── nginx.conf      # Nginx prevention rules
│           ├── httpd.conf      # Apache HTTPD rules
│           ├── snort.rules     # Snort IDS rules
│           └── yara.yar        # YARA detection rules
└── 2025/                       # 2025 CVEs (1107 entries)
    └── CVE-2025-XXXXX/
        └── ...                 # Same structure as above

Prevention Rules

Each CVE includes comprehensive prevention rules for:

  • Nginx: Reverse proxy protection rules
  • Apache HTTPD: ModSecurity and RewriteRules
  • Snort: Network IDS detection signatures
  • YARA: File and memory pattern detection

Usage

POC Scripts

Each POC can be run with the --help flag to see available options:

python 2024/CVE-2024-21762/poc.py --help
python 2024/CVE-2024-21762/poc.py --check -t <target>

Prevention Rules

Deploy prevention rules to your infrastructure:

# Nginx
cp 2024/CVE-2024-21762/prevention/nginx.conf /etc/nginx/conf.d/cve-2024-21762.conf

# Apache
cp 2024/CVE-2024-21762/prevention/httpd.conf /etc/httpd/conf.d/cve-2024-21762.conf

# Snort
cat 2024/CVE-2024-21762/prevention/snort.rules >> /etc/snort/rules/local.rules

# YARA
yara 2024/CVE-2024-21762/prevention/yara.yar <target_file>

Features

Each CVE folder includes:

  • README.md: English documentation with vulnerability details
  • README_KO.md: Korean documentation (한국어 문서)
  • poc.py: Python POC code with check and exploit functions
  • prevention/: Complete detection and mitigation rules

🏷️ Shields.io Badge Guide

This repository uses Shields.io status badges. Here's how to create and customize them:

Badge URL Format

https://img.shields.io/badge/{LABEL}-{MESSAGE}-{COLOR}?style={STYLE}

Available Styles

Style Example
flat-square example
flat example
plastic example
for-the-badge example

Common Colors

Color Code Example
Green brightgreen, green, success
Red red, critical
Blue blue, informational
Orange orange, important
Yellow yellow

Badge Examples Used in This Repo

<!-- Test Status -->
![Tests](https://img.shields.io/badge/Tests-201%2F201_Passed-brightgreen?style=flat-square)

<!-- Verification Status -->
![Verified](https://img.shields.io/badge/Verified-Human_Reviewed-blue?style=flat-square)

<!-- Count Badge -->
![CVEs](https://img.shields.io/badge/CVEs-201-red?style=flat-square)

<!-- Version Badge -->
![Python](https://img.shields.io/badge/Python-3.8+-blue?style=flat-square)

<!-- CVSS Severity -->
![CVSS Critical](https://img.shields.io/badge/CVSS_Critical-50+-critical?style=flat-square)

Special Characters

Character URL Encode
Space _ or %20
Dash --
Underscore __
Slash %2F
Percent %25

Enterprise Support & Services

Looking for deeper security support? We offer comprehensive enterprise solutions:

  • MSSP (Managed Security Service Provider): 24/7 security monitoring and incident response
  • Automated Integration: Seamless integration with your existing security infrastructure (SIEM, SOAR, ticketing systems)
  • Continuous Vulnerability Management: Proactive vulnerability tracking, prioritization, and remediation guidance
  • Custom Detection Rules: Tailored detection signatures for your specific environment
  • Threat Intelligence: Real-time threat feeds and vulnerability intelligence

Contact Us

Contact Email
Sales & Partnerships srkim@nshc.net
Technical Support hsjang@nshc.net

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Contributing

Please ensure any contributions include:

  1. Proper CVE attribution
  2. Both English and Korean documentation
  3. Prevention rules (nginx, httpd, snort, yara)
  4. Responsible disclosure compliance

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors