This page is a central hub for exploits, featuring both my own work and contributions from other researchers. Here, you’ll find a curated collection of vulnerabilities and proofs of concept.

Exploitations
CVE DescriptionTypeVulnerability release dateAuthor
CVE-2025-39913 UAF in kernel ≤ 6.12.38 linux (psock-cork)OS2025-10-01Byte Reaper
CVE-2025-11077SQL Injection in Online Learning Management (add_content.php)Web2025-09-29Byte Reaper
CVE-2025-39866use-after-free and race condition in linux kernel 6.12.16OS2025-09-26Byte Reaper
CVE-2025-59342Path traversal vulnerability in esm.sh (esm-dev)Web2025-09-18Byte Reaper
CVE-2025-10046SQL injection ELEX WooCommerce Google Shoppingweb2025-08-18Byte Reaper
CVE-2025-9090 Command Injection in Tenda AC20 16.03.08.12 (/goform/telnet)OS2025-08-18Byte Reaper
CVE-2025-8550 XSS in atjiu pybbs /admin/topic/list via Username parameterWeb2025-08-05Byte Reaper
CVE-2025-8471 SQl injection in projectworlds Online Admissions SystemWeb2025-08-02Byte Reaper
CVE-2025-54589Reflected XSS in Copyparty ≤1.18.6Web2025-07-31Byte Reaper
CVE-2025-8191Cross-Site Scripting (XSS) vulnerability in Swagger UI ( <= 1.0.3)Web2025-07-26Byte Reaper
CVE-2025-32429sql injection in XWiki (getdeleteddocuments.vm)Web2025-07-24Byte Reaper
CVE-2025-6082Full Path Disclosure in the “Birth Chart Compatibility” WordPress pluginWeb2025-07-22Byte Reaper
CVE-2025-7840XSS in Campcodes Online Movie Theater Seat Reservation System 1.0 (Firstname=)Web2025-07-19Byte Reaper
CVE-2025-7753SQL Injection in Online Appointment Booking System 1.0 via the username parameter.Web2025-07-17Byte Reaper
CVE-2025-6907SQL injection in Code-Projects Car Rental System 1.0 (/book_car.php)Web2025-06-30Byte Reaper
CVE-2024-4577 PHP-CGI Argument Injection vulnerability on Windows (Unicode PHP-CGI)Web2024-06-06Byte Reaper
CVE-2025-41373SQL Injection in Gandia Integra TotalWeb2019-08-15Byte Reaper
CVE-2019-15107Remote code execution in WebminWeb2019-08-15Byte Reaper
CVE-2019-9042RCE in Sitemagic CMS v4.4 (404.php)Web2019-04-21Byte Reaper
CVE-2019-18219Cross-Site-Scripting (XSS) in Sitemagic CMS 4.4.1 (index.php, upgrade.php)Web2019-04-21Byte Reaper
CVE-2004-1659XSS in CuteNews 1.3.6 (index.php)Web2004-09-20Byte Reaper
CVE-2003-1240Remote file inclusion in CuteNews 0.88 ((1) shownews.php, (2) search.php, or (3) comments.php)Web2003-08-15Byte Reaper
CVE-2004-0660CuteNews 1.3.1 (XSS) (1) show_archives.php, (2) show_news.php)Web2003-08-15Byte Reaper
CVE-2008-4557CuteNews 1.1.1 (RCE) (plugins/wacko/highlight/html.php)Web2003-08-15Byte Reaper
CVE-2025-8730Authentication bypass vulnerability in the web interface of Belkin F9K1009 routersNetwork2025-08-08Byte Reaper
CVE-2025-7769inject a command via the DEVICE_PING endpoint in Tigo Energy Cloud Connect Advanced (CCA)Network2025-06-08Byte Reaper
CVE-2025-7795Buffer overflow vulnerability in Tenda routersNetwork2025-07-18Byte Reaper
CVE-2025-47917Use-After-Free in mbedTLS leading to remote code execution (RCE)Network2025-07-20Byte Reaper
CVE-2025-7766XXE in Lantronix Provisioning Manager allows remote command execution without authenticationNetwork2025-07-22Byte Reaper
CVE-2025-54769Authenticated directory traversal in LPAR2RRD (RCE)Network2025-07-29Byte Reaper
CVE-2022-0847Dirty Pipe in Linux kernel ≤5.16.11 (privilege escalation.)OS2022-03-29Byte Reaper

Submit Exploit

Welcome to the Byte Reaper Exploit Submission page. Here, you can submit your working exploits to be published in the Exploits Section of Byte Reaper.
To ensure high quality and safety, all submissions are carefully reviewed and tested before publishing.

How to Submit :

Please send your submission via email to: Contact@bytrep.com

Your email should include all required information in a clear and organized format. Incomplete submissions may be rejected.

Required Submission Details :

1 - Exploit Title :

- Provide a short and descriptive name for your exploit.

2 - Description / Info :

- Explain clearly what the exploit does, how it works, and its impact. Specify which part of the software it targets and any important technical details.

3 - CVE ID :

- Include the CVE identifier if the related vulnerability has one; otherwise, leave blank.

4 - Target Software / Version :

- Specify the software name and the exact version affected by the exploit.

5 - Author Name :

- The name you want displayed publicly on the platform as the contributor.

6 - Attachments :

- Submit the exploit code or proof-of-concept files directly as attachments. Do not send links.

Submission Review :

- All submissions are manually analyzed and tested by the Byte Reaper team to ensure safety and quality.
This process can take time depending on the complexity of the exploit.
Please expect a response within 3–5 business days.

Exploits that do not meet the guidelines, contain unsafe code, or are incomplete may be rejected.

Accepted exploits will be published in the Exploits Section with proper attribution to the author.

Full Example of a Submission Email :

Subject:

[Exploit Submission] Remote Code Execution in App 2.1.0

Email Body:

Hello Byte Reaper Team, I would like to submit an exploit for publication in the Byte Reaper Exploits Section.

Exploit Title:

Remote Code Execution in App 2.1.0

Description / Info:

This exploit triggers a Remote Code Execution in App version 2.1.0, allowing remote code execution with user-level privileges. It targets the file upload API endpoint. Manual testing and code review are required before publishing.

CVE ID:

CVE-2025-12345

Target Software / Version:

App 2.1.0

Author Name:

[Author]

Attachments:

Attached is the exploit code file (.py,.txt,.c,.cpp...).