GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Taonauz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Taonauz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub
Unauthenticated Remote Code Execution in Erlang/OTP SSH
### Summary
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
URL:https://github.com/JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
URL:https://github.com/JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE
标签:#CVE-2025
GitHub
GitHub - JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE: Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via Aud…
Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file. - JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4664
URL:https://github.com/doomygloom/CVE-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4664
URL:https://github.com/doomygloom/CVE-2025-4664
标签:#CVE-2025
GitHub
GitHub - doomygloom/CVE-2025-4664: CVE-2025-4664
CVE-2025-4664. Contribute to doomygloom/CVE-2025-4664 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4664
URL:https://github.com/HossamEAhmed/wp-ulike-cve-2025-32259-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4664
URL:https://github.com/HossamEAhmed/wp-ulike-cve-2025-32259-poc
标签:#CVE-2025
GitHub
GitHub - HossamEAhmed/wp-ulike-cve-2025-32259-poc: In affected versions of the WP ULike plugin, there is no proper authorization…
In affected versions of the WP ULike plugin, there is no proper authorization check before allowing certain AJAX actions or vote manipulations. This allows unauthenticated users to interact with th...
GitHub监控消息提醒!!!
更新了:反序列化
描述:Cyber-RPC 是一个基于 Java 开发的轻量级 RPC(远程过程调用)框架,旨在提供高性能、易扩展的分布式服务调用解决方案。该框架支持服务注册与发现、负载均衡、序列化/反序列化等核心功能。
URL:https://github.com/suonanjiexi/Cyber-RPC
标签:#反序列化
更新了:反序列化
描述:Cyber-RPC 是一个基于 Java 开发的轻量级 RPC(远程过程调用)框架,旨在提供高性能、易扩展的分布式服务调用解决方案。该框架支持服务注册与发现、负载均衡、序列化/反序列化等核心功能。
URL:https://github.com/suonanjiexi/Cyber-RPC
标签:#反序列化
GitHub
GitHub - suonanjiexi/Cyber-RPC: Cyber-RPC 是一个基于 Java 开发的轻量级 RPC(远程过程调用)框架,旨在提供高性能、易扩展的分布式服务调用解决方案。该框架支持服务注册与发现、负载均衡、序列化/反序列化等核心功能。
Cyber-RPC 是一个基于 Java 开发的轻量级 RPC(远程过程调用)框架,旨在提供高性能、易扩展的分布式服务调用解决方案。该框架支持服务注册与发现、负载均衡、序列化/反序列化等核心功能。 - suonanjiexi/Cyber-RPC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4428
URL:https://github.com/doomygloom/CVE-2025-4428
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4428
URL:https://github.com/doomygloom/CVE-2025-4428
标签:#CVE-2025
GitHub
GitHub - doomygloom/CVE-2025-4428: CVE-2025-4428
CVE-2025-4428. Contribute to doomygloom/CVE-2025-4428 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内存马
描述:生异形吗?挖掘构建你自己的Java内存马!
URL:https://github.com/MagpieRYL/memshell_xenomorph
标签:#内存马
更新了:内存马
描述:生异形吗?挖掘构建你自己的Java内存马!
URL:https://github.com/MagpieRYL/memshell_xenomorph
标签:#内存马
GitHub
MagpieRYL/memshell_xenomorph
生异形吗?挖掘构建你自己的Java内存马!. Contribute to MagpieRYL/memshell_xenomorph development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29813 – Visual Studio Privilege Escalation via Improper Pipeline Job Token Handling
URL:https://github.com/Sratet/CVE-2025-29813-PE
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29813 – Visual Studio Privilege Escalation via Improper Pipeline Job Token Handling
URL:https://github.com/Sratet/CVE-2025-29813-PE
标签:#CVE-2025
GitHub
GitHub - Sratet/CVE-2025-29813-PE: CVE-2025-29813 – Visual Studio Privilege Escalation via Improper Pipeline Job Token Handling
CVE-2025-29813 – Visual Studio Privilege Escalation via Improper Pipeline Job Token Handling - Sratet/CVE-2025-29813-PE
GitHub监控消息提醒!!!
更新了:RCE
描述:Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
URL:https://github.com/Housma/CVE-2019-9978---Social-Warfare-WordPress-Plugin-RCE
标签:#RCE
更新了:RCE
描述:Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
URL:https://github.com/Housma/CVE-2019-9978---Social-Warfare-WordPress-Plugin-RCE
标签:#RCE
GitHub
GitHub - Housma/CVE-2019-9978---Social-Warfare-WordPress-Plugin-RCE: The `swp_debug` parameter in `admin-post.php` allows remote…
The `swp_debug` parameter in `admin-post.php` allows remote attackers to include external files containing malicious PHP code, which are evaluated on the server. By supplying a crafted URL that hos...
GitHub监控消息提醒!!!
更新了:RCE
描述:Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
URL:https://github.com/Housma/CVE-2019-9978-Social-Warfare-WordPress-Plugin-RCE
标签:#RCE
更新了:RCE
描述:Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
URL:https://github.com/Housma/CVE-2019-9978-Social-Warfare-WordPress-Plugin-RCE
标签:#RCE
GitHub
GitHub - Housma/CVE-2019-9978-Social-Warfare-WordPress-Plugin-RCE: The `swp_debug` parameter in `admin-post.php` allows remote…
The `swp_debug` parameter in `admin-post.php` allows remote attackers to include external files containing malicious PHP code, which are evaluated on the server. By supplying a crafted URL that hos...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de hashes
URL:https://github.com/moften/CVE-2025-24054
标签:#CVE-2025
更新了:CVE-2025
描述:Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de hashes
URL:https://github.com/moften/CVE-2025-24054
标签:#CVE-2025
GitHub
GitHub - moften/CVE-2025-24054: Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de hashes
Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de hashes - moften/CVE-2025-24054
GitHub监控消息提醒!!!
更新了:渗透测试
描述:漏洞赏金工具是一款专为安全研究人员和白帽子黑客设计的图形化渗透测试工具集。它集成了多个常用的安全测试工具,提供了直观的用户界面,让漏洞挖掘变得更加简单和高效。
URL:https://github.com/ctkqiang/BBtool
标签:#渗透测试
更新了:渗透测试
描述:漏洞赏金工具是一款专为安全研究人员和白帽子黑客设计的图形化渗透测试工具集。它集成了多个常用的安全测试工具,提供了直观的用户界面,让漏洞挖掘变得更加简单和高效。
URL:https://github.com/ctkqiang/BBtool
标签:#渗透测试
GitHub
GitHub - ctkqiang/BBtool: 漏洞赏金工具是一款专为安全研究人员和白帽子黑客设计的图形化渗透测试工具集。它集成了多个常用的安全测试工具,提供了直观的用户界面,让漏洞挖掘变得更加简单和高效。
漏洞赏金工具是一款专为安全研究人员和白帽子黑客设计的图形化渗透测试工具集。它集成了多个常用的安全测试工具,提供了直观的用户界面,让漏洞挖掘变得更加简单和高效。 - ctkqiang/BBtool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-47646 - WordPress PSW Front-end Login Registration Plugin ≤ 1.12 Unauthenticated Privilege Escalation
URL:https://github.com/RootHarpy/CVE-2025-47646
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-47646 - WordPress PSW Front-end Login Registration Plugin ≤ 1.12 Unauthenticated Privilege Escalation
URL:https://github.com/RootHarpy/CVE-2025-47646
标签:#CVE-2025
GitHub
GitHub - RootHarpy/CVE-2025-47646: PoC for CVE-2025-47646 - WordPress PSW Front-end Login Registration Plugin ≤ 1.12 Unauthenticated…
PoC for CVE-2025-47646 - WordPress PSW Front-end Login Registration Plugin ≤ 1.12 Unauthenticated Privilege Escalation - RootHarpy/CVE-2025-47646
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-47646 - WordPress PSW Front-end Login Registration Plugin ≤ 1.12 Unauthenticated Privilege Escalation
URL:https://github.com/cyruscostini/CVE-2025-4918-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-47646 - WordPress PSW Front-end Login Registration Plugin ≤ 1.12 Unauthenticated Privilege Escalation
URL:https://github.com/cyruscostini/CVE-2025-4918-RCE
标签:#CVE-2025
GitHub
GitHub - cyruscostini/CVE-2025-4918-RCE: CVE-2025-4918 is a memory corruption vulnerability in Mozilla Firefox, specifically affecting…
CVE-2025-4918 is a memory corruption vulnerability in Mozilla Firefox, specifically affecting JavaScript `Promise` objects. An attacker can perform out-of-bounds memory reads or writes, leading to ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4918 – Out-of-Bounds Memory Corruption in Mozilla Firefox
URL:https://github.com/Totunm/CVE-2025-4918
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4918 – Out-of-Bounds Memory Corruption in Mozilla Firefox
URL:https://github.com/Totunm/CVE-2025-4918
标签:#CVE-2025
GitHub
GitHub - Totunm/CVE-2025-4918: CVE-2025-4918 – Out-of-Bounds Memory Corruption in Mozilla Firefox
CVE-2025-4918 – Out-of-Bounds Memory Corruption in Mozilla Firefox - Totunm/CVE-2025-4918