CVE-2025-64459.zip
2 KB
CVE-2025-64459
Author: ALPYAHYA
None
GitHub Link:
https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-PoC
Author: ALPYAHYA
None
GitHub Link:
https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-PoC
CVE-2021-4045
Author: 234329a423853
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
GitHub Link:
https://github.com/234329a423853/CVE-2021-4045
Author: 234329a423853
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
GitHub Link:
https://github.com/234329a423853/CVE-2021-4045
CVE-2025-55182
Author: trilogy-group
None
GitHub Link:
https://github.com/trilogy-group/react2shell-scan
Author: trilogy-group
None
GitHub Link:
https://github.com/trilogy-group/react2shell-scan
CVE-2013-0156.zip
2.3 KB
CVE-2013-0156
Author: 7s26simon
activesupport/coreext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
GitHub Link:
https://github.com/7s26simon/CVE-2013-0156
Author: 7s26simon
activesupport/coreext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
GitHub Link:
https://github.com/7s26simon/CVE-2013-0156
CVE-2025-13780.zip
2 KB
CVE-2025-13780
Author: zeropwn
None
GitHub Link:
https://github.com/zeropwn/pgadmin4-9.10-CVE-2025-13780
Author: zeropwn
None
GitHub Link:
https://github.com/zeropwn/pgadmin4-9.10-CVE-2025-13780