CVE ID : CVE-2025-53964
System : GoldenDict - 1.5.0, 1.5.1
Type : reading Local files
Severity : Critical
Exploit :
System : GoldenDict - 1.5.0, 1.5.1
Type : reading Local files
Severity : Critical
Exploit :
PoC
GitHub
GitHub - tigr78/CVE-2025-53964
Contribute to tigr78/CVE-2025-53964 development by creating an account on GitHub.
❤2
Forwarded from CVE
CVE ID : CVE-2025-61882 & CVE-2025-61884
System : Oracle
Type : RCE
Severity : Critical
Exploit :
#zero_day
#0day
System : Oracle
Type : RCE
Severity : Critical
Exploit :
Detection nuclei template
#zero_day
#0day
GitHub
GitHub - rxerium/CVE-2025-61882-CVE-2025-61884: Detection for CVE-2025-61882
Detection for CVE-2025-61882. Contribute to rxerium/CVE-2025-61882-CVE-2025-61884 development by creating an account on GitHub.
❤2
CVE ID : CVE-2021-41773
System : Apache
Type : RCE and path traversal
Severity : 7.5 high
Exploit :
System : Apache
Type : RCE and path traversal
Severity : 7.5 high
Exploit :
PoC 1
PoC 2
GitHub
GitHub - iilegacyyii/PoC-CVE-2021-41773
Contribute to iilegacyyii/PoC-CVE-2021-41773 development by creating an account on GitHub.
❤4
CVE ID : CVE-2018-18441
System : D-Link
Type : Broken access control
Severity : 7.5 high
Exploit :
System : D-Link
Type : Broken access control
Severity : 7.5 high
Exploit :
PoC
PoC
GitHub
GitHub - AIDENTHOMASboi/CVE-2018-18441-exploit: 🔍 Exploit CVE-2018-18441 to access sensitive configuration data from vulnerable…
🔍 Exploit CVE-2018-18441 to access sensitive configuration data from vulnerable D-Link DCS series Wi-Fi cameras without authentication. - AIDENTHOMASboi/CVE-2018-18441-exploit
🔥6
CVE ID : CVE-2025-50154
System : windows OS
Type : Broken access control
Severity : medium
Exploit :
System : windows OS
Type : Broken access control
Severity : medium
Exploit :
PoC
Video
GitHub
GitHub - rubenformation/CVE-2025-50154: POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer…
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch - ...
Forwarded from Tab
@secsnap
سرور های کرکی و قانونی
@VPSfarsi
کتابخانه و دوره های امنیت
@LibrarySecOfficial
ابزار و دوره های اوسینت
@OsintGit
آموزش باگ بانتی
@BackupLso
اموزش رد تیم
@RedTeamVillageRtv
برنامه نویسی فارسی
@CyberSecLF
پنتست وب
@secabuser3
تحلیل آسیب پذیری
@skull_memories
ابزارهای هک وای فای / گوشی
@Ripper_sec
ماشین لرنینگ
@cypack
هک دیتابیس و دامپ کمبو
@Haackir
شبیه سازی حملات ردتیم و APT
@DarkBitx
شرح آسیب پذیری CVE
@openSource3
@VPSfarsi
فیلتر شکن با قیمت مناسب
@nickavpn
شبکه های کامپیوتری
@network_secsnap
@secsnap
Please open Telegram to view this post
VIEW IN TELEGRAM