CVE ID : CVE-2021-41773
System : Apache
Type : RCE and path traversal
Severity : 7.5 high
Exploit :
System : Apache
Type : RCE and path traversal
Severity : 7.5 high
Exploit :
PoC 1
PoC 2
GitHub
GitHub - iilegacyyii/PoC-CVE-2021-41773
Contribute to iilegacyyii/PoC-CVE-2021-41773 development by creating an account on GitHub.
❤4
CVE ID : CVE-2018-18441
System : D-Link
Type : Broken access control
Severity : 7.5 high
Exploit :
System : D-Link
Type : Broken access control
Severity : 7.5 high
Exploit :
PoC
PoC
GitHub
GitHub - AIDENTHOMASboi/CVE-2018-18441-exploit: 🔍 Exploit CVE-2018-18441 to access sensitive configuration data from vulnerable…
🔍 Exploit CVE-2018-18441 to access sensitive configuration data from vulnerable D-Link DCS series Wi-Fi cameras without authentication. - AIDENTHOMASboi/CVE-2018-18441-exploit
🔥6
CVE ID : CVE-2025-50154
System : windows OS
Type : Broken access control
Severity : medium
Exploit :
System : windows OS
Type : Broken access control
Severity : medium
Exploit :
PoC
Video
GitHub
GitHub - rubenformation/CVE-2025-50154: POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer…
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch - ...
👍2
Forwarded from CVE
+50 wordpress exp loit
ㅤㅤDrupal exp loit
ㅤㅤJoomla exp loit
+350 rats 🐀
Checkers for different Platforms ✅
SMTP sender and Cracker
5$/ 3 days ✅
10$/week ✅
20$/month ✅
Contact @linuxdebain
@CVEvouches