Exploit for Grafana arbitrary file-read (CVE-2024-9264)
-
Updated
Oct 19, 2024 - Python
Exploit for Grafana arbitrary file-read (CVE-2024-9264)
認識 JWT 以及透過 Django 實戰 📝
CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server
CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server
Private Authenticated NPM Repository
Authenticated Remote Command Execution in Gitlab via GitHub import.
CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco
CVE-2023-34468: Remote Code Execution via DB Components in Apache NiFi
🤫 A protocol for an authenticated and encrypted message stream
CVE-2023-34212: Java Deserialization via JNDI Components in Apache NiFi
Our all new Posts app for chatting.. Styled and Secured. Sign Up today, Its Free. Just Click on the link below.
CVE-2024-22275: Partial File Read in VMware vCenter Server
A implementation of Authenticated Encryption of Lisp
CVE-2022-40635: Groovy Sandbox Bypass in CrafterCMS
Creates a CookieCollection object in PowerShell using the Json exported from the EditThisCookie browser extension.
Usermin 1.820 Exploit - RCE Authenticated
WordPress RCE - Authenticated XXE (CVE-2021-29447)
This project is a REST API for authentication and authorization, including support for two-factor authentication (2FA).
Add a description, image, and links to the authenticated topic page so that developers can more easily learn about it.
To associate your repository with the authenticated topic, visit your repo's landing page and select "manage topics."