Exploit for Grafana arbitrary file-read (CVE-2024-9264)
-
Updated
Oct 19, 2024 - Python
Exploit for Grafana arbitrary file-read (CVE-2024-9264)
CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server
認識 JWT 以及透過 Django 實戰 📝
CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco
CVE-2023-34212: Java Deserialization via JNDI Components in Apache NiFi
CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server
Our all new Posts app for chatting.. Styled and Secured. Sign Up today, Its Free. Just Click on the link below.
Reverse proxy for Loki with proper Grafana API authentication
A implementation of Authenticated Encryption of Lisp
Authenticated Remote Command Execution in Gitlab via GitHub import.
Creates a CookieCollection object in PowerShell using the Json exported from the EditThisCookie browser extension.
MAGNOLIA-8281: FreeMarker Restriction Bypass 2 in Magnolia CMS
CVE-2022-24442: FreeMarker Server-Side Template Injection in JetBrains YouTrack
CVE-2021-46365: Unsafe XML Parsing in Magnolia CMS
CVE-2024-22275: Partial File Read in VMware vCenter Server
CVE-2021-42562: Improper Access Control in MITRE Caldera
Make an Authentication Request to login API Handle login API Response. login success and login failure. Store JWT token
Built this responsive application using MERN Stack. Only authenticated users can view the contact list & it also has an infinity scrolling and skeleton while loading.
Usermin 1.820 Exploit - RCE Authenticated
Add a description, image, and links to the authenticated topic page so that developers can more easily learn about it.
To associate your repository with the authenticated topic, visit your repo's landing page and select "manage topics."