CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.
☆13Jan 7, 2025Updated last year
Alternatives and similar repositories for Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028
Users that are interested in Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- NixOS configurations☆10Nov 11, 2024Updated last year
- ☆13Mar 23, 2024Updated 2 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆31Mar 7, 2026Updated 3 weeks ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- ☆10Apr 24, 2024Updated last year
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- gdb cheat sheet☆25Dec 22, 2020Updated 5 years ago
- ☆17Mar 15, 2024Updated 2 years ago
- gemastik-xvii-final public repository☆23Oct 24, 2024Updated last year
- Libro de ejercicios de introducción a las redes neuronales☆19Feb 9, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CBC Bit-Flipping Attack Example with Python☆13Jun 14, 2023Updated 2 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- A cheap and easy to build digital Theremin☆10Jan 29, 2026Updated 2 months ago
- A centralized list of the various Potato Windows exploits.☆22Dec 30, 2024Updated last year
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Dockerized version of INetSim☆20Apr 24, 2023Updated 2 years ago
- ☆38Nov 2, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 智慧园区数字孪生平台手机端移动端。 前端实习项目。技术栈: cesium + echarts + vue2 +vant + less☆11Jul 25, 2022Updated 3 years ago
- Embed IPython to rescue your code.☆10Jul 11, 2025Updated 8 months ago
- CTF-Writeups☆11Mar 3, 2021Updated 5 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- ☆13Dec 6, 2020Updated 5 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆41Dec 1, 2025Updated 3 months ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the w…☆42Jul 31, 2025Updated 7 months ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 3 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆12May 7, 2025Updated 10 months ago
- BADNET: A Blockchain-Based Decentralized Anonymity Network☆11Jul 1, 2025Updated 8 months ago