CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.
☆13Jan 7, 2025Updated last year
Alternatives and similar repositories for Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028
Users that are interested in Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- NixOS configurations☆10Nov 11, 2024Updated last year
- ☆13Mar 23, 2024Updated 2 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated 3 weeks ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- ☆10Apr 24, 2024Updated last year
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 3 years ago
- gdb cheat sheet☆25Dec 22, 2020Updated 5 years ago
- ☆17Mar 15, 2024Updated 2 years ago
- gemastik-xvii-final public repository☆23Oct 24, 2024Updated last year
- CBC Bit-Flipping Attack Example with Python☆13Jun 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Libro de ejercicios de introducción a las redes neuronales☆19Feb 9, 2026Updated 2 months ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- A cheap and easy to build digital Theremin☆10Jan 29, 2026Updated 2 months ago
- A centralized list of the various Potato Windows exploits.☆22Mar 31, 2026Updated 2 weeks ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆135Aug 20, 2018Updated 7 years ago
- Dockerized version of INetSim☆20Apr 24, 2023Updated 2 years ago
- ☆39Nov 2, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 智慧园区数字孪生平台手机端移动端。 前端实习项目。技术栈: cesium + echarts + vue2 +vant + less☆11Jul 25, 2022Updated 3 years ago
- Embed IPython to rescue your code.☆10Jul 11, 2025Updated 9 months ago
- CTF-Writeups☆11Mar 3, 2021Updated 5 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆40Dec 1, 2025Updated 4 months ago
- ☆13Dec 6, 2020Updated 5 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 2 months ago
- Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the w…☆42Jul 31, 2025Updated 8 months ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 3 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆12May 7, 2025Updated 11 months ago
- BADNET: A Blockchain-Based Decentralized Anonymity Network☆11Jul 1, 2025Updated 9 months ago