brokendreamsclub / CVE-2025-3515Links
WordPress File Upload RCE Exploit
☆15Updated 2 months ago
Alternatives and similar repositories for CVE-2025-3515
Users that are interested in CVE-2025-3515 are comparing it to the libraries listed below
Sorting:
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆42Updated 7 months ago
- cve-2024-42327 ZBX-25623☆36Updated 11 months ago
- tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp☆85Updated 10 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- PoC for CVE-2024-42327 / ZBX-25623☆17Updated 11 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated 2 years ago
- ☆42Updated last year
- ☆48Updated last year
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆45Updated last year
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information☆31Updated last year
- GiveWP PHP Object Injection exploit☆60Updated 9 months ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆77Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- GeoServer Remote Code Execution☆84Updated 7 months ago
- ☆89Updated 3 months ago
- Juniper Firewalls CVE-2023-36845 - RCE☆53Updated last year
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆61Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- ☆35Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 9 months ago
- LiteSpeed Cache Privilege Escalation PoC☆18Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆76Updated last year
- ☆59Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆92Updated 11 months ago
- ☆24Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆126Updated last year