- CVE-2024-56180: Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution
- CVE-2025-27103: Dataease Mysql JDBC Connection Parameters Not Verified Leads to Arbitrary File Read Vulnerability
- CVE-2025-46566: Dataease redshift JDBC Connection Remote Code Execution
- CVE-2025-27526: Apache InLong: JDBC Vulnerability For URLEncode and backspace bypass
- CVE-2025-27528: Apache InLong: JDBC Vulnerability for Invisible Character Bypass Leading to Arbitrary File Read
🎯
404 not found
Pinned Loading
-
JavaDecompiler
JavaDecompiler Public一个基于 Vineflower 引擎的多线程 Java 批量反编译工具,支持快速处理大量的 class 文件和 JAR 文件。
-
JDK-CodeQLDB-Builder
JDK-CodeQLDB-Builder Public使用 Docker 一键构建 JDK 源码的 CodeQL 数据库,方便使用 CodeQL 查找 JDK 中的数据。
-
Java_deserialize_vuln_lab
Java_deserialize_vuln_lab PublicForked from bit4woo/Java_deserialize_vuln_lab
Java 反序列化学习的实验代码 Java_deserialize_vuln_lab
Java
-
MYSQL_SQL_BYPASS_WIKI
MYSQL_SQL_BYPASS_WIKI PublicForked from aleenzz/MYSQL_SQL_BYPASS_WIKI
mysql注入,bypass的一些心得
-
utf-8-overlong-encoding
utf-8-overlong-encoding PublicForked from Whoopsunix/utf-8-overlong-encoding
抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组
Java
-
ysoserial-1
ysoserial-1 PublicForked from 957204459/ysoserial-1
此项目为su18大佬的仓库镜像,如有问题可发issuse删库
Java
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.

