0day icon indicating copy to clipboard operation
0day copied to clipboard

各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新

Results 5 0day issues
Sort by recently updated
recently updated
newest added

如现有poc 无法使用,可以留[Issue ](https://github.com/helloexp/0day/issues) 如果有未收录的poc ,可以新增poc,然后提交[PR](https://github.com/helloexp/0day/pulls) _具体项目参与方式,请参考[Contributing 指南_ ](https://github.com/helloexp/0day/blob/master/CONTRIBUTING.md) **谢谢** ,一个好的项目离不开大家的支持

bug
enhancement

**Bug 描述** 详细的bug 描述 **复现步骤** 1. 在哪个功能 '...' 2. 点击 '....' 3. 查看报错 **截图** 如果有截图,请添加在这里,方便复现 **额外信息** 补充关于bug 的额外信息

bug

**Bug 描述** https://github.com/helloexp/0day/tree/master/98-Linux%E6%8F%90%E6%9D%83/CVE-2023-35829 is a fake POC for that CVE instead it spreads malware. Please see https://nsfocusglobal.com/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack/ the sha256 hashes match

bug

(https://github.com/helloexp/0day/tree/master/00-CVE_EXP/CVE-2021-3157) Directory should be 3156 based on README.md in it.

bug