- CVE-2024-56180: Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution
- CVE-2025-27103: Dataease Mysql JDBC Connection Parameters Not Verified Leads to Arbitrary File Read Vulnerability
- CVE-2025-46566: Dataease redshift JDBC Connection Remote Code Execution
- CVE-2025-27526: Apache InLong: JDBC Vulnerability For URLEncode and backspace bypass
- CVE-2025-27528: Apache InLong: JDBC Vulnerability for Invisible Character Bypass Leading to Arbitrary File Read
Pinned Loading
-
JavaDecompiler
JavaDecompiler Public一个基于 Vineflower 引擎的多线程 Java 批量反编译工具,支持快速处理大量的 class 文件和 JAR 文件。
-
JDK-CodeQLDB-Builder
JDK-CodeQLDB-Builder Public使用 Docker 一键构建 JDK 源码的 CodeQL 数据库,方便使用 CodeQL 查找 JDK 中的数据。
Shell 20
-
Java_deserialize_vuln_lab
Java_deserialize_vuln_lab PublicForked from bit4woo/Java_deserialize_vuln_lab
Java 反序列化学习的实验代码 Java_deserialize_vuln_lab
Java
-
MYSQL_SQL_BYPASS_WIKI
MYSQL_SQL_BYPASS_WIKI PublicForked from aleenzz/MYSQL_SQL_BYPASS_WIKI
mysql注入,bypass的一些心得
-
utf-8-overlong-encoding
utf-8-overlong-encoding PublicForked from Whoopsunix/utf-8-overlong-encoding
抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组
Java
-
ysoserial-1
ysoserial-1 PublicForked from 957204459/ysoserial-1
此项目为su18大佬的仓库镜像,如有问题可发issuse删库
Java
If the problem persists, check the GitHub status page or contact support.