Skip to content
View h3h3qaq's full-sized avatar
🎯
404 not found
🎯
404 not found

Block or report h3h3qaq

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
H3h3QAQ/README.md

Hi, I'm h3h3qaq 👋

Just a noob

  • CVE-2024-56180: Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution
  • CVE-2025-27103: Dataease Mysql JDBC Connection Parameters Not Verified Leads to Arbitrary File Read Vulnerability​
  • CVE-2025-46566: Dataease redshift JDBC Connection Remote Code Execution
  • CVE-2025-27526: Apache InLong: JDBC Vulnerability For URLEncode and backspace bypass
  • CVE-2025-27528: Apache InLong: JDBC Vulnerability for Invisible Character Bypass Leading to Arbitrary File Read


Pinned Loading

  1. JavaDecompiler JavaDecompiler Public

    一个基于 Vineflower 引擎的多线程 Java 批量反编译工具,支持快速处理大量的 class 文件和 JAR 文件。

    Java 55 2

  2. JDK-CodeQLDB-Builder JDK-CodeQLDB-Builder Public

    使用 Docker 一键构建 JDK 源码的 CodeQL 数据库,方便使用 CodeQL 查找 JDK 中的数据。

    Shell 20

  3. Java_deserialize_vuln_lab Java_deserialize_vuln_lab Public

    Forked from bit4woo/Java_deserialize_vuln_lab

    Java 反序列化学习的实验代码 Java_deserialize_vuln_lab

    Java

  4. MYSQL_SQL_BYPASS_WIKI MYSQL_SQL_BYPASS_WIKI Public

    Forked from aleenzz/MYSQL_SQL_BYPASS_WIKI

    mysql注入,bypass的一些心得

  5. utf-8-overlong-encoding utf-8-overlong-encoding Public

    Forked from Whoopsunix/utf-8-overlong-encoding

    抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组

    Java

  6. ysoserial-1 ysoserial-1 Public

    Forked from 957204459/ysoserial-1

    此项目为su18大佬的仓库镜像,如有问题可发issuse删库

    Java