adminlove520
124 exploits
Active since Jan 2024
Python <3.14 - Path Traversal
StoreKeeper <14.4.4 - Unrestricted Upload
Chrome - Use After Free
Dataease < 2.10.10 - Authentication Bypass by Spoofing
Roundcube Webmail < 1.5.10 - Insecure Deserialization
Notepad++ <8.8.1 - Privilege Escalation
Redis < 6.2.20 - Use After Free
Ollama 0.6.7 - XSS
JGM Pandoc v3.6.4 - SSRF
Anysphere Cursor < 1.3 - OS Command Injection
Adobe Experience Manager Forms < 6.5.23.0 - Incorrect Authorization
Nestjs Devtools-integration < 0.2.1 - Command Injection
React Server Components <19.2.0 - RCE
React Server Components <19.3 - Info Disclosure
React Server Components <19.2.1 - DoS
Reolink - Command Injection
Reolink - Authentication Bypass by Spoofing
Reolink Desktop App 8.18.12 - Info Disclosure
Reolink desktop app - Info Disclosure
Microsoft Windows Server 2012 - Insecure Deserialization
Microsoft Configuration Manager 2403 < 5.00.9128.1037 - Authentication Bypass by Spoofing
Fortinet Fortiproxy < 7.0.22 - Signature Verification Bypass
Nagios Fusion <2024R2 - Auth Bypass
Nagios Fusion <2024R2 - Session Hijacking
GeographicLib 2.5 - Buffer Overflow