# Exploits / PoC's

- [Ansible](/notes/exploits-pocs/ansible.md)
- [Ansible AWX](/notes/exploits-pocs/ansible/ansible-awx.md)
- [Apache](/notes/exploits-pocs/apache.md)
- [HTTP Server - CVE-2021-41773](/notes/exploits-pocs/apache/http-server-cve-2021-41773.md)
- [Struts - CVE-2024-53677 / S2-067](/notes/exploits-pocs/apache/struts-cve-2024-53677-s2-067.md)
- [Tomcat - CVE-2020-1938 / CVE-2020-10487](/notes/exploits-pocs/apache/tomcat-cve-2020-1938-cve-2020-10487.md)
- [Tomcat - CVE-2025-24813](/notes/exploits-pocs/apache/tomcat-cve-2025-24813.md)
- [AppArmor](/notes/exploits-pocs/apparmor.md)
- [CrackArmor LPE via Confused-Deputy and Sudo/Postfix](/notes/exploits-pocs/apparmor/crackarmor-lpe-via-confused-deputy-and-sudo-postfix.md)
- [ASP.NET](/notes/exploits-pocs/asp.net.md)
- [SOAPwn](/notes/exploits-pocs/asp.net/soapwn.md)
- [ViewState - CVE-2025-53770](/notes/exploits-pocs/asp.net/viewstate-cve-2025-53770.md)
- [Confluence - CVE-2023-22527](/notes/exploits-pocs/confluence-cve-2023-22527.md)
- [CUPS - CVE-2024-47\*\*\*](/notes/exploits-pocs/cups-cve-2024-47.md)
- [D-Link](/notes/exploits-pocs/d-link.md)
- [CVE-2020-29322](/notes/exploits-pocs/d-link/cve-2020-29322.md)
- [Decrypt firmware: DIR-X1560](/notes/exploits-pocs/d-link/decrypt-firmware-dir-x1560.md)
- [Dmidecode - CVE-2023-30630](/notes/exploits-pocs/dmidecode-cve-2023-30630.md)
- [Erlang](/notes/exploits-pocs/erlang.md)
- [OTP SSH - CVE-2025-32433](/notes/exploits-pocs/erlang/otp-ssh-cve-2025-32433.md)
- [EternalBlue - MS17-010](/notes/exploits-pocs/eternalblue-ms17-010.md)
- [FileCloud](/notes/exploits-pocs/filecloud.md)
- [Gitlab - CVE-2023-7028](/notes/exploits-pocs/gitlab-cve-2023-7028.md)
- [Golang](/notes/exploits-pocs/golang.md)
- [mholt/archiver](/notes/exploits-pocs/golang/mholt-archiver.md)
- [CVE-2024-0406](/notes/exploits-pocs/golang/mholt-archiver/cve-2024-0406.md)
- [CVE-2025-3445](/notes/exploits-pocs/golang/mholt-archiver/cve-2025-3445.md)
- [Ivanti - CVE-2024-21893 / 21887](/notes/exploits-pocs/ivanti-cve-2024-21893-21887.md)
- [Jenkins - CVE-2024-23897](/notes/exploits-pocs/jenkins-cve-2024-23897.md)
- [LXD group - N/A](/notes/exploits-pocs/lxd-group-n-a.md)
- [MongoDB](/notes/exploits-pocs/mongodb.md)
- [MongoBleed - CVE-2025-14847](/notes/exploits-pocs/mongodb/mongobleed-cve-2025-14847.md)
- [nf\_tables - CVE-2024-1086](/notes/exploits-pocs/nf_tables-cve-2024-1086.md)
- [NFS - N/A](/notes/exploits-pocs/nfs-n-a.md)
- [Node](/notes/exploits-pocs/node.md)
- [markdown-pdf - CVE-2023-0835](/notes/exploits-pocs/node/markdown-pdf-cve-2023-0835.md)
- [sanitize-html - CVE-2024-21501](/notes/exploits-pocs/node/sanitize-html-cve-2024-21501.md)
- [Oracle](/notes/exploits-pocs/oracle.md)
- [WebLogic - CVE-2018-2628](/notes/exploits-pocs/oracle/weblogic-cve-2018-2628.md)
- [WebLogic - CVE-2019-2729](/notes/exploits-pocs/oracle/weblogic-cve-2019-2729.md)
- [WebLogic - CVE-2023-21839](/notes/exploits-pocs/oracle/weblogic-cve-2023-21839.md)
- [WebLogic - CVE-2024-20931](/notes/exploits-pocs/oracle/weblogic-cve-2024-20931.md)
- [WebLogic - CVE-2024-21006](/notes/exploits-pocs/oracle/weblogic-cve-2024-21006.md)
- [Identity Manager - CVE-2025-61757](/notes/exploits-pocs/oracle/identity-manager-cve-2025-61757.md)
- [PHP](/notes/exploits-pocs/php.md)
- [CVE-2024-4577](/notes/exploits-pocs/php/cve-2024-4577.md)
- [React](/notes/exploits-pocs/react.md)
- [RSC - CVE-2025-55182](/notes/exploits-pocs/react/rsc-cve-2025-55182.md)
- [Native CLI - CVE-2025-11953](/notes/exploits-pocs/react/native-cli-cve-2025-11953.md)
- [RunC](/notes/exploits-pocs/runc.md)
- [CVE-2022-0811](/notes/exploits-pocs/runc/cve-2022-0811.md)
- [CVE-2024-21626](/notes/exploits-pocs/runc/cve-2024-21626.md)
- [Snap - CVE-2019-7304](/notes/exploits-pocs/snap-cve-2019-7304.md)
- [Sudo](/notes/exploits-pocs/sudo.md)
- [CVE-2025-32463](/notes/exploits-pocs/sudo/cve-2025-32463.md)
- [TP-Link - CVE-2024-5035](/notes/exploits-pocs/tp-link-cve-2024-5035.md)
- [VMware](/notes/exploits-pocs/vmware.md)
- [CVE-2025-41244](/notes/exploits-pocs/vmware/cve-2025-41244.md)
