Documentation
¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type Langflow ¶
Langflow exploits pre-auth RCE in Langflow's /api/v1/validate/code endpoint. Python exec via decorator injection (CVE-2025-3248).
type OpenDCIM ¶
OpenDCIM exploits SQL injection in openDCIM's install.php LDAP config update to achieve RCE via dot binary path poisoning (CVE-2026-28515/28516/28517).
func (*OpenDCIM) Check ¶
Check probes install.php accessibility and confirms SQLi via time-based test.
func (*OpenDCIM) ExecuteCommand ¶
ExecuteCommand injects a command via SQLi into the dot binary path and triggers it.
type SpringCloudFunc ¶
SpringCloudFunc exploits SpEL injection in Spring Cloud Function's routing-expression header (CVE-2022-22963).
func (*SpringCloudFunc) Check ¶
func (m *SpringCloudFunc) Check(run *sdk.Context) (sdk.CheckResult, error)
func (*SpringCloudFunc) Info ¶
func (m *SpringCloudFunc) Info() sdk.Info
Click to show internal directories.
Click to hide internal directories.