尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49113.yaml | POC详情 |
| 2 | Detection for CVE-2025-49113 | https://github.com/rxerium/CVE-2025-49113 | POC详情 |
| 3 | CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization | https://github.com/Ademking/CVE-2025-49113-nuclei-template | POC详情 |
| 4 | None | https://github.com/fearsoff-org/CVE-2025-49113 | POC详情 |
| 5 | None | https://github.com/rasool13x/exploit-CVE-2025-49113 | POC详情 |
| 6 | CVE-2025-49113 exploit | https://github.com/SyFi/CVE-2025-49113 | POC详情 |
| 7 | Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113). | https://github.com/hakaioffsec/CVE-2025-49113-exploit | POC详情 |
| 8 | Proof-of-concept to CVE-2025-49113 | https://github.com/BiiTts/Roundcube-CVE-2025-49113 | POC详情 |
| 9 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/Yuri08loveElaina/CVE-2025-49113 | POC详情 |
| 10 | CVE-2025-49113 | https://github.com/B1ack4sh/Blackash-CVE-2025-49113 | POC详情 |
| 11 | Explicação + Lab no THM | https://github.com/5kr1pt/Roundcube_CVE-2025-49113 | POC详情 |
| 12 | None | https://github.com/punitdarji/roundcube-cve-2025-49113 | POC详情 |
| 13 | A powerful Python scanner to detect CVE-2025-49113 vulnerability in Roundcube Webmail. Developed by Issam Junior (@issamiso). | https://github.com/issamjr/CVE-2025-49113-Scanner | POC详情 |
| 14 | None | https://github.com/hackmelocal/HML-CVE-2025-49113-Round-Cube | POC详情 |
| 15 | None | https://github.com/Joelp03/CVE-2025-49113 | POC详情 |
| 16 | None | https://github.com/hackmelocal/CVE-2025-49113-Simulation | POC详情 |
| 17 | 💥 Python Exploit for CVE-2025-49113 | Roundcube Webmail RCE via PHP Object Injection | https://github.com/00xCanelo/CVE-2025-49113 | POC详情 |
| 18 | None | https://github.com/CyberQuestor-infosec/CVE-2025-49113-Roundcube_1.6.10 | POC详情 |
| 19 | This is a rewritten exploit to work with php | https://github.com/SteamPunk424/CVE-2025-49113-Roundcube-RCE-PHP | POC详情 |
| 20 | POC of CVE-2025-49113 | https://github.com/Zwique/CVE-2025-49113 | POC详情 |
| 21 | Python Script for CVE-2025-49113. Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/AC8999/CVE-2025-49113 | POC详情 |
| 22 | Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization | https://github.com/LeakForge/CVE-2025-49113 | POC详情 |
| 23 | None | https://github.com/Zuack55/Roundcube-1.6.10-Post-Auth-RCE-CVE-2025-49113- | POC详情 |
| 24 | CVE-2025-49113 - Roundcube Remote Code Execution | https://github.com/l4f2s4/CVE-2025-49113_exploit_cookies | POC详情 |
| 25 | Hands-on exploitation lab for Roundcube Webmail CVE-2025-49113 (authenticated PHP object deserialization → RCE) to read /secret.txt. | https://github.com/ankitpandey383/roundcube-cve-2025-49113-lab | POC详情 |
| 26 | CVE-2025-49113 | https://github.com/Ashwesker/Blackash-CVE-2025-49113 | POC详情 |
| 27 | CVE-2025-49113 | https://github.com/Ashwesker/Ashwesker-CVE-2025-49113 | POC详情 |
| 28 | None | https://github.com/Evillm/CVE-2025-49113-PoC | POC详情 |
未找到公开 POC。
登录以生成 AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.