Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-68645 | https://github.com/Ashwesker/Blackash-CVE-2025-68645 | POC Details |
| 2 | Zimbra Collaboration (ZCS) 10.0 and 10.1 contain a local file inclusion caused by improper handling of user-supplied parameters in the RestFilter servlet, letting unauthenticated remote attackers include arbitrary files from WebRoot, exploit requires crafted requests to /h/rest endpoint. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-68645.yaml | POC Details |
| 3 | CVE-2025-68645 | https://github.com/Ashwesker/Ashwesker-CVE-2025-68645 | POC Details |
| 4 | Academic proof-of-concept demonstrating CVE-2025-68645 for authorized security research. | https://github.com/chinaxploiter/CVE-2025-68645-PoC | POC Details |
| 5 | CVE-2025-68645 - A Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration | https://github.com/MaxMnMl/zimbramail-CVE-2025-68645-poc | POC Details |
| 6 | None | https://github.com/faysalferdous/CVE-2025-68645-Exploiting-Zimbra-Webmail-LFI-Vulnerability | POC Details |
| 7 | None | https://github.com/CMEGh0stX47/CVE-2025-68645 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet