# CVE - POC

*Your Lazy Guide to Exploits & Fixes!*

Welcome to VeryLazyTech’s CVE - POC headquarters! Here, we break down the latest cybersecurity vulnerabilities and proofs of concept (POCs) so you don’t have to sweat the details. Explore exploits, grab resources from our shop, or join our crew to hack smarter, not harder.

**Become a VeryLazyTech** [**Member**](https://shop.verylazytech.com/l/Membership)**! 🎁** \
\&#xNAN;*Unlock exclusive POC breakdowns, e-books, and discounts—because lazy wins.*

***

## Latest Vulnerabilities & POCs

*Stay ahead of the game, the lazy way.*

Dive into our curated list of CVEs and POCs—fresh exploits, dissected for your convenience. Want the full scoop? Members get detailed write-ups and mitigation tips!

* [Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692](/vulnerabilities-and-exploits/cve-poc/cve-2024-23692.md)**Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692**\
  \&#xNAN;*Remote code execution, no login needed. Lazy hackers rejoice!*
* [POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal](/vulnerabilities-and-exploits/cve-poc/poc-cve-2024-4956-nexus-repository-manager-3-unauthenticated-path-traversal.md)**POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal**\
  \&#xNAN;*Sneak into files without creds—proof included!*
* [POC - CVE-2024-45241: Path Traversal in CentralSquare's CryWolf](/vulnerabilities-and-exploits/cve-poc/poc-cve-2024-45241-path-traversal-in-centralsquares-crywolf.md)**POC - CVE-2024-45241: Path Traversal in CentralSquare's CryWolf**\
  \&#xNAN;*Traversal made simple. Watch the paths unfold.*
* [Telerik Auth Bypass CVE-2024-4358](/vulnerabilities-and-exploits/cve-poc/telerik-auth-bypass-cve-2024-4358.md)**Telerik Report Server Authentication Bypass - CVE-2024-4358**\
  \&#xNAN;*Skip the login, see the reports. Too easy.*
* [Check Point Security Gateways Information Disclosure - CVE-2024-24919](/vulnerabilities-and-exploits/cve-poc/check-point-security-gateways-information-disclosure-cve-2024-24919.md)**Check Point Security Gateways Information Disclosure - CVE-2024-24919**\
  \&#xNAN;*Leaky gateways spilling secrets—peek inside.*
* [CVE-2024-23897 - Jenkins File Read Vulnerability](/vulnerabilities-and-exploits/cve-poc/cve-2024-23897-jenkins-file-read-vulnerability.md)**CVE-2024-23897 - Jenkins File Read Vulnerability**\
  \&#xNAN;*Read any file on Jenkins? Yep, it’s that bad.*
* [CVE-2024–10914- Command Injection Vulnerability in name parameter for D-Link NAS](/vulnerabilities-and-exploits/cve-poc/cve-2024-10914-command-injection-vulnerability-in-name-parameter-for-d-link-nas.md)**CVE-2024–10914 - Command Injection Vulnerability in name parameter for D-Link NAS**\
  \&#xNAN;*Inject commands via a sneaky parameter. Done.*
* [POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE)](/vulnerabilities-and-exploits/cve-poc/poc-cve-2024-21534-jsonpath-plus-vulnerable-to-remote-code-execution-rce.md)**POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE)**\
  \&#xNAN;*RCE in a JSON parser—lazy exploit heaven.*
* [CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary](/vulnerabilities-and-exploits/cve-poc/cve-2024-9935-pdf-generator-addon-for-elementor-page-builder-less-than-1.7.5-unauthenticated-arbitra.md)**CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary**\
  \&#xNAN;*Arbitrary access, no auth. PDF chaos awaits.*
* [CVE-2024-50623- Cleo Unrestricted file upload and download](/vulnerabilities-and-exploits/cve-poc/cve-2024-50623-cleo-unrestricted-file-upload-and-download.md)**CVE-2024-50623 - Cleo Unrestricted File Upload and Download**\
  \&#xNAN;*Upload, download, no limits—wild west vibes.*
* [POC - WordPress File Upload plugin, in the wfu\_file\_downloader.php file before version <= 4.24.11](/vulnerabilities-and-exploits/cve-poc/poc-wordpress-file-upload-plugin-in-the-wfu_file_downloader.php-file-before-version-less-than-4.24.1.md)**POC - WordPress File Upload plugin, in the wfu\_file\_downloader.php file before version <= 4.24.11**\
  \&#xNAN;*WordPress plugin flaw—file uploads gone rogue.*

**Want More Details?** [**Join Now!** ](https://shop.verylazytech.com)

***

## Level Up Your Cybersecurity Game

*From exploits to expertise, we’ve got it all.*

#### Visit Our Shop! 📚

Turn vulnerabilities into victories with our e-books and courses:

* *E-Books*: “Exploiting CVEs Like a Pro” and more.
* *Courses*: Master RCE, path traversal, and beyond—lazily.\
  **Browse the** [**Shop Now**](https://shop.verylazytech.com)

#### Follow Us On:

Catch the latest exploits and lazy-tech hacks:

* **✖ Twitter**: [@VeryLazyTech](https://twitter.com/VeryLazyTech) – Real-time CVE drops.
* **👾 GitHub**: [@VeryLazyTech](https://github.com/VeryLazyTech) – POC code to play with.
* **📜 Medium**: [@VeryLazyTech](https://medium.com/@VeryLazyTech) – Deep CVE breakdowns.
* **📺 YouTube**: [@VeryLazyTech](https://youtube.com/@VeryLazyTech) – Watch us exploit live.
* **📩 Telegram**: [@VeryLazyTech](https://t.me/VeryLazyTech) – Instant POC alerts.
* **🕵️‍♂️ My Site**: [@VeryLazyTech](https://www.verylazytech.com) – Your lazy-tech home.

#### Support Us! ☕

Fuel our CVE hunting with a coffee—or a whole pot! Every sip keeps the exploits coming.\
[**My Shop**](https://shop.verylazytech.com)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.verylazytech.com/vulnerabilities-and-exploits/cve-poc.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
