[local] is-localhost-ip 2.0.0 - SSRF
ATT&CK techniques detected
T1203Exploitation for Client Execution
53%
"url? url = < url > ", " get / secret " ], " port " : 3005 } ` ` ` # reproduce : [ href ] ( https : / / github. com / nu11secur1ty / windows11exploits / tree / main / 2025 / cve - 2025 - 9960 ) # demo : [ href ] ( https : / / www. patreon. com / posts / cve - 2025 - 9960 - is - 14…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
35%
"powered - by : express content - type : application / json ; charset = utf - 8 content - length : 33 etag : w / " 21 - 6j4oicvq6z + 6nx0wetdhqqeeklm " date : sun, 09 nov 2025 09 : 29 : 34 gmt connection : keep - alive keep - alive : timeout = 5 { " error " : " localhost not allow…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
30%
"url? url = < url > ", " get / secret " ], " port " : 3005 } ` ` ` # reproduce : [ href ] ( https : / / github. com / nu11secur1ty / windows11exploits / tree / main / 2025 / cve - 2025 - 9960 ) # demo : [ href ] ( https : / / www. patreon. com / posts / cve - 2025 - 9960 - is - 14…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
is-localhost-ip 2.0.0 - SSRF