CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Forwarded from ELEMENT-/-11
Pakistan's Economics...Moody.pdf
1.7 MB
๐˜พ๐™๐™š๐™˜๐™ ๐™ค๐™ช๐™ฉ ๐™‰๐™š๐™ฌ ๐™„๐˜ฟ๐™Š๐™ ๐™๐™š๐™จ๐™ฉ-๐˜พ๐™–๐™จ๐™š๐™จ

๐™‡๐™ž๐™ฃ๐™ :https://twitter.com/thecybertix/status/1676464147855470593?t=YLFOU7Rw4bqo2dzGQZV77w&s=19
๐˜ฟ๐™ค ๐™ฎ๐™ค๐™ช ๐™ ๐™ฃ๐™ค๐™ฌ ๐™’๐™๐™–๐™ฉ ๐™ž๐™จ " ๐˜ฟ๐™Š๐™ˆ ๐˜พ๐™ก๐™ค๐™—๐™—๐™š๐™ง๐™ž๐™ฃ๐™œ" ? ๐Ÿค”๐Ÿค”

๐˜พ๐™๐™š๐™˜๐™  ๐™ฉ๐™๐™ž๐™จ ๐™Š๐™ช๐™ฉ:
https://youtube.com/shorts/rysHaowv6Bk?feature=share
๐Ÿ’ฅGeoServer SQL Injection Vulnerability Analysis (CVE-2023-25157)

SQL Injection Vulnerabilities have been found with:
๐Ÿ’พ PropertyIsLike filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled
๐Ÿ’พ strEndsWith function, when used with a PostGIS DataStore with encode functions enabled
๐Ÿ’พ strStartsWith function, when used with a PostGIS DataStore with encode functions enabled
๐Ÿ’พ FeatureId filter, when used with any database table having a String primary key column and when prepared statements are disabled
๐Ÿ’พ jsonArrayContains function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only)
๐Ÿ’พ DWithin filter, when used with an Oracle DataStore


๐Ÿ”–CVE-2023-25157 - GeoServer SQL Injection - PoC

Usage:
python3 CVE-2023-25157.py <URL>
System32.ink on The maintenance

We will be start it after 6 days
๐Ÿ‘4
๐Ÿ’ฅRCE in GitLab's CLI tool

Attack scenario:
1๏ธโƒฃAttacker creates a repository. They create a branch named "@|calc".
2๏ธโƒฃTo make the attack more convincing, they set this branch as the default branch.
3๏ธโƒฃVictim clones the repository on their machine.
4๏ธโƒฃVictim tries to create an MR using glab mr create --web
5๏ธโƒฃThe following command is run: cmd.exe /c "start https://gitlab.com/test-user/test-repo/-/merge_requests/new?merge_request[title]=%s^&amp;merge_request[description]=%s^&amp;merge_request[source_branch]=%s^&amp;merge_request[target_branch]=@|calc^&amp;merge_request[source_project_id]=%d^&amp;merge_request[target_project_id]=%d".
6๏ธโƒฃThe pipe character allows to break out of the URL context and launch calc.
Forwarded from ๐˜พ.๐˜ฟ.๐™„ (๐™๐™€๐™Ž๐™Š๐™๐™๐˜พ๐™€๐™Ž) ๐Ÿšฉ
AAJ INTEHAAN HAI SABKA BADA SHIKAR HAI ISKO SAZA DILWANI HAI ISNE KYA KIYA WO KHUD JAKE TWEET PE DEKHLENA VIDEO HAI

JITNE RETWEETS HO SKE KRWA DO MUMBAI POLICE KO TAG KRK

LINK - RETWEET
๐Ÿ‘1
If you Need TryHackMe Voucher At a Cheapest Rate in the Market...โœ…

1 Month Voucher = 1.25$ & 100โ‚น

2 Month Voucher =  3$ & 250โ‚น

3 Month Voucher = 5$ & 415โ‚น

Payment Method ๐Ÿ‘‘

BTC๐Ÿ’ธ, USDt๐Ÿ’ธ, UPI ๐ŸŒ


Dm ๐Ÿ‘ผ@lexlegion๐Ÿ‘ผ

Limited 2 & 3 month Vouchers Remains...

Grab Your Oppertunity Fast๐Ÿ“
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ2