cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

Advertising posts
237
Subscribers
No data24 hours
No data7 days
No data30 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Photo unavailableShow in Telegram
💥Payloads Arsenal for Penetration Tester and Bug Bounty Hunters is a collection payloads from various popular and well known sources
Show all...
Photo unavailableShow in Telegram
Photo unavailableShow in Telegram
💥CVE-2022-38374(XSS in Fortinet FortiADC 7.0.0 - 7.0.2 and 6.2.0 - 6.2.4) PoC exploit. It allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffic and event logviews
Show all...
Photo unavailableShow in Telegram
🔥🔥🔥[Kafka Connect] [JdbcSinkConnector][HttpSinkConnector] RCE by leveraging file upload via SQLite JDBC driver and SSRF to internal Jolokia 🔥🔥🔥PoCs The Aiven JDBC sink includes the SQLite JDBC Driver. This JDBC driver can be used to upload SQLite database files onto the server. The HTTP sink connector allows sending HTTP requests to localhost. There is unprotected Jolokia listening on localhost:6725. JMX exports the com.sun.management:type=DiagnosticCommand MBean, which contains the jvmtiAgentLoad operation. This operation can be used to execute the SQLite database as JVM Agent by embedding the JVM Agent JAR file inside the SQLite database as an BLOB field in a table. 📕Hacking Aiven managed services for fun and profit
Show all...