BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
CVE-2021-43258
ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit

🌐Github

#CVE #RemoteCode #Exploit #Php

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
vBulletin_5.5.2
vBulletin 5.5.2 PHP Object Injection Exploit

🌐Github

#RemoteCode #Exploit #Php #Injection

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
VMware-NSX-Manager-XStream
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit

CVE : CVE-2021-39144

🌐Github

#RemoteCode #Exploit #Php #Injection

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2025-49113 - Roundcube Remote Code Execution

A proof-of-concept exploit for CVE-2025-49113, a remote code execution vulnerability in Roundcube Webmail.

💬 Description:
This exploit targets a deserialization vulnerability in Roundcube Webmail versions 1.5.0 through 1.6.10. The vulnerability allows an authenticated attacker to execute arbitrary code on the server.

🏴‍☠️ Vulnerable Versions:
⚪️ 1.5.0 - 1.5.9
⚪️ 1.6.0 - 1.6.10

🖇 Requirements:
⚪️ PHP 7.0 or higher
⚪️ cURL extension enabled
⚪️ Target running a vulnerable version of Roundcube

💻 Usage:
php CVE-2025-49113.php <url> <username> <password> <command>


🔼 Example:
php CVE-2025-49113.php https://localhost/roundcube/ admin password "id"


Github

⬇️ Download
🔒 BugCod3

#CVE #PHP #RemoteCode

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
43🔥3