CVE-2021-43258
ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit
🌐 Github
#CVE #RemoteCode #Exploit #Php
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit
#CVE #RemoteCode #Exploit #Php
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
vBulletin_5.5.2
vBulletin 5.5.2 PHP Object Injection Exploit
🌐 Github
#RemoteCode #Exploit #Php #Injection
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
vBulletin 5.5.2 PHP Object Injection Exploit
#RemoteCode #Exploit #Php #Injection
Please open Telegram to view this post
VIEW IN TELEGRAM
VMware-NSX-Manager-XStream
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit
CVE :🌐 Github
#RemoteCode #Exploit #Php #Injection
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit
CVE :
CVE-2021-39144
#RemoteCode #Exploit #Php #Injection
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2025-49113 - Roundcube Remote Code Execution
A proof-of-concept exploit for CVE-2025-49113, a remote code execution vulnerability in Roundcube Webmail.
💬 Description:
This exploit targets a deserialization vulnerability in Roundcube Webmail versions 1.5.0 through 1.6.10. The vulnerability allows an authenticated attacker to execute arbitrary code on the server.
🏴☠️ Vulnerable Versions:
⚪️ 1.5.0 - 1.5.9
⚪️ 1.6.0 - 1.6.10
🖇 Requirements:
⚪️ PHP 7.0 or higher
⚪️ cURL extension enabled
⚪️ Target running a vulnerable version of Roundcube
💻 Usage:
🔼 Example:
Github
⬇️ Download
🔒
#CVE #PHP #RemoteCode
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
A proof-of-concept exploit for CVE-2025-49113, a remote code execution vulnerability in Roundcube Webmail.
💬 Description:
This exploit targets a deserialization vulnerability in Roundcube Webmail versions 1.5.0 through 1.6.10. The vulnerability allows an authenticated attacker to execute arbitrary code on the server.
🏴☠️ Vulnerable Versions:
⚪️ 1.5.0 - 1.5.9
⚪️ 1.6.0 - 1.6.10
🖇 Requirements:
⚪️ PHP 7.0 or higher
⚪️ cURL extension enabled
⚪️ Target running a vulnerable version of Roundcube
💻 Usage:
php CVE-2025-49113.php <url> <username> <password> <command>
🔼 Example:
php CVE-2025-49113.php https://localhost/roundcube/ admin password "id"
Github
⬇️ Download
🔒
BugCod3#CVE #PHP #RemoteCode
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
⚡4❤3🔥3