techghoshal's profile picture. Hi I am Anindya Ghoshal, About me I Just Tech Guy..

Anindya Ghoshal 🇮🇳

@techghoshal

Hi I am Anindya Ghoshal, About me I Just Tech Guy..

Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-1023 - critical 🚨 ChurchCRM - SQL Injection > A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execu... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-55190 - critical 🚨 ArgoCD Project API Token Repository Credentials Exposure > Argo CD API tokens with project-level permissions are able to retrieve sensitive repo... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

Look at the irony of India ! Sonam Wangchuk is named among Time's 100 most influential climate leaders of 2025 . And the Narendra Modi government has the audacity to jail him for a crime he never committed .

RavinderKapur2's tweet image. Look at the irony of India !

Sonam Wangchuk is named among Time's 100 most influential climate leaders of 2025 .

And the Narendra Modi government has the audacity to jail him for a crime he never committed .

Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-32429 - critical 🚨 XWiki Platform - SQL Injection > XWiki Platform is a generic wiki platform offering runtime services for applications ... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

💀RCE via Python Code Injection: ✅ POC: { "name": "darkshadow", "args": {}, "json_schema": {"type": "object", "properties": {}}, "source_code": "def darkshadow():\n import os\n data='0'.encode('utf-8')\n return ''+os.popen('id').read()" } Join my BugBounty…

darkshadow2bd's tweet image. 💀RCE via Python Code Injection:

✅ POC:
{
  "name": "darkshadow",
  "args": {},
  "json_schema": {"type": "object", "properties": {}},
"source_code": "def darkshadow():\n    import os\n    data='0'.encode('utf-8')\n    return ''+os.popen('id').read()"
}

Join my BugBounty…

Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-41243 - critical 🚨 Spring Cloud Gateway Server Webflux - Broken Access Control > Spring Cloud Gateway Server Webflux contains a vulnerability caused by unsecured and ... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

One month since #SonamWangchuk has been arrested.

1vinci6le's tweet image. One month since #SonamWangchuk has been arrested.

Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-24354 - medium 🚨 Imgproxy < 3.27.2 - Server-Side Request Forgery (SSRF) > imgproxy contains an issue caused by not blocking the 0.0.0.0 address even when IMGPR... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-54236 - critical 🚨 Adobe Commerce - Authentication Bypass > Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-48703 - critical 🚨 CWP (Control Web Panel) < 0.9.8.1205 - Remote Code Execution > CWP (Control Web Panel) < 0.9.8.1205 contains a remote code execution caused by shell... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

Ivanti unauthenticated RCE 🙂, shodan favicon dorks:github.com/yoryio/ShodanF… exploit:shorturl.at/1L16Y For Education Purpose Only! #InfoSec #bugbountytips #BugBounty #rce

assa2940's tweet image. Ivanti unauthenticated RCE 🙂, shodan favicon dorks:github.com/yoryio/ShodanF… exploit:shorturl.at/1L16Y
For Education Purpose Only!
#InfoSec #bugbountytips #BugBounty #rce

Anindya Ghoshal 🇮🇳 reposted

It’s not SECMOL or HIAL that have violated the FCRA but the ruling Govt and the Opposition in 2015 by accepting illegal donations. But since they were in power, they changed the FCRA Act to suit their case and went scot-free! Can the MHA explain this? #releaseSonamWangchuk


Anindya Ghoshal 🇮🇳 reposted

Many people are mislead by fake news spreader & paid influencer about this Solar heated tent : It’s a tent made by Sonam Wangchuk for Indian Army, he built this with his own money and gift to Army .. Rest it’s upto consumer if they feel good they will use .. & he never said it’s…


Anindya Ghoshal 🇮🇳 reposted

Revoke NSA Free Sonam Wangchuk Release Sonam Wangchuk


Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2021-30116 - critical 🚨 Kaseya VSA < 9.5.7 - Credential Disclosure via Windows Agent > Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in Jul... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

Release Sonam Wangchuk ⁦@Wangchuk66

darlindawn1's tweet image. Release Sonam Wangchuk ⁦@Wangchuk66⁩
darlindawn1's tweet image. Release Sonam Wangchuk ⁦@Wangchuk66⁩
darlindawn1's tweet image. Release Sonam Wangchuk ⁦@Wangchuk66⁩
darlindawn1's tweet image. Release Sonam Wangchuk ⁦@Wangchuk66⁩

Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2023-3519 - critical 🚨 Citrix NetScaler ADC and NetScaler Gateway - Remote Code Execution > critical unauthenticated remote code execution (RCE) vulnerability affecting Citrix A... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2023-6655 - high 🚨 Hongjing e-HR 2020 - SQL Injection > A vulnerability, which was classified as critical, has been found in Hongjing e-HR 20... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Anindya Ghoshal 🇮🇳 reposted

This Diwali, do not buy Firecrackers! For all the people who talk about 'gyan mat pel' 👇


Anindya Ghoshal 🇮🇳 reposted

🚨 CVE-2025-11371 - medium 🚨 Gladinet CentreStack & TrioFox - Local File Inclusion > In the default installation and configuration of Gladinet CentreStack and TrioFox, th... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Loading...

Something went wrong.


Something went wrong.