♾️
{"amount":1,"amount":-1}
Hi, I'm Bipin Jitiya, I build random things. I love hacking.
Pinned Loading
-
-
CVE-2023-43261
CVE-2023-43261 PublicCVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption
-
Meta-Owned-IT-Assets
Meta-Owned-IT-Assets PublicCurated list of Meta (formerly Facebook) owned IT assets
-
CVE-2017-5638
CVE-2017-5638 PublicApache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script
-
GitHub-Leaked-API-Keys-and-Secrets.md
GitHub-Leaked-API-Keys-and-Secrets.md 1# GitHub Search Syntax for Finding API Keys/Secrets/Tokens
2As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
34## Search Syntax:
5 -
CVE-2023-21939 - Code Exec - Proof o...
CVE-2023-21939 - Code Exec - Proof of Concept 1# CVE-2023-21939 - Code Exec - Proof of Concept
2**Vulnerability Summary:**
3Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.
45**Steps to Reproduce:**:
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.