OSCP | OSWE | OSEP | CRTO | eWPTXv2 | eMAPT | eJPT | DCPT
- CVE-2017-14135 - Command Injection | Open DreamBox
- CVE-2020-23648 - Account Takeover | ASUS RT-N12E
- CVE-2022-1810 - Improper Access Control | Publify
- CVE-2022-1811 - Bypass Restriction and File Upload Leads to XSS Stored | Publify
- CVE-2022-2062 - SSRF Via SMTP Plugin | NocoDB
- CVE-2022-2063 - Account Takeover via Webhook Handlebars + API Reset Password | NocoDB
- CVE-2022-40798 - Account Takeover | OcoMon
- CVE-2023-33558 - User enumeration | OcoMon
- CVE-2023-33559 - File Inclusion allow Remote Code Execution | OcoMon
#!/usr/bin/env python
from base64 import b64decode
import pickle
def AboutMe():
serialized = "gASVNQAAAAAAAAB9lCiMBE5hbWWUjAtKb25hdGFzIEZpbJSMA0FnZZRLFYwHQ291bnRyeZSMBkJyYXppbJR1Lg=="
my_data = pickle.loads(b64decode(serialized))
print(my_data)
if __name__ == ("__main__"):
AboutMe()