{"uuid": "2605b18d-3d78-49dd-9162-9c2ecf14cd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21234", "type": "published-proof-of-concept", "source": "https://t.me/freelearningtech/556", "content": "FROM INTERNET\n\n1)Easy SQLi in Amazon subsidiary using Sqlmap\nhttps://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b\n\n2)Bypass File Upload Restrictions\nHow to Get a Shell on a Website using a File [Tutorial]\nhttps://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb\n\n3)Cross-site request forgery (CSRF)\nhttps://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded\n\n4)How to Exploit Public Firebase Realtime Database using REST API\nhttps://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55\n\n5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal\nhttps://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/\n\n6)Awesome PostgreSQL\nhttps://reconshell.com/awesome-postgresql/\n\n7)Web cache poisoning bug discovered in Symfony PHP framework\nhttps://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework\n\n8)Artificial Intelligence\nhttps://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf\n\n9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)\nhttps://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&amp;utm_medium=email&amp;utm_source=Revue%20newsletter\n\n:OSCP EXAM:\n1)OSCP Exam Change\nhttps://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&amp;utm_medium=social&amp;utm_source=facebook&amp;hss_channel=fbp-132187200151961\n2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory\nhttps://www.youtube.com/watch?v=uvqdSGlwEkA", "creation_timestamp": "2021-12-03T16:24:33.000000Z"}