In the name of God
This gist contains steps to setup Ubuntu 22.04
for deep learning.
#!/usr/bin/python3 | |
# Exploit Title: fuelCMS 1.4.1 - Remote Code Execution | |
# Date: 2019-07-19 | |
# Exploit Author: 0xd0ff9 | |
# Vendor Homepage: https://www.getfuelcms.com/ | |
# Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1 | |
# Version: <= 1.4.1 | |
# Tested on: Ubuntu - Apache2 - php5 | |
# CVE : CVE-2018-16763 |
@import url("https://fonts.googleapis.com/css2?family=Poppins:wght@100;200;300;400;500;600;700;800;900&family=Work+Sans:wght@100;200;300;400;500;600;700;800;900&display=swap"); | |
@tailwind base; | |
@tailwind components; | |
@tailwind utilities; | |
:root { | |
--blue-rgb: 237 245 255; | |
--green-rgb: 125 161 35; | |
} |
from pwn.toplevel import remote, log | |
# Get ciphertext from encryption oracle for chosen username and password, and submit | |
# ciphertext as solution optionally | |
def get_username_password_ciphertext(username,password,ciphertext_to_submit = None): | |
r = remote(host,port) | |
r.sendafter("username: ",username) | |
r.sendafter("password: ",password) | |
r.recvuntil("Leaked ciphertext: ") | |
ciphertext = r.recvline().decode().rstrip() |