bug-bounty480
google298
xss277
microsoft250
facebook213
rce159
apple152
exploit137
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
authentication-bypass65
stored-xss65
writeup61
reflected-xss57
browser55
react53
cloudflare52
ssrf51
phishing50
dos50
input-validation49
access-control49
cross-site-scripting48
node48
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
lfi34
vulnerability-disclosure34
idor34
html-injection33
reverse-engineering33
smart-contract-vulnerability32
race-condition32
clickjacking31
information-disclosure30
csp-bypass30
0
5/10
A researcher discovered a $1500 deserialization vulnerability in a JSF-based application by identifying unencrypted serialized Java objects in the javax.faces.ViewState parameter, then exploited it using the Jexboss tool to achieve remote code execution via an exposed JMX console.
deserialization
java-deserialization
jsf-viewstate
rce
remote-code-execution
jboss
java-server-faces
jexboss
bug-bounty
java-serialization
security-misconfiguration
Ashish Kunwar
Jexboss
JSF
MyFaces
Prototype 1.6.1
Bugcrowd
Burp Suite
Wappalyzer
0
7/10
bug-bounty
This article details a real-world RCE vulnerability chain on Adobe Experience Manager (AEM) 6.1, exploiting exposed Felix Console through dispatcher bypass (CVE-2016-0957), default credentials (admin/admin), and malicious OSGi bundle deployment. The author provides step-by-step methodology for gaining code execution without Java knowledge by using pre-built exploitation tools.
rce
adobe-experience-manager
aem
osgi
felix-console
dispatcher-bypass
cve-2016-0957
default-credentials
bundle-exploitation
bug-bounty
java-application
cms
security-misconfiguration
CVE-2016-0957
Adobe Experience Manager
AEM
Apache Felix
Apache Sling
OSGi
aem_hacker.py
aem-rce-bundle
Mikhail Egorov
0ang3el
Peter Adkins
Darkarnium
byq