Recent Posts
I am done. It's over.
Substack
4Chan bypass?
/emacs/ general
Forking jschan to submit a PR for captcha logic
This is Huge
PRICE OF INTERNET IN 1995
Motorola and Graphene linked up
HAPPENING
CPchads
JEEFICATION OF GSOC
Minecraft source code leaked
where do i get CRT monitor ??
Shifting to linux mint
Androidfags zara idhar aana
Sarvam is now proven to be a disappointment
XHDATA D-808 DX-ing setup, analogue modulation
i don't understand
RCE on Pocketbase possible?
AI Impact Summit 2026
Simple Linux General /slg/ - Useful Commands editi...
/wpg/ - Windows & Powershell General
Sarvam Apology Thread
Some cool tech in my college
the hmd touch 4g
Holy Shit
Saar american companies have best privacy saaar
/g/ related blogpost - backup thread
Android Hygiene
My favorite game rn
COOKED
Are we getting real 5g?
I want to create my own forum but I don't know how...
Is my psu not compatible with my mobo?
/i2pg/ - I2P general
RCE on Pocketbase possible?
2JeWbY
No.3172
Yaaron I am doing vulnerability testing for a product and I got one endpoint on which I manage to get read/write access by grepping access token via curl. I tried .py and .php code for admin level execution but I failed.
Pocketbase runs on go and I am a retard who can't write go for RCE (remote code execution). I don't know if go will work in RCE. So what should I do to get admin = "true" so that I can use pb CLI with admin token as payload , once there I can try to execute shell commands and possibly create ssh keys
or maybe I should give up :(
sqrvwV
No.3190
Maybe it is
wAKyen
No.3192
>>3172(OP)
You got read write perms ? Report it,
Wtf do you mean by .py and php code there's no interpreted runtime in go where you can inject and execute arbitrary code.
Cot8bx
No.3365
>>3172(OP)
what even are you talking about? R/W by "grep"ing access token? what?





















































