Static Code Injections in OpenCart (CVE-2023-47444)
https://ift.tt/0CmQE7A
Submitted November 15, 2023 at 05:03AM by UsedSite2578
via reddit https://ift.tt/gAm07Pu
https://ift.tt/0CmQE7A
Submitted November 15, 2023 at 05:03AM by UsedSite2578
via reddit https://ift.tt/gAm07Pu
0xbro
Static Code Injections in OpenCart (CVE-2023-47444)
In OpenCart versions 4.0.0.0 to 4.0.2.3, authenticated backend users having common/security access and modify privileges can write arbitrary untrusted data inside config.php and admin/config.php, resulting in remote code execution on the underlying server.
Microsoft Edge VR - Escaping the sandbox: A bug that speaks for itself
https://ift.tt/jobA6uZ
Submitted November 15, 2023 at 02:52PM by poltess0
via reddit https://ift.tt/Ve62h3D
https://ift.tt/jobA6uZ
Submitted November 15, 2023 at 02:52PM by poltess0
via reddit https://ift.tt/Ve62h3D
Microsoft Browser Vulnerability Research
Escaping the sandbox: A bug that speaks for itself
Introduction
Reptar: an Intel Ice Lake CPU vulnerability, by Tavis Ormandy
https://ift.tt/NmdchfU
Submitted November 15, 2023 at 02:42PM by poltess0
via reddit https://ift.tt/YyVUNXm
https://ift.tt/NmdchfU
Submitted November 15, 2023 at 02:42PM by poltess0
via reddit https://ift.tt/YyVUNXm
Cmpxchg8B
Reptar
Executing from Memory Using ActiveMQ CVE-2023-46604
https://ift.tt/Pb0lhs1
Submitted November 15, 2023 at 08:15PM by chicksdigthelongrun
via reddit https://ift.tt/810Y2Kq
https://ift.tt/Pb0lhs1
Submitted November 15, 2023 at 08:15PM by chicksdigthelongrun
via reddit https://ift.tt/810Y2Kq
VulnCheck
Executing from Memory Using ActiveMQ CVE-2023-46604 - Blog - VulnCheck
VulnCheck finds a new way to exploit ActiveMQ CVE-2023-46604 that allows the attacker to hide in memory and avoid process-based detections.
windows arbitrary MSR write and kernel-memory write
https://ift.tt/Onl1eEZ
Submitted November 15, 2023 at 07:42PM by meowerguy
via reddit https://ift.tt/NVD6azm
https://ift.tt/Onl1eEZ
Submitted November 15, 2023 at 07:42PM by meowerguy
via reddit https://ift.tt/NVD6azm
GitHub
CVE-2023-36427/report.md at main · tandasat/CVE-2023-36427
Report and exploit of CVE-2023-36427. Contribute to tandasat/CVE-2023-36427 development by creating an account on GitHub.
A Simple Python Redirection Container for Red Team Operations
https://ift.tt/23MjSx8
Submitted November 15, 2023 at 09:27PM by RoseSec_
via reddit https://ift.tt/g0czPAk
https://ift.tt/23MjSx8
Submitted November 15, 2023 at 09:27PM by RoseSec_
via reddit https://ift.tt/g0czPAk
GitHub
Red-Teaming-TTPs/Redirection_Containers.md at main · RoseSecurity/Red-Teaming-TTPs
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike! - RoseSecurity/Red-Teaming-TTPs
Ransomware group breaches company, reports them to SEC for failure to disclose
https://ift.tt/AEfIlDa
Submitted November 16, 2023 at 07:51AM by AviN456
via reddit https://ift.tt/T4yolzG
https://ift.tt/AEfIlDa
Submitted November 16, 2023 at 07:51AM by AviN456
via reddit https://ift.tt/T4yolzG
www.databreaches.net
AlphV files an SEC complaint against MeridianLink for not disclosing a breach to the SEC (2)
Earlier today, AlphV added MeridianLink to their leak site. MeridianLink (MLNK) is the provider of a loan origination system and digital lending platform for...
Accessing Azure Kubernetes Service as Guest and Cross-Tenant
https://ift.tt/EDS946p
Submitted November 16, 2023 at 08:11PM by cbagdude
via reddit https://ift.tt/5xtWZTB
https://ift.tt/EDS946p
Submitted November 16, 2023 at 08:11PM by cbagdude
via reddit https://ift.tt/5xtWZTB
Binary Security AS
Accessing Azure Kubernetes Service as Guest and Cross-Tenant
In our research, Binary Security found a weakness in Azure Kubernetes Service (AKS) that allows Guest users or third-party apps to access the AKS API without getting assigned any specific roles. Microsoft originally responded that it “does not meet the definition…
From email to phone number, a new OSINT approach - Martin Vigo
https://ift.tt/iZwpGNW
Submitted November 16, 2023 at 09:40PM by n3w57ake
via reddit https://ift.tt/CYyUS7s
https://ift.tt/iZwpGNW
Submitted November 16, 2023 at 09:40PM by n3w57ake
via reddit https://ift.tt/CYyUS7s
Martin Vigo
From email to phone number, a new OSINT approach - Martin Vigo
How to find out someone's phone number if you just know their email address and how it can be automated using a new OSINT tool: email2phonenumber
AI-Exploits: Repo of exploits for multiple critical unauth'd RCEs in AI tools
https://ift.tt/hypLiu2
Submitted November 16, 2023 at 10:16PM by FlyingTriangle
via reddit https://ift.tt/cHrYXQd
https://ift.tt/hypLiu2
Submitted November 16, 2023 at 10:16PM by FlyingTriangle
via reddit https://ift.tt/cHrYXQd
GitHub
GitHub - protectai/ai-exploits: A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities - GitHub - protectai/ai-exploits: A collection of real world AI/ML exploits for responsibly disclosed vulnerabil...
I analyzed Stack Overflow for leaks
https://ift.tt/NjhHxFA
Submitted November 16, 2023 at 09:51PM by matan-h
via reddit https://ift.tt/isCHd6J
https://ift.tt/NjhHxFA
Submitted November 16, 2023 at 09:51PM by matan-h
via reddit https://ift.tt/isCHd6J
Matan-h
I analyzed stackoverflow
I analyzed stackoverflow for secrets and leaks.
Plundering Postman with Porch Pirate
https://ift.tt/8NXPEak
Submitted November 17, 2023 at 12:01AM by EffectiveEmpty5618
via reddit https://ift.tt/7GsRZHB
https://ift.tt/8NXPEak
Submitted November 17, 2023 at 12:01AM by EffectiveEmpty5618
via reddit https://ift.tt/7GsRZHB
Mand Consulting Group
Plundering Postman with Porch Pirate - Mand Consulting Group Inc.
Porch Pirate is a Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to public workspaces, collections, requests, users and teams. Porch Pirate can be used as a client…
CrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chain
https://ift.tt/9rSfbh2
Submitted November 16, 2023 at 08:14PM by After_Performer7638
via reddit https://ift.tt/Jcwdfkg
https://ift.tt/9rSfbh2
Submitted November 16, 2023 at 08:14PM by After_Performer7638
via reddit https://ift.tt/Jcwdfkg
Converge Technology Solutions
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
Zero-day vulnerabilities chain in CrushFTP (CVE-20-23-43177) uncovered by Converge Red Team requires immediate attention with these remediation steps.
Analyzing the security posture of thousands of AWS, Azure and Google Cloud environments
https://ift.tt/GPS9gI3
Submitted November 17, 2023 at 12:58AM by thorn42
via reddit https://ift.tt/KqFrl6c
https://ift.tt/GPS9gI3
Submitted November 17, 2023 at 12:58AM by thorn42
via reddit https://ift.tt/KqFrl6c
Datadog
State of Cloud Security | Datadog
We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
HavocC2 Exploit
https://ift.tt/0GAWCSl
Submitted November 17, 2023 at 07:05AM by syncwithali
via reddit https://ift.tt/4HczSsR
https://ift.tt/0GAWCSl
Submitted November 17, 2023 at 07:05AM by syncwithali
via reddit https://ift.tt/4HczSsR
GitHub
GitHub - syncwithali/HavocExploit: A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.
A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc. - syncwithali/HavocExploit
DIALStranger: my research about DIAL protocol vulnerabilities is public after 4 years
https://ift.tt/pEvxC15
Submitted November 17, 2023 at 11:51PM by ynscdrc
via reddit https://ift.tt/f25mW6Z
https://ift.tt/pEvxC15
Submitted November 17, 2023 at 11:51PM by ynscdrc
via reddit https://ift.tt/f25mW6Z
GitHub
GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities
details about DIAL protocol vulnerabilities . Contribute to yunuscadirci/DIALStranger development by creating an account on GitHub.
Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)
https://ift.tt/Qzmfgcy
Submitted November 18, 2023 at 08:10PM by monoimpact
via reddit https://ift.tt/IaKziVt
https://ift.tt/Qzmfgcy
Submitted November 18, 2023 at 08:10PM by monoimpact
via reddit https://ift.tt/IaKziVt
Sonarsource
Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)
We took a look at the security of the most popular code editor, Visual Studio Code! This blog post covers vulnerabilities our researchers discovered in third-party extensions.
Building a Free Burp Collaborator with Cloudflare Workers
https://ift.tt/MAnHr1g
Submitted November 19, 2023 at 09:58AM by gabriel_schneider
via reddit https://ift.tt/uJd73lK
https://ift.tt/MAnHr1g
Submitted November 19, 2023 at 09:58AM by gabriel_schneider
via reddit https://ift.tt/uJd73lK
blog.gbrls.space
gbrls's blog
gbrls's hacking blog
Mockingjay revisisted - Process stomping on an executable's RWX section and loading beacon with sRDI
https://ift.tt/MWxIHQO
Submitted November 19, 2023 at 06:49PM by naksyn_
via reddit https://ift.tt/b0ImNoL
https://ift.tt/MWxIHQO
Submitted November 19, 2023 at 06:49PM by naksyn_
via reddit https://ift.tt/b0ImNoL
Naksyn’s blog
Mockingjay revisisted - Process stomping and loading beacon with sRDI
Executables with RWX sections can be abused using a variation of a Process Overwriting technique dubbed Process Stomping. Using (a modified) sRDI and leveraging the new features of Cobalt Strike 4.9 has been possible to load beacon in the RWX section itself…
CVE-2023-45878: Vulnerability in Gibbon Edu Leads to Unauthenticated RCE
https://ift.tt/oyGn9F5
Submitted November 20, 2023 at 01:53PM by usdAG
via reddit https://ift.tt/YNVfhWU
https://ift.tt/oyGn9F5
Submitted November 20, 2023 at 01:53PM by usdAG
via reddit https://ift.tt/YNVfhWU
usd HeroLab
usd-2023-0025 - usd HeroLab
Advisory ID: usd-2023-0025 (CVE-2023-45878) | Product: Gibbon Edu | Vulnerability Type: Arbitrary File Write (CWE-434)
Persistence - Scheduled Task Tampering
https://ift.tt/4x6mnci
Submitted November 20, 2023 at 03:04PM by netbiosX
via reddit https://ift.tt/0jmXyF9
https://ift.tt/4x6mnci
Submitted November 20, 2023 at 03:04PM by netbiosX
via reddit https://ift.tt/0jmXyF9
Penetration Testing Lab
Persistence – Scheduled Task Tampering
Windows Task Scheduler enables windows users and administrators to perform automated tasks at specific time intervals. Scheduled tasks has been commonly abused as a method of persistence by threat …