LangChain JS Arbitrary File Read Vulnerability
https://ift.tt/kvD3ysb
Submitted May 26, 2024 at 05:03AM by Standard_Arm_4476
via reddit https://ift.tt/jFKNzqn
https://ift.tt/kvD3ysb
Submitted May 26, 2024 at 05:03AM by Standard_Arm_4476
via reddit https://ift.tt/jFKNzqn
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
https://ift.tt/Oj51ivm
Submitted May 27, 2024 at 02:21PM by cfambionics
via reddit https://ift.tt/IWUzXyx
https://ift.tt/Oj51ivm
Submitted May 27, 2024 at 02:21PM by cfambionics
via reddit https://ift.tt/IWUzXyx
Ambionics
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable — while it didn't provide much leeway…
VS Code Extension: Convert Diagrams to Text Format | Better Code Documentation
https://ift.tt/cBTiXCU
Submitted May 27, 2024 at 06:53PM by mknined
via reddit https://ift.tt/KJBHZGy
https://ift.tt/cBTiXCU
Submitted May 27, 2024 at 06:53PM by mknined
via reddit https://ift.tt/KJBHZGy
Visualstudio
TexEtch - Visual Studio Marketplace
Extension for Visual Studio Code - Add beautiful diagrams drawn on draw.io to your code
Diagram to Text
Diagram to Text
Exploiting V8 at openECSC: A beginner-friendly journey from a memory corruption to a browser pwn
https://ift.tt/F0IAVEn
Submitted May 27, 2024 at 11:06PM by rebane2001
via reddit https://ift.tt/pw1g63s
https://ift.tt/F0IAVEn
Submitted May 27, 2024 at 11:06PM by rebane2001
via reddit https://ift.tt/pw1g63s
lyra's epic blog
Exploiting V8 at openECSC
A beginner-friendly journey from a memory corruption to a browser pwn.
Part 2: Threat Detection Engineering and Incident Response with AuditD and Sentinel — Combine Events by ID with Laurel before sending to Sentinel as JSON.
https://ift.tt/mEkjYCp
Submitted May 27, 2024 at 10:38PM by thattechkitten
via reddit https://ift.tt/FKnjrmC
https://ift.tt/mEkjYCp
Submitted May 27, 2024 at 10:38PM by thattechkitten
via reddit https://ift.tt/FKnjrmC
Medium
Part 2: Threat Detection Engineering and Incident Response with AuditD and Sentinel — Combine…
NOTE: This article is based off the following:
ManageEngine ADAudit - Reverse engineering Windows RPC to find CVEs - part 1 / RPC
https://ift.tt/l8jhnvx
Submitted May 28, 2024 at 12:08PM by ivxrehc
via reddit https://ift.tt/Yaj1cIz
https://ift.tt/l8jhnvx
Submitted May 28, 2024 at 12:08PM by ivxrehc
via reddit https://ift.tt/Yaj1cIz
Shelltrail
ManageEngine ADAudit - Reverse engineering Windows RPC to find CVEs - part 1 / RPC | Shelltrail
Follow along a journey to find vulnerabilities in the RPC functionaliy of ManageEngine ADAudit
Multiple vulnerabilities in Eclipse ThreadX
https://ift.tt/ycqIHV1
Submitted May 28, 2024 at 03:26PM by 0xdea
via reddit https://ift.tt/4lxKWd5
https://ift.tt/ycqIHV1
Submitted May 28, 2024 at 03:26PM by 0xdea
via reddit https://ift.tt/4lxKWd5
HN Security
Multiple vulnerabilities in Eclipse ThreadX - HN Security
Coordinated disclosure writeup about multiple vulnerabilities in Eclipse ThreadX (CVE-2024-2214, CVE-2024-2212, CVE-2024-2452).
CVE-2024-23108: Back Again! Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive, IOCs, and Exploit
https://ift.tt/NkrsvtD
Submitted May 28, 2024 at 06:05PM by scopedsecurity
via reddit https://ift.tt/xeLgMof
https://ift.tt/NkrsvtD
Submitted May 28, 2024 at 06:05PM by scopedsecurity
via reddit https://ift.tt/xeLgMof
Horizon3.ai
CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive
CVE-2024-23108 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.
Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2
https://ift.tt/bEa3Mdo
Submitted May 28, 2024 at 06:30PM by onlinereadme
via reddit https://ift.tt/UScMLdI
https://ift.tt/bEa3Mdo
Submitted May 28, 2024 at 06:30PM by onlinereadme
via reddit https://ift.tt/UScMLdI
Medium
Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2
This post, another lesson from the “Everyday Ghidra” series, walks through the process of configuring Ghidra to automatically download…
Non-Production Endpoints as an Attack Surface in AWS | Datadog Security Labs
https://ift.tt/L2guky9
Submitted May 28, 2024 at 08:40PM by RedTermSession
via reddit https://ift.tt/JBOI9SP
https://ift.tt/L2guky9
Submitted May 28, 2024 at 08:40PM by RedTermSession
via reddit https://ift.tt/JBOI9SP
Datadoghq
Non-Production Endpoints as an Attack Surface in AWS
Public disclose of CloudTrail bypass vulnerabilities we've found in AWS along with our research on using non-production API endpoints for defense evasion.
HardwareBreakPoint + Ekko ROP modified to hold stack arguments + Kernel Objects Enumeration for some honest hiding in memory.
https://ift.tt/EwZRp6P
Submitted May 29, 2024 at 11:07AM by oldboy21
via reddit https://ift.tt/PAJsGSL
https://ift.tt/EwZRp6P
Submitted May 29, 2024 at 11:07AM by oldboy21
via reddit https://ift.tt/PAJsGSL
oldboy21.github.io
SWAPPALA: Why Change When You Can Hide?
Hello everyone! It’s been a while, many things happening and not much time for coding. Hard times. Nonetheless I had little time frames for playing with some stuff I would define cool enough to write some lines about it. Last time we talked about Indirect…
CVE-2024-22058 Ivanti Landesk LPE - Mantodea Security
https://ift.tt/k3nhb07
Submitted May 29, 2024 at 07:09PM by flxflndy
via reddit https://ift.tt/QwFdMX9
https://ift.tt/k3nhb07
Submitted May 29, 2024 at 07:09PM by flxflndy
via reddit https://ift.tt/QwFdMX9
Mantodea Security
CVE-2024-22058 Ivanti Landesk LPE - Mantodea Security
In this post we describe a vulnerability we discovered in the Ivanti LanDesk software and how it can be exploited to achieve local privilege escalation via arbitrary code execution.
Ivanti disclosed the vulnerability in their advisory on May 28th 2024…
DDoS-as-a-Service: The Rebirth Botnet
https://ift.tt/M7U8qAI
Submitted May 29, 2024 at 06:41PM by Hallow_Rose
via reddit https://ift.tt/3uJQNAY
https://ift.tt/M7U8qAI
Submitted May 29, 2024 at 06:41PM by Hallow_Rose
via reddit https://ift.tt/3uJQNAY
Sysdig
DDoS-as-a-Service: The Rebirth Botnet | Sysdig
In March 2024, the Sysdig Threat Research Team. discovered Rebirth - an increasingly popular DDoS-as-a-Service botnet.
Post-Exploiting an F5 Big-IP: root, and now what?
https://ift.tt/GvVt0px
Submitted May 29, 2024 at 04:30PM by AlmondOffSec
via reddit https://ift.tt/r8zg75a
https://ift.tt/GvVt0px
Submitted May 29, 2024 at 04:30PM by AlmondOffSec
via reddit https://ift.tt/r8zg75a
XZ Utils 5.6.2 (stable), 5.4.7 (old stable), 5.2.13 (old old stable) have been released
https://ift.tt/b8sCUrX
Submitted May 30, 2024 at 01:31AM by Neustradamus
via reddit https://ift.tt/KYlci6a
https://ift.tt/b8sCUrX
Submitted May 30, 2024 at 01:31AM by Neustradamus
via reddit https://ift.tt/KYlci6a
Check Point - Wrong Check Point (CVE-2024-24919) - watchTowr Labs
https://ift.tt/RT6tHQl
Submitted May 30, 2024 at 07:36AM by dx7r__
via reddit https://ift.tt/GCbYnST
https://ift.tt/RT6tHQl
Submitted May 30, 2024 at 07:36AM by dx7r__
via reddit https://ift.tt/GCbYnST
watchTowr Labs
Check Point - Wrong Check Point (CVE-2024-24919)
Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze.
Check Point, for those unaware, is the…
Check Point, for those unaware, is the…
How to achieve passive persistence - part 2: outliving the krbtgt reset
https://ift.tt/ZU0EVDf
Submitted May 30, 2024 at 01:49PM by One-Assistance-8552
via reddit https://ift.tt/c7UJHID
https://ift.tt/ZU0EVDf
Submitted May 30, 2024 at 01:49PM by One-Assistance-8552
via reddit https://ift.tt/c7UJHID
Huntandhackett
How to Achieve Eternal Persistence Part 2: Outliving the Krbtgt Password Reset
In this blog, we welcome the return of the LM hash - which is still in use in specific scenarios even if it is explicitly disabled! - and demonstrate how to survive the reset of the krbtgt service account. Our goal is to learn whether it is possible to achieve…
Upgrade Citrix Workspace app for MaC to Mitigate CVE-2024-5027..
https://ift.tt/8ru5v6s
Submitted May 30, 2024 at 07:32PM by patchnow24x7
via reddit https://ift.tt/SX7T2Nw
https://ift.tt/8ru5v6s
Submitted May 30, 2024 at 07:32PM by patchnow24x7
via reddit https://ift.tt/SX7T2Nw
Things you wish you didn't need to know about S3
https://ift.tt/R51jVaX
Submitted May 31, 2024 at 08:55AM by dagrz-cloudsec
via reddit https://ift.tt/6dbH3TG
https://ift.tt/R51jVaX
Submitted May 31, 2024 at 08:55AM by dagrz-cloudsec
via reddit https://ift.tt/6dbH3TG
Plerion
Things you wish you didn't need to know about S3
S3 is weirder than you think. Make sure you know all the quirks before they turn into vulnerabilities in your AWS infrastructure.
Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection
https://ift.tt/PWGOoZI
Submitted May 31, 2024 at 08:15PM by Malwarebeasts
via reddit https://ift.tt/HTQ80tL
https://ift.tt/PWGOoZI
Submitted May 31, 2024 at 08:15PM by Malwarebeasts
via reddit https://ift.tt/HTQ80tL
Hudson Rock
Hudson Rock - Infostealer Intelligence Solutions
Powered by Hudson Rock's continuously augmented cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.
Hacks and Propaganda: Meet the Two Brothers Bringing Russia’s Digital War to Europe
https://ift.tt/QpimYhs
Submitted May 31, 2024 at 09:08PM by Substantial-Bag202
via reddit https://ift.tt/VWqoirS
https://ift.tt/QpimYhs
Submitted May 31, 2024 at 09:08PM by Substantial-Bag202
via reddit https://ift.tt/VWqoirS
CORRECTIV
Hacks and Propaganda: Meet the Two Brothers Bringing Russia’s Cyber War to Europe
Two Moldovan brothers’ companies, Stark Industries Solutions and PQ Hosting, provide technology for Russian propaganda and hacking attacks, a CORRECTIV investigation shows.