Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

All Activity

This stream auto-updates

  1. Past hour
  2. Today
  3. Yesterday
  4. [Hidden Content] Telegram Channel: @databasefromstorm My telegram: @BrowzData
  5. Palo Alto OS was recently hit by a command injection zero day attack. These are exploitation details related to the zero day.View the full article
  6. This is a scanning script to validate vulnerable Palo Alto OS systems for the recent zero day command injection vulnerability.View the full article
  7. pgAdmin versions 8.3 and below have a path traversal vulnerability within their session management logic that can allow a pickled file to be loaded from an arbitrary location. This can be used to load a malicious, serialized Python object to execute code within the context of the target application. This exploit supports two techniques by which the payload can be loaded, depending on whether or not credentials are specified. If valid credentials are provided, Metasploit will login to pgAdmin and upload a payload object using pgAdmin's file management plugin. Once uploaded, this payload is executed via the path traversal before being deleted using the file management plugin. This technique works for both Linux and Windows targets. If no credentials are provided, Metasploit will start an SMB server and attempt to trigger loading the payload via a UNC path. This technique only works for Windows targets. For Windows 10 v1709 (Redstone 3) and later, it also requires that insecure outbound guest access be enabled. Tested on pgAdmin 8.3 on Linux, 7.7 on Linux, 7.0 on Linux, and 8.3 on Windows. The file management plugin underwent changes in the 6.x versions and therefore, pgAdmin versions below 7.0 cannot utilize the authenticated technique whereby a payload is uploaded.View the full article
  8. Does such an instrument get very hot with different AV or EDR?
  9. Last week
  10. NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly. Technical Implementation Injection into Command Prompt (cmd): The tool injects its code into the Command Prompt process, embedding it as Position Independent Code (PIC). This enables seamless integration into cmd's memory space, ensuring covert operation without reliance on specific memory addresses. (Only for The Obfuscated Executable in the releases page) Windows API Hooking: Detours are utilized to intercept calls to the CreateProcessW function. By redirecting the execution flow to a custom implementation, the tool can execute its logic before the original Windows API function. Custom Process Creation Function: Upon intercepting a CreateProcessW call, the custom function is executed, creating the new process and manipulating its arguments as necessary. PEB Modification: Within the custom process creation function, the Process Environment Block (PEB) of the newly created process is accessed and modified to achieve the goal of manipulating or hiding the process arguments. Execution Redirection: Upon completion of the manipulations, the execution seamlessly returns to Command Prompt (cmd) without any interruptions. This dynamic redirection ensures that subsequent commands entered undergo manipulation discreetly, evading detection and logging mechanisms that relay on getting the process details from the PEB. Installation and Usagre [hide][Hidden Content]]
  11. [Hidden Content] Telegram Channel: @databasefromstorm My telegram: @BrowzData
  12. S3CURITY RAT v0.1.0 ( IRAQI RAT ) Looks like Nj RAT :D PREVIEW DOWNLOAD: upload.ee: [hide][Hidden Content]]
  13. Centreon version 23.10-1.el8 suffers from a remote authenticated SQL injection vulnerability.View the full article
  14. Backdoor.Win32.Dumador.c malware suffers from a buffer overflow vulnerability.View the full article
  15. The password of database connections in AWS Glue is loaded into the website when a connection's edit page is requested. Principals with appropriate permissions can read the password. This behavior also increases the risk that database passwords will be intercepted by an attacker during transmission in the server response. Many types of vulnerabilities, such as broken access controls, cross site scripting and weaknesses in session handling, could enable an attacker to leverage this behavior to retrieve the passwords.View the full article
  16. This Metasploit exploit module leverages an improperly controlled modification of dynamically-determined object attributes vulnerability (CVE-2023-43177) to achieve unauthenticated remote code execution. This affects CrushFTP versions prior to 10.5.1. It is possible to set some user's session properties by sending an HTTP request with specially crafted Header key-value pairs. This enables an unauthenticated attacker to access files anywhere on the server file system and steal the session cookies of valid authenticated users. The attack consists in hijacking a user's session and escalates privileges to obtain full control of the target. Remote code execution is obtained by abusing the dynamic SQL driver loading and configuration testing feature.View the full article
  17. GLPI versions 10.x.x suffers from a remote command execution vulnerability via the shell commands plugin.View the full article
  18. WordPress WP Video Playlist plugin version 1.1.1 suffers from a persistent cross site scripting vulnerability.View the full article
  19. BMC Compuware iStrobe Web version 20.13 suffers from a remote shell upload vulnerability.View the full article
  20. Kruxton version 1.0 suffers from a remote SQL injection vulnerability.View the full article
  21. Kruxton version 1.0 suffers from a remote shell upload vulnerability.View the full article
  22. WBCE version 1.6.0 suffers from a remote SQL injection vulnerability.View the full article
  23. I am facing the same problem if you can share us the password for this file would be appreciated!
  24. AMPLE BILLS version 0.1 suffers from a remote SQL injection vulnerability.View the full article
  25. PrusaSlicer versions 2.6.1 and below suffer from an arbitrary code execution vulnerability.View the full article
  26. Moodle version 3.10.1 suffers from a remote time-based SQL injection vulnerability.View the full article
  1. Load more activity
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.