Explore >> Select a destination


You are here

blog.0patch.com
| | parsiya.net
2.9 parsecs away

Travel
| | [AI summary] A security engineer explains why 'style points' like unquoted service paths or 404 injection are not real vulnerabilities and clarifies the distinction between code injection at current privilege levels versus actual privilege escalation.
| | srcincite.io
2.9 parsecs away

Travel
| | Some time ago Ron Bowes found a vulnerability in Cisco WebEx Meetings Desktop App that could allow local privilege escalation, or, if you have a user account...
| | foxglovesecurity.com
3.5 parsecs away

Travel
| | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a...
| | www.securityjourney.com
18.6 parsecs away

Travel
| In this article, we compare the various methods that are used to detect vulnerabilities