Explore >> Select a destination


You are here

palant.info
| | swordbytes.com
2.0 parsecs away

Travel
| | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application.
| | statuscode.ch
3.9 parsecs away

Travel
| | Recently I took a look atAtom, a text editor by GitHub. With a little bit of work, I was able to chain multiple vulnerabilities in Atom into an actual Remote Code Execution. The vulnerabilities have been fixed in the1.21.1 release on October 12th, 2017after I reported it via theirHackerOne program. In case you want to...
| | guard.io
2.5 parsecs away

Travel
| | [AI summary] The article discusses a vulnerability in Opera's browser extensions, allowing malicious extensions to exploit private APIs by masquerading as harmless puppy-themed extensions in the Chrome Store. The attack involves a multi-stage process, including a hidden command in a URL hash and base64 encoding of exploit code, which was successfully deployed and later mitigated by Opera. The incident highlights the need for stronger extension store security, including real identity verification for developers and continuous post-approval monitoring.
| | murtezayesil.me
32.4 parsecs away

Travel
| Use of any content on this site is forbidden for artificial intelligence and machine learning training. It doesnt matter whether whoever building the AI model is willing to attribute all data used in their dataset in a public forum and willing to share their resulting