|
You are here |
blog.atx.name | ||
| | | | |
johnjhacking.com
|
|
| | | | | Credits Vulnerability Discovery John Chris Mack Exploit Development Stephen Chavez Robert Willis Identification Default credentials were discovered on an iRZ Mobile Router login page. Utilizing root:root gave us access to the administrative functionality for the device. Having administrative access allows for various manipulation. Any setting that can be modified by an administrator was accessible, but the function that caught specific interest was the "Crontabs" feature in the services tab. Exploiting c... | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | | |
nv1t.github.io
|
|
| | | | | I've identified a security concern within the self-hosted file sharing tool ProjectSend in the current version r1605. By exploiting a chain of vulnerabilities - including Cross-Site Scripting (XSS), Insecure Direct Object Reference (IDOR), and weaknesses in its change password implementation - an authenticated attacker can force a logged-in user to unknowingly change their account password, by clicking a link. But let me explain the attack in detail. | |
| | | | |
blog.thms.uk
|
|
| | | After days of debugging unexplained span usage in Sentry - despite an ultra-low sampling rate - I discovered `traceparent` headers in requests traced back to OpenAI. Turns out, it's always AI. | ||