|
You are here |
zero.lol | ||
| | | | |
parsiya.net
|
|
| | | | | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications. | |
| | | | |
blog.securityinnovation.com
|
|
| | | | | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them. | |
| | | | |
blog.acrossecurity.com
|
|
| | | | | Slow, But Moving In The Right Direction Since our presentation of COM server-based binary planting exploits at the Hack in the Box confe... | |
| | | | |
blog.talosintelligence.com
|
|
| | | Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019. | ||