Explore >> Select a destination


You are here

zero.lol
| | parsiya.net
2.0 parsecs away

Travel
| | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications.
| | blog.securityinnovation.com
4.5 parsecs away

Travel
| | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them.
| | blog.acrossecurity.com
4.2 parsecs away

Travel
| | Slow, But Moving In The Right Direction Since our presentation of COM server-based binary planting exploits at the Hack in the Box confe...
| | blog.talosintelligence.com
17.6 parsecs away

Travel
| Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019.