Explore >> Select a destination


You are here

blog.gitguardian.com
| | www.kiuwan.com
7.1 parsecs away

Travel
| | Discover how AI is transforming application security testing by automating processes, enhancing vulnerability detection, and improving overall security in this comprehensive guide.
| | www.greynoise.io
4.5 parsecs away

Travel
| | Find out more about CVE-2024-24919, a zero-day vulnerability in Check Point's Network Security gateway products that threat actors are exploiting in the wild.
| | patchstack.com
8.4 parsecs away

Travel
| | ?? A critical unpatched vulnerability in the TI WooCommerce Wishlist plugin allows unauthenticated file uploads and potential RCE. Over 100K sites affected. As usual, Patchstack users are protected. ???
| | blog.ikuamike.io
60.2 parsecs away

Travel
| Difficulty Release Date Author Intermediate 20 Aug 2019 Zayotic Summary For this box, some directory bruteforce is needed to discover some php files. One of the php files has an lfi vulnerability but can only be access by authenticating to the other page. The login form can be bypassed and we exploit the lfi. For that we poison ssh logs for exploitation to rce. For privilege escalation we exploit a python web app running locally as root using insecure deserialization of the cookie by jsonpickle.