|
You are here |
github.com | ||
| | | | |
parsiya.net
|
|
| | | | | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications. | |
| | | | |
golb.hplar.ch
|
|
| | | | | ||
| | | | |
stribny.name
|
|
| | | | | ||
| | | | |
www.zerodayinitiative.com
|
|
| | | [AI summary] A vulnerability in NVIDIA Transformers4Rec allows remote code execution via deserialization of untrusted data, requiring user interaction to exploit. | ||