|
You are here |
positive.security | ||
| | | | |
nv1t.github.io
|
|
| | | | | I've identified a security concern within the self-hosted file sharing tool ProjectSend in the current version r1605. By exploiting a chain of vulnerabilities - including Cross-Site Scripting (XSS), Insecure Direct Object Reference (IDOR), and weaknesses in its change password implementation - an authenticated attacker can force a logged-in user to unknowingly change their account password, by clicking a link. But let me explain the attack in detail. | |
| | | | |
alesandroortiz.com
|
|
| | | | | Alesandro Ortiz: Software Engineer. Security Researcher. | |
| | | | |
statuscode.ch
|
|
| | | | | Recently I took a look atAtom, a text editor by GitHub. With a little bit of work, I was able to chain multiple vulnerabilities in Atom into an actual Remote Code Execution. The vulnerabilities have been fixed in the1.21.1 release on October 12th, 2017after I reported it via theirHackerOne program. In case you want to... | |
| | | | |
www.markloveless.net
|
|
| | | Hosting your own Mastodon instance isn't for everyone, but if you decide to do it, it's probably easier than you think. | ||