|
You are here |
gebir.ge | ||
| | | | |
parsiya.net
|
|
| | | | | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications. | |
| | | | |
www.thezdi.com
|
|
| | | | | ||
| | | | |
www.wietzebeukema.nl
|
|
| | | | | By manipulating environment variables on process level, it is possible to let trusted applications load arbitrary DLLs and execute malicious code. This post lists nearly 100 executables vulnerable to this type of DLL Hijacking on Windows 11 (21H2); it is demonstrated how this can achieved with just three lines of VBScript. | |
| | | | |
www.nodejs-security.com
|
|
| | | MCP Servers are increasingly popular for AI-driven workflows. However, I discovered a directory traversal vulnerability in the Mastra AI Frameworks MCP Server that could expose sensitive information. This article explores the flaw, its exploitation, and mitigation strategies. | ||