Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 2
38 résultats taggé PoC  ✕
CVE-2023-34992: Fortinet FortiSIEM Command Injection Deep-Dive https://www.horizon3.ai/attack-research/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive/
20/05/2024 14:35:51
QRCode
archive.org
thumbnail

CVE-2023-34992 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.

horizon3 EN 2024 cve-2023-34992 research PoC FortiSIEM IoCs
Easy privilege escalation exploit lands for Linux kernels https://www.theregister.com/2024/03/29/linux_kernel_flaw/
29/03/2024 22:49:16
QRCode
archive.org
thumbnail

CVE-2024-1086 turns the page tables on system admins

theregister EN 2024 CVE-2024-1086 Local-Privilege-Escalation Linux PoC Kernel
BlueSpy - Spying on Bluetooth conversations https://www.tarlogic.com/blog/bluespy-spying-on-bluetooth-conversations/
26/03/2024 15:58:35
QRCode
archive.org
thumbnail

BlueSpy is a proof of concept for exploiting vulnerabilities in Bluetooth headsets and eavesdropping on private conversations

tarlogic EN 2024 BlueSpy Bluetooth PoC vulnerabilities eavesdropping
Exploit released for Fortinet RCE bug used in attacks, patch now https://www.bleepingcomputer.com/news/security/exploit-released-for-fortinet-rce-bug-used-in-attacks-patch-now/
21/03/2024 16:51:25
QRCode
archive.org
thumbnail

Security researchers have released a proof-of-concept (PoC) exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server (EMS) software, which is now actively exploited in attacks.

bleepingcomputer EN 2024 Actively-Exploited Exploit Fortinet PoC Proof-of-Concept RCE Remote-Code-Execution SQL-Injection CVE-2023-48788
Hackers are exploiting critical Apache Struts flaw using public PoC https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-apache-struts-flaw-using-public-poc/
13/12/2023 17:21:24
QRCode
archive.org
thumbnail

Hackers are attempting to leverage a recently fixed critical vulnerability (CVE-2023-50164) in Apache Struts that leads to remote code execution, in attacks that rely on publicly available proof-of-concept exploit code.

bleepingcomputer EN 2023 Actively-Exploited Apache-Struts PoC Proof-of-Concept RCE Remote-Code-Execution CVE-2023-50164
Building an Exploit for FortiGate Vulnerability… https://bishopfox.com/blog/building-exploit-fortigate-vulnerability-cve-2023-27997
22/11/2023 10:01:36
QRCode
archive.org
thumbnail

Learn how Bishop Fox built a POC exploit for the pre-authentication remote code injection vulnerability in the Fortinet SSL VPN published by Lexfo.

bishopfox EN 2023 PoC Fortinet SSL VPN CVE-2023-27997 exploit
Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT https://unit42.paloaltonetworks.com/fake-cve-2023-40477-poc-hides-venomrat/
19/09/2023 20:59:11
QRCode
archive.org
thumbnail

A phony proof-of-concept (PoC) code for CVE-2023-40477 delivered a payload of VenomRAT. We detail our findings, including an analysis of the malicious code.

unit42 EN 2023 PoC fake CVE-2023-40477 VenomRAT malicious
CVE-2023-34127 https://attackerkb.com/topics/Vof5fWs4rx/cve-2023-34127
21/08/2023 21:47:28
QRCode
archive.org
thumbnail

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authe…

attackerkb EN 2023 rapid7 SonicWall CVE-2023-34127 vulnerability PoC
GitHub - vdohney/keepass-password-dumper https://github.com/vdohney/keepass-password-dumper
17/05/2023 15:30:10
QRCode
archive.org
thumbnail

The vulnerability was assigned CVE-2023-32784. It should be fixed in KeePass 2.54, which should come out in ~July 2023. Thanks again to Dominik Reichl for his fast response and creative fix!

vdohney EN 2023 PoC KeePass dumper password CVE-2023-32784
Exploit available for critical bug in VM2 JavaScript sandbox library https://www.bleepingcomputer.com/news/security/exploit-available-for-critical-bug-in-vm2-javascript-sandbox-library/
08/04/2023 01:43:08
QRCode
archive.org
thumbnail

Proof-of-concept exploit code has been released for a recently disclosed critical vulnerability in the popular VM2 library, a JavaScript sandbox that is used by multiple software to run code securely in a virtualized environment.

bleepingcomputer Code-Execution Sandbox Sandbox-Escape JavaScript Virtualization VM2 PoC CVE-2023-29017
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716) https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
07/03/2023 08:28:32
QRCode
archive.org
thumbnail

A PoC exploit for CVE-2023-21716, a critical RCE vulnerability in Microsoft Word that can be exploited when the user previews a specially crafted RTF document, is now publicly available.

helpnetsecurity EN 2023 PoC CVE-2023-21716 RCE vulnerability
Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs https://www.horizon3.ai/fortinet-fortinac-cve-2022-39952-deep-dive-and-iocs/
22/02/2023 08:56:38
QRCode
archive.org
thumbnail

Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs. This vulnerability allows remote code execution as the root user.

(advisory https://www.fortiguard.com/psirt?date=02-2023)

horizon3 EN 2023 PoC Fortinet FortiNAC CVE-2022-39952 Deep-Dive IoCs
Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236 https://vulncheck.com/blog/sophos-cve-2022-3236
18/01/2023 21:44:40
QRCode
archive.org
thumbnail

Sophos took immediate steps to remediate CVE-2022-3236 – an unauthenticated and remote code execution vulnerability affecting the Sophos Firewall Webadmin and User Portal HTTP interfaces – with an automated hotfix sent out in September 2022. Through its advisory published on September 23, 2022, it also alerted users who don't receive automatic hotfixes to apply the update themselves. The advisory stated the vulnerability had previously been used against "a small set of specific organizations, primarily in the South Asia region." In December, Sophos released v19.5 GA GA with an official fix.
Key Takeaways

  • As there are no public proof-of-concept exploits for CVE-2022-3236, we created our own to determine its potential for mass exploitation.
  • We scanned internet-facing Sophos Firewalls and found more than 4,000 firewalls that were too old to receive a hotfix.
  • We encourage Sophos Firewall administrators to look through their logs to determine if they see indications of exploit attempts. Two files to focus on include /logs/csc.log and /log/validationError.log.
  • Internet-facing firewalls appear to largely be eligible for hotfixes and the default authentication captcha likely prevented mass exploitation.
vulncheck EN 2023 sophos CVE-2022-3236 PoC
zhuowei/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. https://github.com/zhuowei/WDBFontOverwrite
30/12/2022 11:46:10
QRCode
archive.org
thumbnail

Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.

Works on iOS 16.1.2 and below (tested on iOS 16.1) on unjailbroken devices.

zhuowei EN GitHub PoC iOS CVE-2022-46689 unjailbroken ComicSans
Cracking encrypted Lastpass vaults https://markuta.com/cracking-lastpass-vaults/
27/12/2022 00:42:22
QRCode
archive.org

The recent (2022) compromise of Lastpass included email addresses, home addresses, names, and encrypted customer vaults. In this post I will demonstrate how attackers may leverage tools like Hashcat to crack an encrypted vault with a weak password.

Markuta EN 2022 password-cracking lastpass compromise Hashcat crack PoC
Get root on macOS 12.3.1: proof-of-concepts for Linus Henze’s CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763) https://worthdoingbadly.com/coretrust/
16/09/2022 09:07:26
QRCode
archive.org

Here are two proof-of-concepts for CVE-2022-26766 (CoreTrust allows any root certificate) and CVE-2022-26763 (IOPCIDevice::_MemoryAccess not checking bounds at all), two issues discovered by @LinusHenze and patched in macOS 12.4 / iOS 15.5.

worthdoingbadly PoC EN 2022 CVE-2022-26766 CVE-2022-26763 patched macOS iOS LinusHenze
Break me out of sandbox in old pipe - CVE-2022-22715 Windows Dirty Pipe https://whereisk0shl.top/post/break-me-out-of-sandbox-in-old-pipe-cve-2022-22715-windows-dirty-pipe
23/08/2022 11:23:05
QRCode
archive.org

In February 2022, Microsoft patched the vulnerability I used in TianfuCup 2021 for escaping Adobe Reader sandbox, assigned CVE-2022-22715. The vulnerability existed in Named Pipe File System nearly 10 years since the AppContainer was born. We called it "Windows Dirty Pipe".
In this article, I will share the root cause and exploitation of Windows Dirty Pipe. So let's start our journey.

whereisk0shl EN 2022 CVE-2022-22715 Windows Dirty-Pipe PoC ANALYSIS
You're M̶u̶t̶e̶d̶ Rooted https://speakerdeck.com/patrickwardle/youre-muted-rooted
13/08/2022 22:44:11
QRCode
archive.org
thumbnail

With a recent market cap of over $100 billion and the genericization of its name, the popularity of Zoom is undeniable. But what about its security? This imperative question is often quite personal, as who amongst us isn't jumping on weekly (daily?) Zoom calls?

In this talk, we’ll explore Zoom’s macOS application to uncover several critical security flaws. Flaws, that provided a local unprivileged attacker a direct and reliable path to root.

The first flaw, presents itself subtly in a core cryptographic validation routine, while the second is due to a nuanced trust issue between Zoom’s client and its privileged helper component.

After detailing both root cause analysis and full exploitation of these flaws, we’ll end the talk by showing how such issues could be avoided …both by Zoom, but also in other macOS applications.

patrickwardle EN 2022 macOS zoom rooted defcon PoC
page 2 / 2
4473 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio