One Sat a day makes you happy on Saturday lnbc10n1pnk69q9pp5ycqm0qh2yz5ce2put4xt4mckme6dgpexm07fk5keqxp3k4k0lh0shp5gx9n27xnkmxhlhaq7jwn5q768zrx5sk4lam7gqdqq7x67ue9k30scqzzsxqyz5vqsp5qrd0dq7w55zanh7e9ytknjlj73flugq5uqdldh7zeh2936selvrq9p4gqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqpqysgqutn30lddzmnuvsf9j6ln9586drs7jvd9y7kqfzguv3u6ll54868zgud33vt4anhppg57wpq5kda8f8vrallxxfwypjdku8d4krlgnlspm4y9cd
ᑎOᔕTᖇ
Nostr@carlostkd.ch
npub1k3dv...k7dv
If something does not go right
Go to #nostr
Bypassing airport security via SQL injection
#infosec #cybersecurity #ethicalhacking #news #privacy

Bypassing airport security via SQL injection
Bypassing airport security via SQL injection
We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation S...
Firewallas, Diabetics, And… Bluetooth
#infosec #cybersecurity #ethicalhacking #news #privacy

GreyNoise Labs
BLUUID: Firewallas, Diabetics, And… Bluetooth – GreyNoise Labs
Where I introduce the subject of remotely identifying bluetooth devices, propose that healthcare device oversight is lacking, and exploit a firewal...
Exploiting pfsense Remote Code Execution
#infosec #cybersecurity #ethicalhacking #news #privacy


Laburity - Cyber Security Services
Exploiting pfsense Remote Code Execution – CVE-2022-31814 - Laburity
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has been done against the pfsense CVE-2022-31814. What...
VStarcam CB73 is an attractive-looking compact IP camera with hard-coded root password.
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr
Hackster.io
Matt Brown Digs Deep Into an IP Camera's Firmware — and Finds a Hard-Coded Root Password
The VStarcam CB73 is an attractive-looking compact IP camera, but it comes with some security drawbacks.
Anyone can Access Deleted and Private Repository Data on GitHub
#infosec #cybersecurity #ethicalhacking #news #privacy


Anyone can Access Deleted and Private Repository Data on GitHub ◆ Truffle Security Co.
You can access data from deleted forks, deleted repositories and even private repositories on GitHub. And it is available forever. This is known by...
Let me know if you need a invite to try the new #proton #wallet
Delinea Local Privilege Escalation
#infosec #cybersecurity #ethicalhacking #news #privacy


Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability
During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) ...
Exploit the Prisma ORM to leak sensitive data.
#infosec #cybersecurity #ethicalhacking #news #privacy
plORMbing your Prisma ORM with Time-based Attacks - elttam
elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments.
Universal Code Execution by Chaining Messages in Browser Extensions
#infosec #cybersecurity #ethicalhacking #news #privacy


Universal Code Execution by Chaining Messages in Browser Extensions
By chaining various messaging APIs in browsers and browser extensions, I demonstrate how we can jump from web pages to “universal code execut...
No more secrets
#infosec #cybersecurity #ethicalhacking #news #privacy


Summoning Team
There are no Secrets || Exploiting Veeam CVE-2024-29855
This vulenrability is due to the fact that JWT secret used to generate authentication tokens was a hardcoded value which means an unauthenticated a...
YetiHunter
An open-source tool to detect suspicious activities in Snowflake
#infosec #cybersecurity #ethicalhacking #news #privacy


Introducing YetiHunter: An open-source tool to detect and hunt for suspicious activity in Snowflake
YetiHunter is an open source tool that combines the indicators that Snowflake, Mandiant, DataDog and Permiso have into one easy to run script to de...
Exploiting Gradio to (still) Steal Secrets from Hugging Face Spaces
#infosec #cybersecurity #ethicalhacking #news #privacy


Horizon3.ai
Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces
Exploiting file read vulnerabilities in Gradio to steal secrets from Hugging Face Spaces.
Shut down a website by triggering WAF rule.
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr


Sicuranext Blog
Response Filter Denial of Service (RFDoS): shut down a website by triggering WAF rule
TL;DR: Basically, if a target website is protected by a WAF using the OWASP Core Rule Set or Comodo Rule Set or Atomicorp Rule Set, you can send th...
Postman leaked secrets
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr


(The) Postman Carries Lots of Secrets ◆ Truffle Security Co.
Postman, the popular API testing platform, hosts the largest collection of public APIs. Unfortunately, it’s become one of the largest public sour...
Backdooring Dotnet Applications
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr
StarkeBlog - Backdooring Dotnet Applications
DHEat DoS attack against SSH
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr
Positron Security
Grafana backend sql injection affected all version
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr


0xfd's blog
Grafana backend sql injection affected all version
Grafana backend sql injection affected all versionVuln DescriptionThe open-source platform for monitoring and observability to exploit this sql inj...
18 vulnerabilities in Brocade SANnav
#infosec #cybersecurity #ethicalhacking #news #privacy #nostr
18 vulnerabilities in Brocade SANnav - IT Security Research by Pierre
Command Injection Vulnerability
In Progress Flowmon
#infosec #cybersecurity #ethicalhacking #news #privacy


Rhino Security Labs
CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon
CVE-2024-2389 unauthenticated command injection vulnerability found in Progress Flowmon server.