Red Timmy Sec has discovered that Pulse Secure Client for Windows suffers from a local privilege escalation vulnerability in the PulseSecureService.exe service.
5f5a0396cb9bd8b8918531a470f34efbfce05c416ca68a1d578867b7468c1362
This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root.
d8c4bb35d621bfc8cf65e13632145031a44e20cc02cc3e3045d3ba14a00ed48b
Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities.
cb5874cc976834228bc185741becb79371ed3b619e098dbdd4244f3a27610bf7
Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.
326178d7c2a2126ac27509f46a4346cfb02ff83ca3fc2a5d381a2e1d830ce3ec
xglance-bin local root privilege escalation exploit that has been tested on Linux RHEL 7.x/8.x systems.
d27e4f2ed6ba8d5e7e900a787e939d59f6386be68ee424e030c1c37dbe438c85
Whitepaper called Jenkins Groovy Scripts for Red Teamers and Penetration Testers.
5e6b7c106c03710dff448e081a389d32962fea27101a434d73669f8d4d9365e2
Whitepaper discussing Flexpaper versions 2.3.6 and below which suffer from a remote code execution vulnerability.
292c7c17c2c2ed399b585bca4715d382224b01fb5afa43ea6b7792062686285d
Whitepaper called Stack Overflow: Automatic write() Discovery.
7dd20ddde34b4bd6b3184e835048ba165de8f2a67f78832df404359fc6900db5