Skip to main content
Pentest Blog
  • Advisories
  • Operating System
  • Application Security
  • Network
  • Tools
  • Article Series
  • About Us

Tag: research

Advisory | GLPI Service Management Software Multiple Vulnerabilities and Remote Code Execution

July 8, 2022July 11, 2022 Nuri Çilengir Leave a comment

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing.

Read More

Advisory | Seagate Central Storage Remote Code Execution 0day

December 9, 2019March 24, 2020 Ege Balci Leave a comment

In this article, I will be sharing several critical vulnerabilities of Seagate Central Storage NAS product.

Read More

PRODAFT Cyber Intelligence and Cyber Security Services

Recent Posts

  • Advisory | Roxy-WI Unauthenticated Remote Code Executions CVE-2022-31137
  • Advisory | GLPI Service Management Software Multiple Vulnerabilities and Remote Code Execution
  • LiderAhenk 0day – All your PARDUS Clients Belongs To Me (CVE-2021-3825)
  • Pardus 21 Linux Distro – Remote Code Execution 0day 2021 CVE-2021-3806
  • Unexpected Journey #7 – GravCMS Unauthenticated Arbitrary YAML Write/Update leads to Code Execution (CVE-2021-21425)

Latest Comments

  • Ege Balci on Art of Anti Detection 3 – Shellcode Alchemy
  • Chase Run Taylor on Art of Anti Detection 1 – Introduction to AV & Detection Techniques
  • Mehmet İnce on Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product
  • 0x00 on Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product
  • Mehmet İnce on Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product

Tags

0day 1day advisory alienvault android application assembly bof burp bypass crypter decoder dns EMET encoder exploit hook iat icmp in-memory IOT linux malware metasploit multi-stage nas packer php ransomware rce reflective research reverse reversing secure coding securityonion self-defence shellcode siem sql injection sqlmap stager storage tunneling windows

Awarded Top 15 Pentest Blog

Pentest Blogs
INVICTUS Cyber Security & Intelligence Services | Theme by Colorlib Powered by WordPress