HTTPVoid

51 posts

HTTPVoid

HTTPVoid

@httpvoid0x2f

Infosec | Managed by @rootxharsh @iamnoooob | Research for @pdiscoveryio

Se unió Kasım 2021
73 Siguiendo4.3K Seguidores
HTTPVoid retuiteado
Hacktron AI
Hacktron AI@HacktronAI·
🚨 CVE-2026-1731 🚨 Our team discovered a critical pre-auth RCE affecting BeyondTrust Remote Support & Privileged Remote Access. SaaS/Cloud instances have been patched. If you're running self-hosted deployments, apply the patches immediately. More info in the comments.
Hacktron AI tweet media
English
3
65
248
34.9K
HTTPVoid
HTTPVoid@httpvoid0x2f·
CVE-2025-49113 is a fascinating PHP Object injection in Roundcube webmail, a really nice find by the original finder. #roundcube #cve-2025-49113 #rce
HTTPVoid tweet media
English
1
14
61
5.1K
HTTPVoid
HTTPVoid@httpvoid0x2f·
New from us! Testing a Rails + Nginx app? This should be in your checklist. Read the blog to know how we disclosed Discourse database backups!
Harsh Jaiswal@rootxharsh

New Blogpost - We identified a vulnerability in Discourse where a misconfiguration in Rails send_file + Nginx's internal directive can expose database backups! projectdiscovery.io/blog/discourse… This issue isn't limited to Discourse. It can affect other Rails + Nginx apps with similar configurations. Read our full analysis and detect it with our Nuclei template, now live on ProjectDiscovery Cloud!

English
0
1
13
1.6K
HTTPVoid
HTTPVoid@httpvoid0x2f·
Check out our latest blog post! We dive into GitHub Enterprise’s SAML implementation and explore an authentication bypass in encrypted assertion mode. CVE-2024-4985 / CVE-2024-9487: GitHub Enterprise SAML Authentication Bypass. projectdiscovery.io/blog/github-en…
English
0
50
181
16.7K
HTTPVoid retuiteado
shubs
shubs@infosec_au·
My colleague @hash_kitten and I discovered a full-read SSRF vulnerability in Next.js (CVE-2024-34351). We published our research today on @assetnote's blog: assetnote.io/resources/rese…. Thank you to the Vercel team for a smooth disclosure process.
shubs tweet media
English
17
181
784
95.4K
HTTPVoid retuiteado
Ngo Wei Lin
Ngo Wei Lin@Creastery·
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: starlabs.sg/blog/2024/04-s…
English
5
84
240
40K
HTTPVoid
HTTPVoid@httpvoid0x2f·
Check out our new blog post! We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k! blog.projectdiscovery.io/hello-lucee-le…
English
7
110
354
44.4K
HTTPVoid
HTTPVoid@httpvoid0x2f·
Hello OgnlGuard/isSafeExpression, we meet again 🤝 🥲 Confluence OGNL Injection.
HTTPVoid tweet media
English
1
6
60
9.9K
HTTPVoid
HTTPVoid@httpvoid0x2f·
Reproduced the AJP request Smuggling to access /tmui/* resources directly. Very interesting bug indeed, need to further look into post-exploitation. Until next time😴
HTTPVoid tweet media
Praetorian@praetorianlabs

F5 BIGIP is vulnerable to a smuggling request vulnerability that an attacker can exploit to achieve unauthorized RCE. Our vulnerability research team responsibly disclose this to F5, which released a hotfix today. hubs.ly/Q026ThPw0 #vulnerabilityresearch #f5 #cve

English
0
10
78
39.5K
James Kettle
James Kettle@albinowax·
Just confirmed my race-condition live demo works just fine from Goa! I know logically that the technique means distance to the target has no effect... but it still surprises me every time. See you at 11:45 tomorrow @nullcon!
James Kettle tweet media
English
11
6
233
22.8K
HTTPVoid retuiteado
SinSinology
SinSinology@SinSinology·
Here is the #exploit that targets the "VMWare Aria Operations for Networks" which has CVSS 9.8 and targets all the versions from 6.0 to 6.10 (CVE-2023-34039) 🔥 I just wrote the exploit, but the discovery credit is for @rootxharsh and @iamnoooob 👏 github.com/sinsinology/CV…
GIF
English
0
36
79
14.1K
HTTPVoid
HTTPVoid@httpvoid0x2f·
@LiveOverflow Just googled "literal_eval CTF" and landed here😂
English
0
0
2
759
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
Here is a little secret about how I audit code 🪄 I ask myself: "is ast.literal_eval() with untrusted data really safe?" Then I just google "ast.literal_eval CTF" and see if any writeups show up 🙃 Turns out, this code is 100% safe!!
LiveOverflow 🔴 tweet media
English
8
28
375
0