TL;DR Tautulli for Plex is vulnerable to remote command execution attacks running under the context of the Tautulli process. By sending specially...
Tautulli Notification Arbitrary Remote Command Execution CVE-2020-7380

TL;DR Tautulli for Plex is vulnerable to remote command execution attacks running under the context of the Tautulli process. By sending specially...
TL;DR Tautulli for Plex is vulnerable to remote command execution attacks running under the context of the Tautulli process. By sending specially crafted HTTP requests...
Vulnerability Introduction I recently discovered a vulnerability in the Avast and AVG Secure Browser that allows low privileged users to gain access to any file on the...
XXE Injection attacks is a type of injection attack that takes place when parsing XML data. An XXE attack takes place when XML input contains a reference to an external...
In this SQL injection lab video I show you how to setup your own SQL injection lab for practicing SQL Injections. SQL Injections are easy to exploit as you need nothing...
Hack any WordPress version, including the current 4.9.6 is susceptible to a vulnerability that could lead to command execution. In this video I walk you through...
SQL Injection attacks are still as common today as they were ten years ago. Today I’ll discuss what are SQLi and how you can exploit SQLi vulnerabilities found in...
Kali Linux 2018.2 Released! Find out what’s new, kernel & tools, and how to upgrade to Kali Linux 2018.2. New Linux 4.15 kernel with Spectre and Meltdown...
fsociety hacking tools pack is a penetration testing framework containing all of the penetration testing tools that would need. Included is all the tools that are used...
This article provides an explanation to the icacls output and the specific ntfs permissions. SIDs may be in either numerical or friendly name form. If you use a...
So, you’ve popped a user shell on a windows box and now you’re looking to escalate those privileges. Great! In this article we’ll look at one method of elevating your...