CODE WHITE - FINEST HACKING
Intelligence Driven Security
Initial Assessment
Security Intelligence Service
About us
PUBLIC VULNERABILITY LIST
SPThemeBackgroundImageUri Relative Path Traversal in SharePoint
Multiple Vulnerabilities in Syncfusion ASP.NET MVC
SequenceExternalizable Arbitrary Deserialization in WebLogic Server
...
CAREERS
Challenge
Pentester / Redteamer
Vulnerability Intelligence Analyst
BLOG
Teaching the Old .NET Remoting New Exploitation Tricks
Leaking ObjRefs to Exploit HTTP .NET Remoting
Exploiting ASP.NET TemplateParser — Part II: SharePoint (CVE-2023-33160)
...
>
CODE WHITE - Finest Hacking
>
Credits
>
Matthias Kaiser
Java Deserialization in Hyperion
Java Deserialization in Weblogic JMS Client
Java Deserialization in Weblogic JMS Client
Java Deserialization in WebSphere MQ JMS Client
Java Deserialization in Endpoint Protection Manager
Java Deserialization in Active MQ
in Flex BlazeDS
Java Deserialization in Bamboo
Authentication Bypass Arbitrary File WriteRead Privilege Escalation Path Traversal SQL Injection Binary Planting in Endpoint Protection
Java Deserialization in WebLogic Server
Java Deserialization in WebLogic Server
Privilege Escalation via named pipe in iPass Open Mobile
Java Deserialization in ActiveMQ Artemis JMS Client
Java Deserialization in Qpid Client/JMS Client
Java Deserialization in Spring AMQP
Java Deserialization in Weblogic Server
Java Deserialization in Weblogic Server
Java Deserialization in WebLogic Server
Java Deserialization in WebLogic Server