File tree Expand file tree Collapse file tree 1 file changed +0
-6
lines changed
src/pentesting-web/deserialization Expand file tree Collapse file tree 1 file changed +0
-6
lines changed Original file line number Diff line number Diff line change @@ -281,12 +281,6 @@ Fixed in CentreStack 16.4.10315.56368 / Triofox 16.4.10317.56372 – upgrade or
281281- [SharePoint “ToolShell ” exploitation chain (Eye Security , 2025 )](https :// research.eye.security/sharepoint-under-siege/)
282282- [Microsoft Security – Code injection attacks abusing publicly disclosed ASP .NET machine keys (Feb 6 2025 )](https :// www.microsoft.com/en-us/security/blog/2025/02/06/code-injection-attacks-using-publicly-disclosed-asp-net-machine-keys/)
283283- [Kudelski Security advisory – Gladinet CentreStack / Triofox RCE CVE - 2025 - 30406 (Apr 16 2025 )](https :// research.kudelskisecurity.com/2025/04/16/gladinet-centrestack-and-gladinet-triofox-critical-rce-cve-2025-30406/)
284-
285-
286-
287-
288-
289-
290284- [** https :// www.notsosecure.com/exploiting-viewstate-deserialization-using-blacklist3r-and-ysoserial-net/**](https://www.notsosecure.com/exploiting-viewstate-deserialization-using-blacklist3r-and-ysoserial-net/)
291285- [** https :// medium.com/@swapneildash/deep-dive-into-net-viewstate-deserialization-and-its-exploitation-54bf5b788817**](https://medium.com/@swapneildash/deep-dive-into-net-viewstate-deserialization-and-its-exploitation-54bf5b788817)
292286- [** https :// soroush.secproject.com/blog/2019/04/exploiting-deserialisation-in-asp-net-via-viewstate/**](https://soroush.secproject.com/blog/2019/04/exploiting-deserialisation-in-asp-net-via-viewstate/)
You can’t perform that action at this time.
0 commit comments