How I Found (And Patched) CVE-2024-23724

  Рет қаралды 4,305

Tyler Ramsbey || Hack Smarter

Tyler Ramsbey || Hack Smarter

Күн бұрын

Пікірлер: 15
@mikeshow69
@mikeshow69 9 ай бұрын
Awesome explanation of the entire vulnerability/CVE process. Thank you for taking the time to explain the entire process you went through.
@CyberAbyss007
@CyberAbyss007 9 ай бұрын
Excellent content! I love that you cover both sides of the CVE, red and blue!!! Thank you! Did you find this CVE as part of a bug bounty program or other process? I've written some code in a framework I had built that sends reports when users enter anything that look malicious in addition to removing the offending code or blocking the post or update. 🙂
@TylerRamsbey
@TylerRamsbey 9 ай бұрын
At a pentester, I have time occasionally when I am not working directly with a client and I usually use that time for researching open-source projects to help make them more secure :)
@Iampopg
@Iampopg 8 ай бұрын
Very inspiring Tyler. You did a great job. ❤
@ВиталийОвчаренко-и1н
@ВиталийОвчаренко-и1н 8 ай бұрын
CVE-2024-23724 in Ghost CMS allowed for Stored XSS in profile pictures, potentially leading to an adversary taking over the Owner account. Although the vendor did not issue an official patch, a Pull Request was made for users to secure against this CVE themselves. This vulnerability highlighted the importance of code reviews and proactive patching processes to address security issues in widely used platforms like Ghost CMS.
@bret354
@bret354 3 ай бұрын
Hey Tyler 1 request is to make things on your screen bigger, not everyone has great eyesight.
@hb3643
@hb3643 9 ай бұрын
Thank you for your efforts! Great work. Good karma!
@fraserf-j986
@fraserf-j986 9 ай бұрын
This is brilliant!
@anonsforever_
@anonsforever_ 7 ай бұрын
This the type of guy to catch my hacker who hacks my dating apps; just so he can get another CVE.
@dylanireland8887
@dylanireland8887 9 ай бұрын
Deserves more views
@Marco_Ris
@Marco_Ris 3 ай бұрын
Oh no he just spelled JIF 🙈. But it's still informative and interesting. thank you
@GilligansTravels
@GilligansTravels 9 ай бұрын
awesome
@evelynngaming3961
@evelynngaming3961 8 ай бұрын
Is this still doable? (I want to choose this security leak for a school project, I'm in my second year in software development) For a presentation I would need to show the exploit.
@TylerRamsbey
@TylerRamsbey 8 ай бұрын
It should be!
@evelynngaming3961
@evelynngaming3961 8 ай бұрын
I wonder why did you put "localhost" as the argument for target?, I've tried my base domain for the site and the localhost but both return me an error where the pc denied access. Would this be an issue with my personal firewalls or vpn?@@TylerRamsbey
I Found 8 CVEs in 2 Weeks (And You Can Too!)
16:19
Tyler Ramsbey || Hack Smarter
Рет қаралды 25 М.
Farmer narrowly escapes tiger attack
00:20
CTV News
Рет қаралды 12 МЛН
БУ, ИСПУГАЛСЯ?? #shorts
00:22
Паша Осадчий
Рет қаралды 3 МЛН
Turn Off the Vacum And Sit Back and Laugh 🤣
00:34
SKITSFUL
Рет қаралды 7 МЛН
Windows Servers Can Expose PowerShell on the Web
18:12
John Hammond
Рет қаралды 38 М.
A Vulnerability to Hack The World - CVE-2023-4863
18:00
LiveOverflow
Рет қаралды 111 М.
I used AI to hack this website...
23:23
Tech Raj
Рет қаралды 133 М.
Watch me hack a Wordpress website..
28:52
Tech Raj
Рет қаралды 288 М.
Detect Hackers & Malware on your Computer (literally for free)
16:38
Farmer narrowly escapes tiger attack
00:20
CTV News
Рет қаралды 12 МЛН