Explore >> Select a destination


You are here

reverse.put.as
| | blog.google
12.6 parsecs away

Travel
| | To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.As is our policy, we quickly reported this 0-day to the vendor (...
| | codecolor.ist
8.9 parsecs away

Travel
| | This bug has been fixed in Mojave Beta, but still present in latest High Sierra (10.13.5). It's a logic bug that an entitled binary tries to load an insecure external library controllable by environment variable. To exploit it we need to abuse sandbox, which is interesting that sometimes a mitigation could be turned to an exploit.
| | blog.darkwolfsolutions.com
12.2 parsecs away

Travel
| | September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless
| | www.sektioneins.de
37.0 parsecs away

Travel
| The DYLD_PRINT_TO_FILE environment variable can be used for local privilege escalation in OS X Yosemite. blockquote p, blockquote {font-family: monospace; font-size: 14px;} #imgtc {float: right; mar