|
You are here |
reverse.put.as | ||
| | | | |
blog.google
|
|
| | | | | To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.As is our policy, we quickly reported this 0-day to the vendor (... | |
| | | | |
codecolor.ist
|
|
| | | | | This bug has been fixed in Mojave Beta, but still present in latest High Sierra (10.13.5). It's a logic bug that an entitled binary tries to load an insecure external library controllable by environment variable. To exploit it we need to abuse sandbox, which is interesting that sometimes a mitigation could be turned to an exploit. | |
| | | | |
blog.darkwolfsolutions.com
|
|
| | | | | September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless | |
| | | | |
www.sektioneins.de
|
|
| | | The DYLD_PRINT_TO_FILE environment variable can be used for local privilege escalation in OS X Yosemite. blockquote p, blockquote {font-family: monospace; font-size: 14px;} #imgtc {float: right; mar | ||