|
You are here |
srcincite.io | ||
| | | | |
foxglovesecurity.com
|
|
| | | | | By @breenmachine What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I'm about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. In fact, even though proof of concept code was released... | |
| | | | |
www.thezdi.com
|
|
| | | | | [AI summary] A vulnerability in VMware Aria Operations for Logs allows remote code execution via insecure deserialization, patched in April 2023. | |
| | | | |
y4y.space
|
|
| | | | | Intro The exploitation of this RCE consists of two parts, one being the lack of authentication validation to h5-vsan endpoint, and another being the unsafe reflection usage in Java which then caused a JNDI injection. I was not smart enough to come up with the JDNI attack chain, but certainly learned a lot while attempting... | |
| | | | |
blog.darkwolfsolutions.com
|
|
| | | September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless | ||