Explore >> Select a destination


You are here

srcincite.io
| | foxglovesecurity.com
3.0 parsecs away

Travel
| | By @breenmachine What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I'm about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. In fact, even though proof of concept code was released...
| | www.thezdi.com
2.5 parsecs away

Travel
| | [AI summary] A vulnerability in VMware Aria Operations for Logs allows remote code execution via insecure deserialization, patched in April 2023.
| | y4y.space
3.2 parsecs away

Travel
| | Intro The exploitation of this RCE consists of two parts, one being the lack of authentication validation to h5-vsan endpoint, and another being the unsafe reflection usage in Java which then caused a JNDI injection. I was not smart enough to come up with the JDNI attack chain, but certainly learned a lot while attempting...
| | blog.darkwolfsolutions.com
39.0 parsecs away

Travel
| September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless