HackerOne
9.8K subscribers
633 photos
30 videos
76 files
2.69K links
Community : @Sec0x01
@Bug0x
Admin : @Offensive
Download Telegram
Forwarded from Amir Kiani
#0daytoday #IBM WebSphere Remote Code Execution Java Deserialization Exploit [remote #exploits #0day #Exploit] dlvr.it/NdQpZN
https://isc.sans.edu/diary/26254

Broken phishing accidentally exploiting Outlook zero-day

When we think of zero-days, what comes to mind are usually RCEs or other high-impact vulnerabilities. Zero-days, however, come in all shapes and sizes and many of them are low impact, as is the vulnerability we’re going to discuss today. What is interesting about it, apart from it allowing a sender of an e-mail to include/change a link in an e-mail when it is forwarded by Outlook, is that I noticed it being exploited in a low-quality phishing e-mail by what appears to be a complete accident.

#analysis #phishing #exploit
The #CERT Coordination Center (CERT/CC) has released information on 33 vulnerabilities, known as AMNESIA:33, affecting multiple embedded open-source Transmission Control Protocol/Internet Protocol (#TCP/IP) stacks. A remote attacker could #exploit some of these vulnerabilities to take control of an affected system.

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
CVE-2024-38193: Windows LPE

PATCHED: August 13, 2024

https://github.com/Nephster/CVE-2024-38193


#git #exploit #lpe #pentest #redteam
❤‍🔥4