Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks (Archive) September 03, 2024 / Simon Zuckerbraun 0 Likes categories / Blog post, Archive tags / Windows, LPE, Research, Exploit
CVE-2024-38213: Copy2Pwn Exploit Evades Windows Web Protections August 15, 2024 / Peter Girnus 0 Likes categories / Blog post tags / Microsoft, MoTW, Copy2Pwn, Research, Exploit
Getting Unauthenticated Remote Code Execution on the Logsign Unified SecOps Platform July 01, 2024 / Yulin Sung 0 Likes categories / Blog post tags / Logsign, Research, Exploit
CVE-2023-35150: Arbitrary Code Injection in XWiki.org XWiki August 23, 2023 / Trend Micro Research Team 0 Likes categories / Blog post tags / XWiki, Research, Exploit
Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight May 25, 2023 / The ZDI Research Team 0 Likes categories / Blog post tags / Sonos, Pwn2Own, Research, Exploit
CVE-2023-20869/20870: Exploiting VMware Workstation at Pwn2Own Vancouver May 18, 2023 / The ZDI Research Team 0 Likes categories / Blog post tags / VMware, Pwn2Own, Exploit
TP-Link WAN-side Vulnerability CVE-2023-1389 Added to the Mirai Botnet Arsenal April 24, 2023 / Peter Girnus 0 Likes categories / Blog post tags / TPLink, Pwn2Own, Exploit, Threat Hunting
CVE-2022-3236: Sophos Firewall User Portal and Web Admin Code Injection October 19, 2022 / Trend Micro Research Team 0 Likes categories / Blog post tags / Sophos, JSON, Exploit
Riding the InfoRail to Exploit Ivanti Avalanche July 19, 2022 / Piotr Bazydło 0 Likes categories / Blog post tags / Ivanti, JNDI, Exploit
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks March 17, 2022 / Simon Zuckerbraun 0 Likes categories / Blog post tags / Windows, LPE, Research, Exploit