SolarWinds Access Rights Manager: One Vulnerability to LPE Them All December 12, 2024 / Piotr Bazydło 0 Likes categories / Blog post tags / SolarWinds, Research, LPE
From Pwn2Own Automotive: More Autel Maxicharger Vulnerabilities October 03, 2024 / Connor Ford 0 Likes categories / Blog post tags / Autel, Automotive, Research
Exploiting Exchange PowerShell After ProxyNotShell: Part 4 – No Argument Constructor September 26, 2024 / Piotr Bazydło 0 Likes categories / Blog post tags / Microsoft, Exchange, Research
Exploiting Exchange PowerShell After ProxyNotShell: Part 3 – DLL Loading Chain for RCE September 19, 2024 / Piotr Bazydło 0 Likes categories / Blog post tags / Exchange, Microsoft, Research
Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection September 12, 2024 / Piotr Bazydło 0 Likes categories / Blog post tags / Microsoft, Exchange, Research
Exploiting Exchange PowerShell After ProxyNotShell: Part 1 - MultiValuedProperty September 05, 2024 / Piotr Bazydło 0 Likes categories / Blog post tags / Exchange, Research, Microsoft
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks (Archive) September 03, 2024 / Simon Zuckerbraun 0 Likes categories / Blog post, Archive tags / Windows, LPE, Research, Exploit
CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability August 28, 2024 / Trend Micro Research Team 0 Likes categories / Blog post tags / VMware, vCenter, Research
From Pwn2Own Automotive: Taking Over the Autel Maxicharger August 22, 2024 / Thanos Kaliyanakis 0 Likes categories / Blog post tags / Autel, Automotive, Research
CVE-2024-38213: Copy2Pwn Exploit Evades Windows Web Protections August 15, 2024 / Peter Girnus 0 Likes categories / Blog post tags / Microsoft, MoTW, Copy2Pwn, Research, Exploit