unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The October 2024 Security Update Review
It’s the spooky season, and there’s nothing spookier than security patches – at least in my world...
2024-10-9 01:54:47 | 阅读: 5 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
microsoft
attacker
windows
remote
cves
From Pwn2Own Automotive: More Autel Maxicharger Vulnerabilities
The vulnerable function is responsible for handling ACMP messages received from a websockets server...
2024-10-4 00:5:14 | 阅读: 15 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
overflow
decoded
attacker
firmware
acmp
Exploiting Exchange PowerShell After ProxyNotShell: Part 4 – No Argument Constructor
As you may know, I recently presented my Exchange-rela...
2024-9-27 02:25:7 | 阅读: 11 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
exchange
powershell
conversion
remoting
deserialize
Announcing Pwn2Own Automotive for 2025
If you just want to read the rules, you can find them...
2024-9-24 22:58:14 | 阅读: 12 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
pwn2own
contest
automotive
tesla
vehicle
Exploiting Exchange PowerShell After ProxyNotShell: Part 3 – DLL Loading Chain for RCE
As you may know, I recently presented my Exchange-rel...
2024-9-20 02:2:10 | 阅读: 9 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
expand
exchange
attacker
windows
Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection
As you may know, I recently presented my Exchange-related talk during OffensiveCon 2024. This seri...
2024-9-12 23:0:0 | 阅读: 10 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
extrac32
exchange
microsoft
windows
deny
The September 2024 Security Update Review
We’ve reached September and the pumpkin spice floats in the air. While they aren’t pumpkin-spiced...
2024-9-11 01:25:32 | 阅读: 8 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
microsoft
windows
attacker
security
zdi
Exploiting Exchange PowerShell After ProxyNotShell: Part 1 - MultiValuedProperty
In this article, part one of the series, I describe the...
2024-9-5 23:39:37 | 阅读: 8 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
exchange
attacker
microsoft
powershell
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks (Archive)
This version of the blog is preserved for archival purposes only. An updated version of this blog, i...
2024-9-3 23:51:7 | 阅读: 7 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
windows
eop
rbs
rollback
oplock
CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability
In this excerpt of a Trend Micro Vulnerability Researc...
2024-8-28 23:0:0 | 阅读: 17 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
trailer
spnego
client
dcerpc
From Pwn2Own Automotive: Taking Over the Autel Maxicharger
This blog highlights two vulnerabilities that were di...
2024-8-23 01:47:11 | 阅读: 4 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
firmware
autel
door
ghidra
memory
CVE-2024-38213: Copy2Pwn Exploit Evades Windows Web Protections
Zero Day Initiative threat researchers discovered CVE...
2024-8-15 23:41:52 | 阅读: 21 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
webdav
windows
microsoft
protections
smartscreen
The August 2024 Security Update Review
I have successfully survived Summer Hacker Camp, and I hope you have too. And we return just in t...
2024-8-14 02:5:1 | 阅读: 16 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
microsoft
windows
attacker
substance
elevation
Introducing the Vanguard Awards
This year at Black Hat USA, Trend Micro’s Zero Day Initiative (ZDI) will award our inaugural Vang...
2024-8-5 22:0:0 | 阅读: 3 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
award
awards
submissions
zdi
enclosure
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3
To wrap up this blog series we wanted to include one more technique that you can use when exploiti...
2024-8-1 23:0:0 | 阅读: 12 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
windows
papercut
zdi
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 2
The number of vulnerabilities that we see through the...
2024-7-31 22:48:13 | 阅读: 17 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
alternate
eset
security
ekrn
eicar
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 1
The number of link following vulnerabilities submitte...
2024-7-30 22:13:24 | 阅读: 9 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
avastsvc
reparse
junction
windows
Multiple Vulnerabilities in the Deep Sea Electronics DSE855
Recently, Trend Micro’s ZDI has published multiple ad...
2024-7-26 02:58:0 | 阅读: 10 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
zdi
software
overflow
sea
Announcing Pwn2Own Ireland – Bringing Pwn2Own (and WhatsApp) to the Emerald Isle
If you just want to read the rules, you can find them...
2024-7-18 21:12:11 | 阅读: 26 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
contest
pwn2own
contestants
network
synology
Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD
On patch Tuesday last week, Microsoft released an update for CVE-2024-38112, which they said was...
2024-7-15 22:49:53 | 阅读: 10 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
microsoft
security
zdi
cvd
Previous
1
2
3
4
5
6
7
8
Next