0.0.0.0 Day: Exploiting Localhost APIs From the Browser | 79 | cov_id19 | | | | |
Announcing the Vulnerability Management program pack 1.0 | 71 | SecTemplates | | | | |
Why You Should Treat Large Language Models as Potential Attackers | 57 | jat0369 | | | | |
From Limited file read to full access on Jenkins (CVE-2024-23897) | 44 | xkarezma | | | | |
Auditing Atlassian Plugins, 53 0-Days Later| Atlassian Research Part 1 | 34 | _cydave | | | | |
Bypassing Rockwell Automation Logix Controllers’ Local Chassis Security Protection | 27 | sh0n1z | | | | |
Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 2 : AS REP Roasting | 26 | -vzh- | | | | |
CVE-2024-39877: Apache Airflow Arbitrary Code Execution | 26 | appsec1337 | | | | |
Unveiling the Power Duo: osquery and osctrl | 20 | javuto | | | | |
Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit | 20 | toyojuni | | | | |