Hazard Researchers

19 posts

Hazard Researchers

Hazard Researchers

@hazardres

Germany 가입일 Aralık 2023
86 팔로잉6 팔로워
Hazard Researchers 리트윗함
HADESS
HADESS@Hadess_security·
DevOps City Your DevOps infrastructure is a city. Everything runs smooth until an incident hits. You're the mayor. Find what broke, fix it. This round: CI/CD pipeline security. #scenario=devops-pipeline" target="_blank" rel="nofollow noopener">hadess.io/games/devops-c… #game #devops #cicd #devsecops
HADESS tweet media
English
0
1
7
189
Hazard Researchers 리트윗함
JFrog Security
JFrog Security@JFrogSecurity·
⚡ Potentially Critical RCE Vulnerability in OpenSSL - CVE-2025-15467 ⚡ The JFrog Security Research team is tracking a newly disclosed OpenSSL stack overflow vulnerability rated as High by OpenSSL, that may lead to remote code execution (RCE). This vulnerability was patched with other 11 moderate and low severity vulnerabilities. The stack overflow can be triggered by sending a crafted CMS AuthEnvelopedData message with malicious AEAD parameters. While no official CVSS score has been assigned yet, based on its characteristics, we assess it may be rated at least High or even Critical by NVD. Our team reproduced the issue by invoking the CMS_decrypt API directly, confirming that OpenSSL applications parsing untrusted CMS data via this API are vulnerable. Exploitation is also possible when using the `openssl cms` CLI to decrypt untrusted input. A contextual analysis scanner for this CVE is now available for JFrog Advanced Security customers:
JFrog Security tweet media
English
1
6
34
4.2K
Hazard Researchers 리트윗함
Security Bug Aggregator
Security Bug Aggregator@BugsAggregator·
[453094710][reward: $250000] Out-of-bound read in the jmp table of ActiveMediaSessionController leads to sandbox escape. crbug.com/453094710
English
9
88
653
283.4K
Hazard Researchers 리트윗함
Ryan Barnett (B0N3)
Ryan Barnett (B0N3)@ryancbarnett·
We (@akamai_research) have seen more than 500K of these attack patterns in the past week with the most popular payload being:
Ryan Barnett (B0N3) tweet media
Kirill Firsov@k_firsov

@FearsOff @Cloudflare This write‑up tells the story of how traffic aimed at that certificate path could reach origins behind Cloudflare even when the rest of the application was blocked by customer rules. Enjoy the reading here fearsoff.org/research/cloud…

English
6
31
226
39.2K
Hazard Researchers 리트윗함
silentwarble
silentwarble@silentwarble·
I wrote a C2 agent in pure PIC C (minus one constexpr). I'd love to hear any suggestions on how to handle memory management better or reduce the output size. Cheers! github.com/MythicAgents/H…
English
0
37
148
7K
Hazard Researchers 리트윗함
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈‍
English
15
223
782
170K
Hazard Researchers 리트윗함
Vulmon Vulnerability Feed
Vulmon Vulnerability Feed@VulmonFeeds·
CVE-2024-23780 CVE-2024-23780 Exploit for Netbox This script exploits CVE-2024-23780, which allows remote code execution (RCE) on Netbox instances. Usage python netbox_exploit.py --url --username --password vulmon.com/vulnerabilityd…
English
0
2
6
820