Theori Vulnerability ResearchinTheori BLOGDeep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024–27394)IntroductionSep 4Sep 4
Berat Arslan“X” Kamu Kurumunda Gözlemlediğim Güvenlik ZafiyetleriÖncelikle belirtmek isterim ki, bu yazıyı tamamen yaşadıklarım ve gözlemlerim doğrultusunda, en ufak bir abartıya yer vermeden hazırladım…Aug 16Aug 16
ZHI HAOUnpacking CVE-2023 – 38831: RARLAB WinRAR Code Execution VulnerabilityThis post is divided into two main sections:Aug 12Aug 12
Jan Canty, Ph.D.Medical Serial Murderers (MSKs)Picture a serial murderer. Does Ted Bundy or Jeffrey Dahmer come to mind? It’s doubtful you imagined a physician or nurse. And yet, they…Aug 9Aug 9
Dishant ModiUnraveling Web Cache Poisoning: A Deep Dive (Part 1)hello hackers, Today in this writeup I am going to tell you all about web cache poisoning which I have learn through almost 3 weeks of…Aug 7Aug 7
Lim8en1HTB Write-up: [Kernel Adventures: Part 1]Linux Kernel exploitation CTF challenge write-upJul 18Jul 18
Travis Felder5 Essential Metrics to Measure the Maturity of Your Vulnerability Management ProgramVulnerability management is a critical component of any organization’s cybersecurity strategy. But how do you know if your vulnerability…Jul 16Jul 16
Kent BusseinErnstraud161 Encourage the positive, accommodate the alternativeAre you often in my shoes looking at the bright side of everything? Pollyanna bias and Barnum effect involve a tendency to view things…Jul 14Jul 14
Rah Tech Wiz (she, her)Top Security Tools for Developers to Identify macOS Application VulnerabilitiesTools & Resources for Application Testing & Cybersecurity PostureJul 6Jul 6
PiCode Execution via Untrusted Pickle Deserialization in CatBoostRevealing the risks of pickle deserialization in machine learning libraries like CatBoost.Jun 21Jun 21