Ch33z_plz's profile picture. Loves all the the 🧀🧀🧀 and computer stuffs!

Ch33z_plz🧀🐀

@Ch33z_plz

Loves all the the 🧀🧀🧀 and computer stuffs!

Ch33z_plz🧀🐀 reposted

Here's lighttpd/1.4<>gunicorn Request smuggling N day writeup from m0lecon CTF 2025 0xsapra.gitbook.io/web/writeups/r…


Ch33z_plz🧀🐀 reposted

The story of how I almost pwned the Lexmark Postscript stack for Pwn2Own 2025... And I would have gotten away with it too, if it hadn't been for those meddling firmware updates! boredpentester.com/pwn2own-2025-p…


Ch33z_plz🧀🐀 reposted

💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible. The vulnerability lets…

wiz_io's tweet image. 💥 Wiz Research has uncovered a critical Redis vulnerability that&apos;s been hiding for 13 years

We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It&apos;s rated CVSS 10 - the highest severity possible.

The vulnerability lets…

Ch33z_plz🧀🐀 reposted

The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…


Ch33z_plz🧀🐀 reposted

We triggered WhatsApp 0-click on iOS/macOS/iPadOS. CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300. Analysis of Samsung CVE-2025-21043 is also ongoing.


Ch33z_plz🧀🐀 reposted

Writeup for CVE-2025-24085, an ITW mediaplaybackd vulnerability patched earlier this year github.com/b1n4r1b01/n-da…


Ch33z_plz🧀🐀 reposted

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


Ch33z_plz🧀🐀 reposted

Ch33z_plz🧀🐀 reposted

ring ring... who is it? a bucket of sand to bury your head in. Join us today on our journey through FreePBX's CVE-2025-57819, as we chain unusual behaviour to demonstrate the auth bypass, to SQLi, to RCE, used in-the-wild. labs.watchtowr.com/you-already-ha…


Ch33z_plz🧀🐀 reposted

My favourite finding from @SLCyberSec's Security Research team in 2025 so far is a secondary context path traversal in Omnissa Workspace One UEM (CVE-2025-25231). Really interesting bug, and fun kill chain to RCE. slcyber.io/assetnote-secu…


Ch33z_plz🧀🐀 reposted

New blog post: Exploiting the Synology TC500 at Pwn2Own Ireland 2024 We built a format string exploit for the TC500 smart cam. It didn’t get used, but it made for a fun case study. blog.infosectcbr.com.au/2025/08/01/exp…


Ch33z_plz🧀🐀 reposted

The @SLCyberSec research team is releasing our final research post for our Christmas in July efforts, two RCEs and one XXE (all pre-auth) in Adobe Experience Manager Forms. One of the RCEs and the XXE still do not have official patches: slcyber.io/assetnote-secu…


Ch33z_plz🧀🐀 reposted

Series on hacking the Xbox 360 hypervisor Part 1: icode4.coffee/?p=1047 Part 2: icode4.coffee/?p=1081 Credits @Grimdoomer #infosec #xbox

0xor0ne's tweet image. Series on hacking the Xbox 360 hypervisor

Part 1: icode4.coffee/?p=1047
Part 2: icode4.coffee/?p=1081

Credits @Grimdoomer

#infosec #xbox
0xor0ne's tweet image. Series on hacking the Xbox 360 hypervisor

Part 1: icode4.coffee/?p=1047
Part 2: icode4.coffee/?p=1081

Credits @Grimdoomer

#infosec #xbox

Ch33z_plz🧀🐀 reposted

pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. pwn.college

alexjplaskett's tweet image. pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.

pwn.college

Ch33z_plz🧀🐀 reposted

Lots of good (but not necessarily stealth) VMWare hypervisor hacking and lateral movement tricks in this report. sygnia.co/blog/fire-ant-…


Ch33z_plz🧀🐀 reposted

🚨 Shocking impact from the SharePoint vulnerability we found at Pwn2Own! 😱 Despite our efforts to patch it 🤝, many systems are still at risk ⚠️. Secure yours now! 🔒 Details: blog.viettelcybersecurity.com/toolshell-a-cr…


Ch33z_plz🧀🐀 reposted

This month's Christmas in July release from @SLCyberSec's Security Research team is a pre-authentication RCE vulnerability in Sawtooth Lighthouse Studio (CVE-2025-34300). This software is prevalent and hidden in plain sight. Read more on our blog: slcyber.io/assetnote-secu…

infosec_au's tweet image. This month&apos;s Christmas in July release from @SLCyberSec&apos;s Security Research team is a pre-authentication RCE vulnerability in Sawtooth Lighthouse Studio (CVE-2025-34300). This software is prevalent and hidden in plain sight. Read more on our blog: slcyber.io/assetnote-secu…

Ch33z_plz🧀🐀 reposted

How do we turn bad SSRF (blind) into good SSRF (full response)? The @assetnote Security Research team at @SLCyberSec used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…

infosec_au's tweet image. How do we turn bad SSRF (blind) into good SSRF (full response)? The @assetnote Security Research team at @SLCyberSec used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…

Ch33z_plz🧀🐀 reposted

With the help of the Sesame Street gang, watchTowr Labs is back - with a pre-auth RCE chain against Sitecore Experience Platform that we discovered and reported in February this year. Enjoy..... labs.watchtowr.com/is-b-for-backd…


Loading...

Something went wrong.


Something went wrong.