SecList for CyberStudents
239 subscribers
584 photos
23 videos
211 files
896 links
Think outside the box
Download Telegram
Forwarded from Turan Security
This media is not supported in your browser
VIEW IN TELEGRAM
Pwn2Own 2025: Samsung S25 Ultra zero-click orqali buzildi - $100 000 mukofot

Pwn2Own 2025 xalqaro xakerlik musobaqasida tadqiqotchilar Samsung S25 Ultra qurilmasini zero-click zaiflik orqali 1 daqiqadan kam vaqt ichida komprometatsiya qilishdi va $100 000 mukofotni qo‘lga kiritishdi.

Muhim jihatlar:
▫️Foydalanuvchidan hech qanday harakat talab qilinmadi;
▫️Link bosish, fayl ochish yoki ilova o‘rnatish bo‘lmadi;
▫️To‘liq masofaviy ekspluatatsiya;
▫️Qurilma flagman bo‘lishiga qaramay buzildi;

Texnik xulosa:
Zero-click hujumlar bugungi kunda mobil OS, xizmatlar va kommunikatsiya steklari uchun eng xavfli tahdidlardan biri bo‘lib qolmoqda. Qurilmaning yangiligi xavfsizlik kafolati emas.

Tavsiyalar:
Mobil qurilmalar uchun Threat Model’ni yangilash
MDM / EMM siyosatlarini qayta ko‘rib chiqish
Zero-click ssenariylarini incident response rejalariga kiritish

😎Turan Security eslatib o'tadi:
Hujum uchun foydalanuvchi xatosi shart emas.


#TuranSec #Pwn2Own2025 #ZeroClick #MobileSecurity #Samsung #Infosec #CyberThreats

Komprometatsiya - Tizim egallab olinishi

@TuranSecurity| www.turansec.uz
Please open Telegram to view this post
VIEW IN TELEGRAM
2
Forwarded from AppSec Guy
This media is not supported in your browser
VIEW IN TELEGRAM
RCE on Google Chrome up to 141.0.7390.65 version through Use after free in Storage (CVE-2025-11460) - ASLR, CFG bypass

PoC exploit: https://issues.chromium.org/issues/446722008

Bounty: $100,000
Forwarded from Ombor
Ommaviy bo'lgan write-uplar to'plami

https://www.writeup-db.com/

@cyber_ombor
Forwarded from SecuriXy.kz
🚨 CVE-2025-55182 - Pre-auth RCE в React Server Components

Уязвимость в RSC (версии 19.0.0, 19.1.0, 19.1.1, 19.2.0) позволяет удаленное выполнение кода без аутентификации через небезопасную десериализацию payload’ов в Server Function endpoints.
Затронутые пакеты:

react-server-dom-parcel
react-server-dom-turbopack
react-server-dom-webpack


🚨 CVE-2025-66478 затрагивает Next.js начиная с 14.3.0-canary.77, все ветки 15.x и 16.x до патчей.
Безопасные версии: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7.

🔬 PoC / инструменты:  
анализ и эксплойт  
сканер для выявления уязвимых инстансов  
PoC 1  
PoC 2  
Лаборатория для тестов
Nuclei templates:  
versions.yaml  
cve-2025-55182.yaml
Forwarded from Cat Seclist
DEDSEC_WI-FIDAR

Инструмент для Wi-Fi-маппинга, заточенный под анализ беспроводных сетей. Сканирует доступные Wi-Fi-сети в зоне досягаемости и на основе собранных данных вычисляет примерное расстояние до каждой сети.

https://github.com/0xbitx/DEDSEC_WI-FIDAR/

👉 @cybersecinform
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
FaceSeek — an online reverse face-search service using artificial intelligence technology. It is designed to identify faces from photos and monitor their appearances in open sources.

https://www.faceseek.online/
Forwarded from RadvanSec (‌ ‌reza)
CVE-2026-21858.yaml
1.8 KB
n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain
https://github.com/Chocapikk/CVE-2026-21858

⭐️ @RadvanSec
Forwarded from Proxy Bar
CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare
*
Full Chain Exploit

#n8n #exploit Happy