{"uuid": "9b609d24-c5b6-4c7b-ad53-d08506880559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-30103", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4295", "content": "\ud83e\udd77\ud83c\udffb DEFCON 32 is over and you can find the links on the interesting researches (in our view) below:\n\n\ud83d\uded1SQL Injection Isn't Dead. Smuggling Queries at the Protocol Level\n\n\ud83d\uded1A TWO-PART SAGA: CONTINUING THE JOURNEY OF HACKING MALWARE C2S\n\n\ud83d\uded1Outlook Unleashing RCE Chaos: CVE-2024-30103 &amp; CVE-2024-38021\n\n\ud83d\uded1Gotta Cache \u2018em all: Bending the rules of web cache exploitation\n\n\ud83d\uded1NTLM: the last ride\n\n\ud83d\uded1HookChain: a new perspective for Bypassing EDR Solutions\n\n\ud83d\uded1sshamble: Unexpected Exposures in SSH\n\n\ud83d\uded1MaLDAPtive LDAP Obfuscation Deobfuscation and Detection\n\n\ud83d\uded1Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine\n\n\ud83d\uded1Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming\n\nAll presentations from DEFCON32: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/", "creation_timestamp": "2024-08-12T15:58:24.000000Z"}