{"uuid": "a3187bff-0ba7-464d-b810-c2218c0565c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38178", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/5172", "content": "Security Analysis of WeChat\u2019s MMTLS Encryption Protocol\n\nCoverage-guided Fuzzing as Online Stochastic Control\n\nDiscover Microsoft Browser 0-DAY (CVE-2024-38178)\n\ncontrol over the Outlook desktop application and therefore to the emails configured in it (Github)\n\nLet\u2019s Clone a Cloner - Part 2: You Have No Power Here (hardware hacking)\n\npersistence techniques for macOS\n\nAttacking the Samsung Galaxy A* Boot Chain\n\nMake Binwalk Fast Again - Rust Rewrite of Binwalk is in Beta", "creation_timestamp": "2024-10-16T19:14:43.000000Z"}