{"uuid": "c604682c-a0ac-462c-a70e-8d4faa8c396a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24016", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8035", "content": "#GitHub #Tools\n\nWazuh \u2014 Unsafe Deserialization RCE (CVE-2025-24016)\n\nAn unsafe deserialization vulnerability in Wazuh servers allows remote code execution through unsanitized dictionary injection in DAPI requests/responses\n\n https://github.com/0xjessie21/CVE-2025-24016\n\nTool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number (USN) to filter current properties of objects.\n\nhttps://github.com/DrunkF0x/ADSpider\n\nMorgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulnerabilities, and potential risks within JavaScript files on websites.\n\nhttps://GitHub.com/VFA250/Morgan\n\n#HackersFactory", "creation_timestamp": "2025-03-05T04:04:34.000000Z"}