{"uuid": "f75d9466-9853-45c2-8098-0e90ea6f516d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38178", "type": "seen", "source": "https://t.me/reverse_dungeon/3794", "content": "Security Analysis of WeChat\u2019s MMTLS Encryption Protocol\n\nCoverage-guided Fuzzing as Online Stochastic Control\n\nDiscover Microsoft Browser 0-DAY (CVE-2024-38178)\n\ncontrol over the Outlook desktop application and therefore to the emails configured in it (Github)\n\nLet\u2019s Clone a Cloner - Part 2: You Have No Power Here (hardware hacking)\n\npersistence techniques for macOS\n\nAttacking the Samsung Galaxy A* Boot Chain\n\nMake Binwalk Fast Again - Rust Rewrite of Binwalk is in Beta", "creation_timestamp": "2024-10-16T06:28:18.000000Z"}