CVE-2025-68645 - A Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration
https://github.com/MaxMnMl/zimbramail-CVE-2025-68645-poc

GitHub - MaxMnMl/zimbramail-CVE-2025-68645-poc: CVE-2025-68645 - A Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration
CVE-2025-68645 - A Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration - MaxMnMl/zimbramail-CVE-2025-68645-poc
GitHub
The threat actors behind Shai Hulud has struck again, hitting Zapier and Ensdomains
A new variant of Shai Hulud has hit Zapier and Ensdomains
Make Self-XSS Great Again
Disclaimer: This article is intended for security professionals conducting authorized testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs, disruption of system operation, and violation of the confidentiality of correspondence are pursued by law.
Introduction Many security researchers are familiar with the frustrating experience of discovering an XSS vulnerability that requires complex actions within an account, effectively making it only reproducible on the attacker’s account and thus losing its practical value.
One-Click RCE in ASUS’s Preinstalled Driver Software 🧯🔥
https://mrbruh.com/asusdriverhub/
One-Click RCE in ASUS's Preinstalled Driver Software
One-Click RCE in ASUS’s Preinstalled Driver Software Part Two of the ASUS series is out, read it here.
Introduction This story begins with a conversation about new PC parts.
After ignoring the advice from my friend, I bought a new ASUS motherboard for my PC. I was a little concerned about having a BIOS that would by default silently install software into my OS in the background. But it could be turned off so I figured I would just do that.

Google Cloud Account Takeover via URL Parsing Confusion
This article walks through a unique OAuth account takeover vulnerability I had recently discovered affecting several Google services. It arises from URL parsing confusion when handling redirect_uri…
InfoSec Write-ups
Dojo #40 - Hacker profile - YesWeHack Dojo
# Hacker profile - Dojo #40
Active until : **17th April - 2025**
Authors: [Minilucker](https://x.com/0xidel)
#### How to submit your report
1. Visit the Dojo program at [https://yeswehack.com/programs/dojo](https://yeswehack.com/programs/dojo)
2. Click on **submit report**
3. Login or create your account
4. Submit your report
---
## Description
Use only JSON to build your hacker profile. The developer claims their application is fully secure. Prove them wrong by reading the `flag.txt` file on the server.
~ _The flag can be found in the enviroment variable: `FLAG`_
## Goal
**BRUTE FORCE IS NOT ALLOWED!**
(_Applies only to the Dojo challenge page itself._)
### A valid solution for the challenge must meet these requirements:
- Your report must include a proof of concept (PoC) showing how you obtained the flag
- The flag must be included in the report
Exploring the DOMPurify library: Hunting for Misconfigurations (2/2). Tags:Article - Article - Web - mXSS
Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)
mizu.re
Dojo #39 - Phishing - YesWeHack Dojo
# Phishing
Active until : **28th February - 2025**
#### How to submit your report
1. Visit the Dojo program at [https://yeswehack.com/programs/dojo](https://yeswehack.com/programs/dojo)
2. Click on **submit report**
3. Login or create your account
4. Submit your report
---
## Description
A new website offers free “phishing” sites, grab yours before it's too late!
The flag can be found in the enviroment variables named : `FLAG`
## Goal
**BRUTE FORCE IS NOT ALLOWED!**
(_Applies only to the Dojo challenge page itself._)
### A valid solution for the challenge must meet these requirements:
- Your report must include a proof of concept (PoC) showing how you obtained the flag
- The flag must be included in the report