> Latest Research

Exploit development, vulnerability research & security writeups

PyJWT Critical Header Validation Bypass  โ€“ Authentication Bypass PoC
๐ŸŒ Web Vulnerabilities Intermediate Web CVE-2026-32597

PyJWT Critical Header Validation Bypass โ€“ Authentication Bypass PoC

A vulnerability in PyJWT versions prior to 2.12.0 allows JSON Web Tokens containing unknown critical header parameters to be accepted instead of rejected. This issue can lead to authentication bypass or security policy circumvention in applications relying on strict JWT validation.

Mar 14, 2026 4 min read Security Bypass / Patch
#jwt #cybersecurity #python security #exploit
macOS LaunchDaemon Privilege Escalation via com.apple.securemonitor (CVE-2025-24085)
windows Beginner macOS CVE-2025-24085

macOS LaunchDaemon Privilege Escalation via com.apple.securemonitor (CVE-2025-24085)

A vulnerability in macOS LaunchDaemon configuration allows local attackers to hijack a system daemon and execute arbitrary commands with root privileges. This article demonstrates a proof-of-concept exploit that installs a root shell and persistent LaunchDaemon backdoor.

May 31, 2025 3 min read Kernel Exploit
#cybersecurity #persistence backdoor #privilege escalation #macos vulnerability
Microsoft Windows Server 2025 JScript Engine Use-After-Free Remote Code Execution (CVE-2025-30397)
windows Beginner Windows CVE-2025-30397

Microsoft Windows Server 2025 JScript Engine Use-After-Free Remote Code Execution (CVE-2025-30397)

A Use-After-Free vulnerability in the JScript engine of Internet Explorer on Windows Server 2025 allows remote attackers to execute arbitrary code through a specially crafted webpage. This article demonstrates a proof-of-concept exploit that launches calc.exe to confirm code execution.

May 31, 2025 4 min read Heap Use-After-Free
#windows security #browser exploitation #rce exploit #use-after-free
WordPress User Registration Plugin โ‰ค 4.1.2 Authentication Bypass (CVE-2025-2594) โ€“ Exploit PoC
๐ŸŒ Web Vulnerabilities Intermediate Web CVE-2025-2594

WordPress User Registration Plugin โ‰ค 4.1.2 Authentication Bypass (CVE-2025-2594) โ€“ Exploit PoC

A vulnerability in the WordPress User Registration & Membership plugin allows attackers to bypass authentication by abusing a vulnerable AJAX endpoint. This article demonstrates a proof-of-concept exploit targeting versions 4.1.2 and earlier.

May 22, 2025 1 min read Security Bypass / Patch
#cybersecurity #exploit #authentication bypass #wordpress plugin vulnerability