■■■□□ Gadget chain for deserialization in Zend Framework applications. Triggers on __destruct(), gives RCE and works in PHP 7. https://gist.github.com/YDyachenko/6f60709ce0fc346d0cc0252e07c6aa38 https://t.me/cKure/6144
All posts in Uncategorized
November 27, 2020 at 12:46PM
■■■□□ Statement from Canon: Attacker was Maze Ransomware Group. Compromised Data was around 10GB. https://www.usa.canon.com/internet/portal/us/home/explore/securityincident https://t.me/cKure/6143
November 27, 2020 at 12:43PM
CODE: “` #define _CRT_SECURE_NO_WARNINGS #include #include #include #include #include #include #include bool IsProcessRunning(char *szProcName) { PROCESSENTRY32 entry; entry.dwSize = sizeof(PROCESSENTRY32); HANDLE snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, NULL); if (!Process32First(snapshot, &entry)) { CloseHandle(snapshot); return false; } …
November 27, 2020 at 12:43PM
■□□□□ #unconfirmed Following is a quote from a source / Actor: I tested it on my botnet and it generated shitload of traffic, alot of people told me it’s not easy, not possible bla bla, so this was one more reason for me to make one. 1. Check Telegram path exist 2. Check if process…
November 27, 2020 at 10:43AM
■■■■□ CVE-2020-28949 and CVE-2020-28948 RCE on Drupal via Phar Deserialization in PEAR Archive_Tar library. https://www.drupal.org/sa-core-2020-013 https://t.me/cKure/6140
November 27, 2020 at 03:00AM
■■■□□ Blog wrt. accidental Windows privilege escalation. https://itm4n.github.io/windows-registry-rpceptmapper-eop/ https://t.me/cKure/6139
November 27, 2020 at 02:56AM
■■■□□ #DataLeak: Personal data of 16 million Brazilian COVID-19 patients exposed online. https://www.zdnet.com/article/personal-data-of-16-million-brazilian-covid-19-patients-exposed-online/ https://t.me/cKure/6138
November 27, 2020 at 02:53AM
■■□□□ #Privacy: Bug Allowed Hackers to Get Anyone’s Email Address on Xbox Live. https://www.vice.com/en/article/m7ag44/bug-allowed-hackers-to-get-anyones-email-address-on-xbox-live https://t.me/cKure/6137
November 26, 2020 at 08:42PM
■■■■■ CVE-2020-24227: Playground Sessions for Windows, stores the user credentials in plain text allowing anyone with access to C:\Users\AppData\Roaming\Playground\Local Store#SharedObjects\Playground.swf\UserProfiles.sol to extract the email and password. https://github.com/nathunandwani/CVE-2020-24227 | #0day #zeroday https://t.me/cKure/6135
November 26, 2020 at 08:37PM
■■□□□ Vulnerabilities in Checkpoint , ICA Management Tool. https://swarm.ptsecurity.com/vulnerabilities-in-checkpoint-ica-management-tool/ https://t.me/cKure/6134
