■■■■■ Code Execution: VMware warns of critical remote code execution flaw in vSphere HTML5 client. https://go.theregister.com/feed/www.theregister.com/2021/02/23/vmware_vsphere_critical_bugs/ https://t.me/cKure/6959
All posts by cK-bot
February 23, 2021 at 10:34PM
■□□□□ Using Intruder to Brute Force Authorization Header https://hogarth45.medium.com/using-intruder-to-authorization-headers-161fd873824a https://t.me/cKure/6958
February 23, 2021 at 05:00PM
■■■□□ Finding XXE https://www.bugcrowd.com/blog/how-to-find-xxe-bugs/ https://t.me/cKure/6957
February 23, 2021 at 04:58PM
■■■□□ Shopify Account takeover; $22,500 bug-bounty. https://t.me/cKure/6956
February 23, 2021 at 03:52PM
■■□□□ FORD Session token URL lead to Reflected XSS. https://youtu.be/Ot0VuJwm5TA https://t.me/cKure/6955
February 23, 2021 at 03:36PM
■■■■■ #APT29’s Trojan utility. https://0xthreatintel.medium.com/uncovering-apt29-tool-trojan-polyglot-duke-unpacking-9af3a850bf1b https://t.me/cKure/6954
February 22, 2021 at 09:46PM
■■■■■ Massive data trove from 120,000 Myanmar companies surface online in Wikileaks-style release. Responsibility: Hacktivist / DDoSecrets Size: 350+ GB https://kr-asia.com/massive-data-trove-from-120000-myanmar-companies-surface-online-in-wikileaks-style-release #DataLeak https://t.me/cKure/6952
February 22, 2021 at 06:52PM
■■■■□ CD Project Red #DataLeak (cyberpunk) https://mobile.twitter.com/CDPROJEKTRED/status/1359048125403590660 https://t.me/cKure/6949
February 22, 2021 at 04:07PM
■■■■■ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day https://research.checkpoint.com/2021/the-story-of-jian/ #0day #Zeroday #UnitedStates #China https://t.me/cKure/6948
February 22, 2021 at 04:07PM
■■■■■ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day https://research.checkpoint.com/2021/the-story-of-jian/ #0day #Zeroday #UnitedStates #China https://t.me/cKure/6948
