■■■□□ Server side prototype pollution, how to detect and exploit. https://blog.yeswehack.com/talent-development/server-side-prototype-pollution-how-to-detect-and-exploit/ https://t.me/cKure/12139
All posts tagged cyber
February 26, 2023 at 10:24AM
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space level of pages, and how the GitHub Security Lab used the kernel space…
February 25, 2023 at 05:02PM
■■■□□ Empire 5.0 / Starkiller 2.0. https://www.bc-security.org/introducing-empire-5-0-starkiller-2-0/ https://t.me/cKure/12137
February 25, 2023 at 12:46AM
■■■□□ Fortinet Fortinac CVE-2022-39952 floor has been exploited in the wild hours after the PoC exploit was released. https://securityaffairs.com/142621/hacking/fortinet-fortinac-cve-2022-39952-exploitation.html https://t.me/cKure/12136
February 24, 2023 at 06:28PM
■■□□□ ‘Intigriti’ XSS challenge https://twitter.com/intigriti/status/1628736484365795329 https://t.me/cKure/12135
February 24, 2023 at 02:33PM
Vulnerability write-up – “Dangerous assumptions”. https://www.codean.io/blog/vulnerability-write-up—%22dangerous-assumptions%22 https://t.me/cKure/12134
February 24, 2023 at 11:35AM
■■□□□ Hiding In PlainSight – Proxying DLL Loads To Hide From ETWTI Stack Tracing. https://0xdarkvortex.dev/proxying-dll-loads-for-hiding-etwti-stack-tracing/ https://t.me/cKure/12132
February 24, 2023 at 11:04AM
■■■■□ CVE-2023-21608 https://github.com/hacksysteam/CVE-2023-21608 https://t.me/cKure/12131
February 23, 2023 at 05:06PM
■■■■□ Binarly researchers conduct a deep-dive investigation into Lenovo’s LEN-94952 bulletin and find that two vulnerabilities — CVE-2022-3430 and CVE-2022-3431 — remain unfixed one month after their official disclosure. https://binarly.io/posts/Multiple_Vulnerabilities_in_Qualcomm_and_Lenovo_ARM_based_Devices/index.html https://t.me/cKure/12130
February 23, 2023 at 10:04AM
CVE-2023-21752; allows a basic user to execute arbitrary code on a host to delete files from [a] specified storage path, from Windows Backup and Restore service. The vulnerability is triggered using the Race Condition between temporary file creation and deletion, which takes place following the authentication process. https://cloudsek.com/threatintelligence/cve-2023-21752-privilege-escalation-vulnerability-on-windows-backup-service https://www.infosecurity-magazine.com/news/hackers-exploit-flaw-windows/ https://t.me/cKure/12129
