Разбор уязвимости command injection в Nvidia GeForce Experience
https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/
https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/
Rhino Security Labs
NVIDIA GFE OS Command Injection: CVE-2019-5678
This post walks through the discovery process of the NVIDIA GeForce Experience OS command injection vulnerability, assigned to CVE-2019-5678.
macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks
https://thehackernews.com/2019/06/macOS-synthetic-click.html
https://thehackernews.com/2019/06/macOS-synthetic-click.html
Анализ недавнего 0day в Windows
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html
0Patch
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
Backward Compatibility is Hard, and so is Stacked Impersonation by Simon Raner and Mitja Kolsek, the 0patch Team [Update 6/12/201...
Bypass XSS filters using JavaScript global variables
https://www.secjuice.com/bypass-xss-filters-using-javascript-global-variables/
https://www.secjuice.com/bypass-xss-filters-using-javascript-global-variables/
Want to take over the Java ecosystem? All you need is a MITM!
https://medium.com/@jonathan.leitschuh/want-to-take-over-the-java-ecosystem-all-you-need-is-a-mitm-1fc329d898fb
https://medium.com/@jonathan.leitschuh/want-to-take-over-the-java-ecosystem-all-you-need-is-a-mitm-1fc329d898fb
Medium
Want to take over the Java ecosystem? All you need is a MITM!
Hundreds of incredibly popular and widely deployed Java libraries & JVM compilers are still downloading their dependencies over HTTP with…
Forwarded from r0 Crew (Channel)
Heap Overflow Exploitation on Windows 10 Explained https://blog.rapid7.com/2019/06/12/heap-overflow-exploitation-on-windows-10-explained/ #exploitation #dukeBarman
Digging up the Past: OS X File Versioning
https://versprite.com/blog/security-research/file-versioning-mac-os-x/
https://versprite.com/blog/security-research/file-versioning-mac-os-x/
VerSprite
Digging up the Past: OS X File Versioning
In this case study of OS X digital forensics, we were tasked to recover the version history of documents created using Apple’s TextEdit application.
Exploiting CVE-2019-1040 - Combining relay vulnerabilities for RCE and Domain Admin
https://dirkjanm.io/exploiting-CVE-2019-1040-relay-vulnerabilities-for-rce-and-domain-admin/
https://dirkjanm.io/exploiting-CVE-2019-1040-relay-vulnerabilities-for-rce-and-domain-admin/
dirkjanm.io
Exploiting CVE-2019-1040 - Combining relay vulnerabilities for RCE and Domain Admin
Earlier this week, Microsoft issued patches for CVE-2019-1040, which is a vulnerability that allows for bypassing of NTLM relay mitigations. The vulnerability was discovered by Marina Simakov and Yaron Zinar (as well as several others credited in the Microsoft…
AESDDoS Botnet Malware Infiltrates Containers via Exposed Docker APIs
https://blog.trendmicro.com/trendlabs-security-intelligence/aesddos-botnet-malware-infiltrates-containers-via-exposed-docker-apis/
https://blog.trendmicro.com/trendlabs-security-intelligence/aesddos-botnet-malware-infiltrates-containers-via-exposed-docker-apis/
Trend Micro
AESDDoS Botnet, Containers, Exposed Docker APIs
An API misconfiguration in the open-source version of the popular DevOps tool Docker Engine-Community allows attackers to infiltrate containers and run a variant of AESDDoS.
Реализация файловой системы поверх системных артефактов (Windows и macOS)
https://github.com/SafeBreach-Labs/AltFS
https://github.com/SafeBreach-Labs/AltFS
GitHub
GitHub - SafeBreach-Labs/AltFS: The Alternative Fileless File System
The Alternative Fileless File System. Contribute to SafeBreach-Labs/AltFS development by creating an account on GitHub.
How I Hacked the Microsoft Outlook Android App and Found CVE-2019-1105
https://www.f5.com/labs/articles/threat-intelligence/how-i-hacked-the-microsoft-outlook-android-app-and-found-cve-2019-1105#.XRCqdjj5OfA.twitter
https://www.f5.com/labs/articles/threat-intelligence/how-i-hacked-the-microsoft-outlook-android-app-and-found-cve-2019-1105#.XRCqdjj5OfA.twitter
F5 Labs
How I Hacked the Microsoft Outlook Android App and Found CVE-2019-1105
It looked like a simple XSS in the Outlook Android app, but the app developers couldn’t reproduce it so they didn’t fix it. Then things got interesting. Here’s the story of how I discovered CVE-2019-1105.