cKure Red
2.5K subscribers
71 photos
46 videos
21 files
458 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Zero-Day: Critical Remote Code Execution issue impacts popular post-exploitation toolkit Cobalt Strike .

https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-2

https://securityaffairs.co/wordpress/137284/hacking/cobalt-strike-rce.html
● Exclusive - Zero-Day: A medium to high severity vulnerability in SAP portal allows a low privileged authenticated user to escalate privileges within the system abusing certain API end-points.

The latest software / CMS is vulnerable and possibly all previous versions as well.
SAP has been informed about the bug who have confirmed it and have planned to roll out the fix by mid-2023 (Seems SAP does not prioritize security).

No CVE was assigned. Researcher: Aamer
cKure Red pinned «● Exclusive - Zero-Day: A medium to high severity vulnerability in SAP portal allows a low privileged authenticated user to escalate privileges within the system abusing certain API end-points. The latest software / CMS is vulnerable and possibly all previous…»
🚨 Researchers from Google's Project Zero security team said that the Samsung S10, A50, and A51 models were affected, and that only devices powered by Samsung's home-made Exynos chip were vulnerable, meaning the targets (as well as the attackers) were located in Europe, the Middle East, or Africa.

CVE-2021-25337, CVE-2021-25369, CVE-2021-25370

https://googleprojectzero.blogspot.com/2022/11/a-very-powerful-clipboard-samsung-in-the-wild-exploit-chain.html

https://www.techradar.com/news/samsung-phones-are-being-targeted-by-some-seriosuly-shady-zero-days
cKure Red pinned «🚨 Researchers from Google's Project Zero security team said that the Samsung S10, A50, and A51 models were affected, and that only devices powered by Samsung's home-made Exynos chip were vulnerable, meaning the targets (as well as the attackers) were located…»
cKure Red pinned «Remote Code Execution in Exchange PowerShell Backend. https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend»
🔧 Tool: Femtobrowser. A really basic web browser written in ~500 lines of V using only the integrated vlib library. It was not designed to be fast or efficient, but rather to be a simple example of how to use the vlib library to create a web browser. Made in few hours to mess around with V.

https://github.com/SheatNoisette/femtobrowser