Pseudorandom Thoughts
420 subscribers
96 photos
8 files
338 links
我将开口,同时爽到爆。
Download Telegram
Forwarded from 🐱 Ch. | 挪瓦咖啡配苕皮套餐 TV (webRTCCat | Present Day, Present Time)
有windows用wifi的群友更新下系统,微软爆了个大的
cve-2024-30078
利用难度低 危害性高
Forwarded from 鳖频道 (ω)
https://www.cyberscarecrow.com/
赛博稻草人

杀毒软件 ×
吓毒软件 √
Forwarded from vx-underground
June 11th a Microsoft engineer accidentally leaked 4GB of Microsoft PlayReady internal code. It was leaked on the Microsoft Developer Community. The leak includes:

- WarBird configurations
- WarBird libraries for code obfuscation functionality
- Libraries with symbolic information related to PlayReady

Researchers from AG Security Research Lab were able to successfully build the Windows PlayReady dll library from the leaked code. Interestingly, they were assisted because on the Microsoft Developer Community forum a user also provided step-by-step instructions on how to begin the build process.

Also, interestingly, interestingly, the Microsoft Symbol Server doesn't block requests for PDB files corresponding to Microsoft WarBird libraries, which inadvertently leaks more information.

Adam Gowdiak of AG Security Research Lab reported the issue and Microsoft removed the forum post. However, as of this writing, the download link is still active.

File listing is below. Forums screenshots are attached. All information discovered by AG Security Research Lab

File listing: https://pastebin.com/raw/i65qfd2z
Forwarded from bupt.moe
#security
OpenSSH 发现 RCE。影响范围 8.5p1 <= OpenSSH < 9.8p1
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
说个恶心的,一些TLS证书厂商会在公司TLS证书还有三个甚至两个月过期的时候直球打电话给业务部门,恐吓说证书即将过期/不合规/需要更换/……等各种,堪比当年的某菲安全对着GitHub公共库一键发射 SCA issue
夏日花火大会,一起去看吧(大嘘)