{"vulnerability": "CVE-2020-1350", "sightings": [{"uuid": "f8ec0a3e-92a3-4239-859c-91bbddc03465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/5f850411-c103-491f-abff-9421425403cf", "content": "", "creation_timestamp": "2020-10-21T08:19:11.000000Z"}, {"uuid": "c7724ce6-6c45-4d6b-8a2d-e8d4c8b76374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/42d04e94-bf5b-427d-acc8-f5d740675941", "content": "", "creation_timestamp": "2020-10-20T15:57:21.000000Z"}, {"uuid": "234ebca4-8a65-4ff1-96ea-0c3cc257c973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/d925a2ee-e7cf-46f6-bec1-ad8e19122730", "content": "", "creation_timestamp": "2020-10-20T15:58:05.000000Z"}, {"uuid": "25de6cec-eede-4060-8136-68974bf8530f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "6b526c11-6d99-4a2f-ba30-61a0d15e0ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "33389a39-8336-45a2-b8cb-01b009e6c65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/4e90d741-5e29-44c8-8703-06289b0fca84", "content": "", "creation_timestamp": "2024-11-14T06:09:40.000000Z"}, {"uuid": "ce5bcced-4967-4c95-8ec5-93452bb4b6cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://msrc.microsoft.com/blog/2020/07/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server/", "content": "", "creation_timestamp": "2020-07-14T05:00:00.000000Z"}, {"uuid": "42a1dbdd-9d85-4115-afbc-3141bc291cc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971011", "content": "", "creation_timestamp": "2024-12-24T20:23:01.084390Z"}, {"uuid": "8e9e572b-d829-44bd-93cd-a542a0066211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lmm7ltyekx2s", "content": "", "creation_timestamp": "2025-04-12T09:24:45.738047Z"}, {"uuid": "8c3427bc-4e5d-44af-9e5e-a3db0a8e651a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:46.000000Z"}, {"uuid": "2c9b8f34-6881-46bc-a3ac-cf8eab3e9014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://mastodon.social/users/verbrecher/statuses/115345793805299408", "content": "", "creation_timestamp": "2025-10-09T19:12:19.176976Z"}, {"uuid": "2df3cd05-bbd9-4eea-b045-b4b7ed92db4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lptktwcpeq2c", "content": "", "creation_timestamp": "2025-05-23T11:50:19.616549Z"}, {"uuid": "ea838253-cff3-4302-9846-cc806b585627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://gist.github.com/Darkcrai86/4c8cb314c60d42bf947e929d941f816b", "content": "", "creation_timestamp": "2025-09-17T06:21:37.000000Z"}, {"uuid": "3117279e-ca65-4225-9ae8-db3619c0c382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3lyyeqluspyl2", "content": "", "creation_timestamp": "2025-09-16T22:31:41.748551Z"}, {"uuid": "2eb34157-e7ca-45d6-8f97-3145ccb75ebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:56.000000Z"}, {"uuid": "1822b82c-210f-47f2-8bb6-1ca6adc11775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=494", "content": "", "creation_timestamp": "2020-07-15T04:00:00.000000Z"}, {"uuid": "af1b4ff9-3bb4-47f5-806a-82d449632ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/Mxb1mCtk3iGYgaEVg6LYjbghLzhEbZ6j_DLQqy4lO_sqVw", "content": "", "creation_timestamp": "2020-07-14T19:01:53.000000Z"}, {"uuid": "e993af80-2668-4ae6-90ee-85a964c4499f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2e88bcd3-e1c5-4a9d-81b1-ceaba191f102", "content": "", "creation_timestamp": "2026-02-02T12:28:52.532006Z"}, {"uuid": "6ffe5298-4457-4b97-8404-79ea17a44b0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1462", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 SigRed CVE-2020-1350 update.\n\nhttps://sensepost.com/blog/2020/seeing-sigred/", "creation_timestamp": "2020-07-24T22:00:09.000000Z"}, {"uuid": "75f51ed2-cbcc-48f6-ac8b-a2977ad6ad47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/322", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aNSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972\nURL\uff1ahttps://github.com/psc4re/NSE-scripts", "creation_timestamp": "2021-08-16T16:29:55.000000Z"}, {"uuid": "04872a05-8435-41c9-8bae-b1c9ebd2fe73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2050", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2020-1350 [DNS RCE]'s exploit code with demo video.\n\nhttps://mp.weixin.qq.com/s?__biz=MzUyMDEyNTkwNA==&amp;mid=2247484522&amp;idx=1&amp;sn=502839af26daa450f644488d75f42cc7&amp;chksm=f9ee68d5ce99e1c37960b7909b5e5cc40f38c9b71711309ee679f0819c10218c1f411976ad6c&amp;scene=126&amp;sessionid=1598960570&amp;key=7adf10a6617c6315506261e47c83d49da426185a83a97372680c51010cd9f8a9b7d827f8ce99f66a6a037a0e51e31792a56cebcaeb5dc0397f92e90c443832a945cc89d1d4fc750e1cd43c30783fc7f9e08c7694e22d7f0dc1bff61b42ff65d359c70b50ecbe5031962b57b47eda33f6e7a61941d4c2016c630eeeddbfe5840a&amp;ascene=1&amp;uin=MTE1NDEwMjc3NA%3D%3D&amp;devicetype=Windows+10+x64&amp;version=62090514&amp;lang=en&amp;exportkey=A9HOqRA5mpcUuAp59geFMeQ%3D&amp;pass_ticket=C6B3Q%2FKQ1%2FUbGev7ZeEeTKkGew3nmNhXz3pU3Wex0luSd%2FRuu%2BJ716bUqCZs4JbG", "creation_timestamp": "2020-09-02T09:47:53.000000Z"}, {"uuid": "8d2379f0-db6d-41fe-adc8-755a7be50af8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1328", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 SIGRed [CVE-2020-1350] advisory by #UnitedStates \ud83c\uddfa\ud83c\uddf8 government.", "creation_timestamp": "2020-07-17T19:49:39.000000Z"}, {"uuid": "9b2207e0-9f11-4686-baee-c4d28471a0c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1281", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CheckPoint discovered a 17-year-old vulnerability in all of Windows DNS Servers. SIGRed (CVE-2020-1350) is a wormable, critical vulnerability that can be used to achieve full Domain Administrator privileges.\n\nhttps://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/", "creation_timestamp": "2020-07-15T07:05:15.000000Z"}, {"uuid": "8a609bfd-a5a3-4676-92ff-bca40e2ca2f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/antichat/8579", "content": "\u041f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0439\u0442\u0435 \u043f\u0440\u0438\u0432\u0435\u0442 DNS.\nSIGRed CVE-2020-1350, CVSS: 10,0\n\nhttps://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/\n\nhttps://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server/", "creation_timestamp": "2020-07-15T13:15:44.000000Z"}, {"uuid": "e2dabe50-f3df-4baa-a592-4582a069fc1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2288", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 [CPR-Zero] CVE-2020-1350 (Windows DNS Server): Integer Overflow leading to Heap-Based Buffer Overflow (SIGRed).\n\nhttps://cpr-zero.checkpoint.com/vulns/cprid-2156/", "creation_timestamp": "2020-09-21T12:29:52.000000Z"}, {"uuid": "8e095ee8-eb8f-4432-a82b-73149a83e1b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2377", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Exploiting SIGRed (CVE-2020\u20131350) on Windows Server 2012/2016/2019.\n\nhttps://medium.com/@datafarm.cybersecurity/exploiting-sigred-cve-2020-1350-on-windows-server-2012-2016-2019-80dd88594228", "creation_timestamp": "2020-09-25T21:45:26.000000Z"}, {"uuid": "72cfc1d6-ed38-47fd-af9f-bd6306039163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/Yemen_Shield/82", "content": "WARNING \ud83d\udd25 CVE-2020-1350 (CVSS 10)\n \nA critical 17-year-old 'wormable' RCE vulnerability affects Windows DNS Servers (2013 to 2019 editions) that could let unauthenticated hackers gain 'Domain Admin' privileges on the targeted servers.\n \nResearchers confirm the new Windows vulnerability, dubbed 'SigRed,' is a wormable bug, allowing attackers to launch #malware attacks that can spread from one vulnerable computer to another without any human interaction.\n \nDetails \u2014 https://thehackernews.com/2020/07/windows-dns-server-hacking.html", "creation_timestamp": "2020-07-14T19:42:52.000000Z"}, {"uuid": "5bc6c7b1-976d-4c35-b5ca-5eaf483e09d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://t.me/orderofsixangles/456", "content": "SIGRed \u2013 Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers\n\n17-year-old vulnerability in all of Windows DNS Servers.\nSIGRed (CVE-2020-1350) is a wormable, critical vulnerability that can be used to achieve full Domain Administrator privileges.\n\nhttps://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/", "creation_timestamp": "2020-07-14T21:14:31.000000Z"}, {"uuid": "4d973384-2347-4862-a741-b64c631514e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/494", "content": "CVE-2020-1350 (SIGRed) - Windows DNS DoS Exploit\n\n\u0412\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043e! \n\n*HackerNews \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u043d\u043e\u0440\u043c\n\nhttps://github.com/maxpl0it/CVE-2020-1350-DoS", "creation_timestamp": "2020-07-16T12:15:02.000000Z"}, {"uuid": "d6382ce8-160f-46ac-af32-c89aa27c0cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/1883", "content": "CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability\nA remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability.\n\nTo exploit the vulnerability, an unauthenticated attacker could send malicious requests to a Windows DNS server.\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350", "creation_timestamp": "2020-07-14T19:46:12.000000Z"}, {"uuid": "489fa2fd-3800-4542-ad0a-70614533130a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/1892", "content": "CVE-2020-1350 (SIGRed) - Windows DNS DoS Exploit \nhttps://github.com/maxpl0it/CVE-2020-1350-DoS", "creation_timestamp": "2020-07-16T21:15:19.000000Z"}, {"uuid": "d97d191d-ea71-48ba-badf-9aad9d392da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/1894", "content": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service \nWindows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019\n\nNote: Script is not supported (not tested) in Windows Server 2008 en Windows Server 2008 R2. Those operatingsystems are End-of-life.\nhttps://github.com/T13nn3s/CVE-2020-1350", "creation_timestamp": "2020-07-16T23:51:01.000000Z"}, {"uuid": "72834805-1944-4e15-948a-307263a5c43b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/cyberbannews_ir/1170", "content": "\ud83d\udce2 \u0628\u0627\u0632\u062a\u0627\u0628\n\n\n\ud83d\udd39\u0627\u062e\u062a\u0644\u0627\u0644\u0627\u062a \u06af\u0633\u062a\u0631\u062f\u0647 \u062f\u0631 \u0633\u0637\u062d \u0645\u0644\u06cc \u062f\u0631 \u0635\u0648\u0631\u062a \u0639\u062f\u0645 \u062a\u062e\u0635\u06cc\u0635 \u0627\u0631\u0632 \u0628\u0647 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0641\u0646\u0627\u0648\u0631\u06cc/\n\u06a9\u0645\u06cc\u062a\u0647 \u0633\u0646\u0627 \u062f\u0631 \u0628\u06cc\u0627\u0646\u06cc\u0647\u200c\u0627\u06cc \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f \u062f\u0631 \u0635\u0648\u0631\u062a \u0627\u062f\u0627\u0645\u0647 \u0631\u0648\u0646\u062f \u0639\u062f\u0645 \u062a\u062e\u0635\u06cc\u0635 \u0627\u0631\u0632 \u0628\u0647 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a\u060c \u062f\u0631 \u0622\u06cc\u0646\u062f\u0647 \u0646\u0632\u062f\u06cc\u06a9 \u0634\u0627\u0647\u062f \u0627\u062e\u062a\u0644\u0627\u0644\u0627\u062a \u06af\u0633\u062a\u0631\u062f\u0647\u200c\u0627\u06cc \u062f\u0631 \u0633\u0637\u062d \u0645\u0644\u06cc \u062e\u0648\u0627\u0647\u06cc\u0645 \u0628\u0648\u062f.\n\n\ud83d\udd39\u062d\u0633\u06af\u0631\u06cc \u06a9\u0647 \u0628\u0627 \u062f\u0642\u062a \u062d\u0631\u06a9\u0627\u062a \u0628\u062f\u0646 \u0631\u0627 \u0631\u0635\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f/\n\u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u06cc\u0644\u0645 \u062d\u0627\u0648\u06cc \u0646\u0627\u0646\u0648\u0630\u0631\u0627\u062a\u060c \u062d\u0633\u06af\u0631\u06cc \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647\u200c\u0627\u0633\u062a \u0648 \u0628\u0647 \u062f\u0627\u0646\u0634\u0645\u0646\u062f\u0627\u0646 \u06a9\u0645\u06a9 \u0645\u06cc\u200c\u06a9\u0646\u062f \u062a\u0627 \u062d\u0631\u06a9\u0627\u062a \u067e\u06cc\u0686\u06cc\u062f\u0647 \u062f\u0633\u062a \u0631\u0627 \u0631\u0635\u062f \u06a9\u0646\u062f. \u0627\u06cc\u0646 \u0641\u0646\u0627\u0648\u0631\u06cc \u067e\u0627\u0631\u0627\u062f\u0627\u06cc\u0645 \u062c\u062f\u06cc\u062f\u06cc \u062f\u0631 \u0631\u0647\u06af\u06cc\u0631\u06cc \u062d\u0631\u06a9\u0627\u062a \u0628\u062f\u0646 \u0627\u06cc\u062c\u0627\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\ud83d\udd39\u0631\u0628\u0627\u062a \u0627\u0634\u0639\u0647 \u0632\u0646\u0648\u0646\u060c \u0628\u0627\u06a9\u062a\u0631\u06cc \u0647\u0627 \u0648 \u0648\u06cc\u0631\u0648\u0633 \u0647\u0627 \u0631\u0627 \u0645\u06cc \u06a9\u0634\u062f/\n\u0647\u0645\u0632\u0645\u0627\u0646 \u0628\u0627 \u0634\u06cc\u0648\u0639 \u0648\u06cc\u0631\u0648\u0633 \u06a9\u0631\u0648\u0646\u0627 \u0648 \u0646\u06af\u0631\u0627\u0646\u06cc \u0627\u0632 \u0627\u0628\u062a\u0644\u0627\u06cc \u0627\u0641\u0631\u0627\u062f \u0628\u0647 \u0627\u06cc\u0646 \u0628\u06cc\u0645\u0627\u0631\u06cc\u060c \u0634\u0631\u06a9\u062a \u0641\u0686 \u0631\u0628\u0627\u062a\u06cc\u06a9\u0633 \u0631\u0628\u0627\u062a \u062c\u062f\u06cc\u062f\u06cc \u062a\u0648\u0644\u06cc\u062f \u06a9\u0631\u062f\u0647 \u06a9\u0647 \u0628\u0627 \u0627\u0646\u062a\u0634\u0627\u0631 \u0627\u0634\u0639\u0647 \u0632\u0646\u0648\u0646 \u0628\u0627\u06a9\u062a\u0631\u06cc \u0647\u0627 \u0648 \u0648\u06cc\u0631\u0648\u0633 \u0647\u0627 \u0631\u0627 \u0627\u0632 \u0628\u06cc\u0646 \u0645\u06cc \u0628\u0631\u062f.\n\n\ud83d\udd39\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc SigRed \u062f\u0631 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0633\u0631\u0648\u0631/\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u062f\u0631 \u0645\u062c\u0645\u0648\u0639\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0645\u0627\u0647 \u062c\u0648\u0644\u0627\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0631\u0641\u0639 \u0634\u062f\u0647\u060c \u062f\u0627\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0647 CVE-\u06f2\u06f0\u06f2\u06f0-\u06f1\u06f3\u06f5\u06f0 \u0648 \u062f\u0631\u062c\u0647 \u062d\u0633\u0627\u0633\u06cc\u062a \u0628\u0627\u0644\u0627 CVSS \u06f1\u06f0 \u0627\u0633\u062a.\n\n\ud83d\udd39\u0634\u0631\u06a9\u062a TSMC \u0628\u0632\u0631\u06af\u200c\u062a\u0631\u06cc\u0646 \u0633\u0627\u0632\u0646\u062f\u0647 \u0642\u0637\u0639\u0627\u062a \u0646\u06cc\u0645\u0647\u200c\u0647\u0627\u062f\u06cc \u062c\u0647\u0627\u0646 \u0634\u062f/\n\u0627\u06cc\u0646 \u0634\u0631\u06a9\u062a \u062a\u0627\u06cc\u0648\u0627\u0646\u06cc \u0627\u0632\u0646\u0638\u0631 \u0633\u0631\u0645\u0627\u06cc\u0647\u200c\u06af\u0630\u0627\u0631\u06cc \u0634\u0631\u06a9\u062a\u200c\u0647\u0627\u06cc\u06cc \u0645\u0627\u0646\u0646\u062f \u0627\u06cc\u0646\u062a\u0644\u060c NVIDIA \u0648 \u0633\u0627\u0645\u0633\u0648\u0646\u06af \u0631\u0627 \u067e\u0634\u062a \u0633\u0631 \u06af\u0630\u0627\u0634\u062a\u0647 \u0627\u0633\u062a.\n\n\ud83d\udd39\u062a\u0635\u0648\u06cc\u0628 \u062f\u0633\u062a\u0648\u0631\u0627\u0644\u0639\u0645\u0644 (\u0633\u0646\u062f\u0628\u0627\u06a9\u0633) \u0628\u0647 \u0645\u0646\u0638\u0648\u0631 \u062a\u0633\u0647\u06cc\u0644 \u0645\u0642\u0631\u0631\u0627\u062a \u062d\u0648\u0632\u0647\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f \u0641\u0646\u0627\u0648\u0631\u06cc/\n\u062f\u0628\u06cc\u0631 \u0634\u0648\u0631\u0627\u06cc \u0639\u0627\u0644\u06cc \u0641\u0636\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc \u0627\u0632 \u062a\u0635\u0648\u06cc\u0628 \u062f\u0633\u062a\u0648\u0631\u0627\u0644\u0639\u0645\u0644 \u0645\u062d\u06cc\u0637 \u0622\u0632\u0645\u0648\u0646 (\u0633\u0646\u062f\u0628\u0627\u06a9\u0633) \u0628\u0647 \u0645\u0646\u0638\u0648\u0631 \u062a\u0633\u0647\u06cc\u0644 \u0645\u0642\u0631\u0631\u0627\u062a \u062d\u0648\u0632\u0647\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f \u0641\u0646\u0627\u0648\u0631\u06cc \u062f\u0631 \u06a9\u0634\u0648\u0631 \u062e\u0628\u0631 \u062f\u0627\u062f.\n\n\ud83d\udd39\u0628\u0627\u0646\u06a9 \u0645\u0631\u06a9\u0632\u06cc \u0698\u0627\u067e\u0646 \u0628\u0631\u0627\u06cc \u0628\u0631\u0631\u0633\u06cc \u0627\u0631\u0632 \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 \u0645\u0644\u06cc \u06a9\u0627\u0631\u06af\u0631\u0648\u0647 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a\u06cc \u062a\u0634\u06a9\u06cc\u0644 \u062f\u0627\u062f/\n\u0628\u0627\u0646\u06a9 \u0645\u0631\u06a9\u0632\u06cc \u0698\u0627\u067e\u0646 \u062a\u06cc\u0645\u06cc \u0648\u06cc\u0698\u0647 \u0628\u0631\u0627\u06cc \u062a\u062d\u0642\u06cc\u0642 \u0648 \u067e\u0698\u0648\u0647\u0634 \u062f\u0631 \u0627\u0631\u062a\u0628\u0627\u0637 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0631\u0632\u0647\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 \u0645\u0644\u06cc \u062a\u0634\u06a9\u06cc\u0644 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a.\n\n\ud83d\udd39\u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u06cc \u0628\u0631\u0627\u06cc \u0634\u0647\u0631 \u0647\u0648\u0634\u0645\u0646\u062f \u0641\u0631\u0627\u0647\u0645 \u0627\u0633\u062a/\n\u0645\u0639\u0627\u0648\u0646 \u0641\u0646\u0627\u0648\u0631\u06cc \u0648 \u0646\u0648\u0622\u0648\u0631\u06cc \u0648\u0632\u0627\u0631\u062a \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u06af\u0641\u062a: \u0628\u0627 \u062a\u0648\u0633\u0639\u0647 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u06cc\u060c \u0628\u0633\u062a\u0631 \u0644\u0627\u0632\u0645 \u0628\u0631\u0627\u06cc \u0627\u0631\u0627\u0626\u0647 \u0647\u0648\u0634\u0645\u0646\u062f \u062e\u062f\u0645\u0627\u062a \u0645\u062e\u062a\u0644\u0641 \u0627\u0632 \u0642\u0628\u06cc\u0644 \u062d\u0645\u0644\u200c\u0648\u0646\u0642\u0644\u060c \u0633\u0644\u0627\u0645\u062a\u060c \u0622\u0645\u0648\u0632\u0634\u060c \u0648... \u0641\u0631\u0627\u0647\u0645\u200c\u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\ud83d\udd39\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0628\u0627 \u0647\u0648\u0634 \u0645\u0635\u0646\u0648\u0639\u06cc \u0645\u0634\u06a9\u0644 \u062f\u0648\u0631\u0628\u06cc\u0646 \u0632\u06cc\u0631 \u0646\u0645\u0627\u06cc\u0634\u06af\u0631 \u0631\u0627 \u062d\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f/\n\u0645\u062d\u0642\u0642\u0627\u0646 \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0631\u0648\u0634\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0647\u0648\u0634 \u0645\u0635\u0646\u0648\u0639\u06cc \u062a\u0648\u0633\u0639\u0647 \u062f\u0627\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0645\u0627\u062a \u0634\u062f\u0646 \u062a\u0635\u0627\u0648\u06cc\u0631 \u067e\u0633 \u0627\u0632 \u062b\u0628\u062a \u0628\u0627 \u062f\u0648\u0631\u0628\u06cc\u0646 \u0632\u06cc\u0631 \u0646\u0645\u0627\u06cc\u0634\u06af\u0631 \u0631\u0627 \u0628\u0631\u0637\u0631\u0641 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\ud83d\udd39\u0647\u0645\u06a9\u0627\u0631\u06cc \u067e\u06cc\u200c\u067e\u0644 \u0628\u0627 \u06cc\u06a9 \u0628\u0631\u0648\u06a9\u0631 \u0628\u06cc\u062a \u06a9\u0648\u06cc\u0646\u061b \u0648\u0631\u0648\u062f \u063a\u0648\u0644 \u067e\u0631\u062f\u0627\u062e\u062a \u0628\u0647 \u062d\u0648\u0632\u0647 \u0627\u0631\u0632\u0647\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 \u062c\u062f\u06cc\u200c\u062a\u0631 \u0634\u062f/\n\u067e\u06cc\u200c\u067e\u0644\u060c \u063a\u0648\u0644 \u062d\u0648\u0632\u0647 \u0641\u06cc\u0646 \u062a\u06a9 \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc\u200c\u0647\u0627\u06cc \u0645\u0627\u0644\u06cc\u060c \u067e\u06a9\u0633\u0648\u0633 (Paxos) \u0631\u0627 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 \u062a\u0623\u0645\u06cc\u0646\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u0635\u0644\u06cc \u062e\u0648\u062f \u0628\u0631\u0627\u06cc \u062e\u062f\u0645\u0627\u062a \u062c\u062f\u06cc\u062f\u0634 \u062f\u0631 \u062d\u0648\u0632\u0647 \u0645\u0639\u0627\u0645\u0644\u0627\u062a \u0627\u0631\u0632\u0647\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644\u060c \u0627\u0646\u062a\u062e\u0627\u0628 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n\n#\u0641\u0646\u0627\u0648\u0631\u06cc\n#\u0647\u0648\u0634_\u0645\u0635\u0646\u0648\u0639\u06cc\n#\u0627\u0645\u0646\u06cc\u062a_\u0634\u0628\u06a9\u0647\n#\u062c\u0631\u0645_\u0633\u0627\u06cc\u0628\u0631\u06cc\n#\u0634\u0628\u06a9\u0647_\u0627\u062c\u062a\u0645\u0627\u0639\u06cc\n#\u062c\u0646\u06af_\u0633\u0627\u06cc\u0628\u0631\u06cc \n#\u06a9\u0631\u0648\u0646\u0627\n#\u0627\u0645\u0646\u06cc\u062a\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc\n#\u0627\u0628\u0632\u0627\u0631_\u0647\u0648\u0634\u0645\u0646\u062f \n#\u06cc\u0648\u062a\u06cc\u0648\u0628\n#\u0641\u06cc\u0633_\u0628\u0648\u06a9 \n#\u062a\u0648\u0626\u06cc\u062a\u0631 \n\n\n\u2705\u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646 \u0645\u062a\u0646 \u06a9\u0627\u0645\u0644 \u0627\u062e\u0628\u0627\u0631 \u0628\u0647 \u0633\u0627\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u0628\u0627\u0646 \u0645\u0631\u0627\u062c\u0639\u0647 \u0646\u0645\u0627\u0626\u06cc\u062f:\nhttps://Www.cyberbannews.com/\n\n@cyberbannews_ir", "creation_timestamp": "2020-07-22T03:41:31.000000Z"}, {"uuid": "ec8b2891-66bf-451d-ae9e-4adc393d3db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/alexmakus/3551", "content": "OK, CVE-2020-1350\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350\n\n\u041a\u0420\u0418\u0422\u0418\u041a\u0410\u041b\n\n\u0432\u044b \u0437\u043d\u0430\u0435\u0442\u0435, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0442\u044c \ud83d\ude42", "creation_timestamp": "2020-07-14T19:06:52.000000Z"}, {"uuid": "633245bb-406f-4e09-869b-8586dbc71e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/N0iSeBit/492", "content": "CVE-2020-1350 \u043a\u043b\u0430\u0441\u0441\u0438\u043a\u0430 \u043d\u0438\u043a\u043e\u0433\u0434\u0430 \u043d\u0435 \u043e\u0441\u0442\u0430\u0440\u0435\u0432\u0430\u0435\u0442, \u043a\u0440\u0430\u0441\u0438\u0432\u044b\u0439 integer overflow \u0440\u0430\u0441\u043a\u0440\u0443\u0447\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u044f\u0448\u043a\u0443 \u0432 \u043a\u0443\u0447\u0435. \nSIGRed - 17-\u043b\u0435\u0442\u043d\u0438\u0439 \u0431\u0430\u0433 \u0441 \u0432\u043f\u043e\u043b\u043d\u0435 \u0441\u0435\u0431\u0435 \"\u0447\u0435\u0440\u0432\u0438\u0432\u044b\u043c\" \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 RCE \u0432 DNS \u0432 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 DNS \u043d\u0430 \u0432\u0438\u043d\u0434\u0435. MS \u043d\u0443 \u043a\u0430\u043a \u0436\u0435 \u0442\u0430\u043a\u043e\u0435 \u0435\u0449\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0432 2020 \u0433\u043e\u0434\u0443! \ud83d\udd25\ud83d\ude48\n\nhttps://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/", "creation_timestamp": "2020-07-15T00:32:52.000000Z"}, {"uuid": "879f125a-d482-4b4f-98a8-fd1da0fc7901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/ctinow/23514", "content": "https://ift.tt/3ezbCnQ\nCVE-2020-1350 #sigRED who thef@ck use windows DNS server anyway? \ud83e\udd37&zwj;\u2642\ufe0f\n\n*Jan0fficial*", "creation_timestamp": "2020-07-15T14:14:19.000000Z"}, {"uuid": "6eb20502-a394-4bec-b907-3b8fe929afdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/hybgl/316", "content": "#sigred #ddos\n\n[ CVE-2020-1350-DoS ] \n\nhttps://github.com/maxpl0it/CVE-2020-1350-DoS/blob/master/sigred_dos.py", "creation_timestamp": "2020-07-16T01:41:42.000000Z"}, {"uuid": "9086653f-7309-4391-a9d0-e7753115639d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/is_n3ws/36", "content": "\u0410\u041d\u0411 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u043e \u0430\u0442\u0430\u043a\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0432\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u043e \u043e\u0442\u0447\u0435\u0442. Top-20 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nhttps://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF\n\nGaining Remote Access: \n-----------------------------\nCVE-2019-11510: Arbitrary file read/Pulse Secure VPN\nCVE-2019-19781: RCE/Citrix ADC\nCVE-2020-8195/3/6: Unauthenticated access\nCVE-2019-0708: RCE on RDP server\nCVE-2020-5902: RCE in F5 BIG-IP\n\nAD:\n----\nCVE-2020-1472: #ZeroLogon\nCVE-2019-1040: NTLM relay bypass\n\nMDM: \n------\nCVE-2020-15505: MobileIron device management\n\nExploiting Public Facing Services:\n---------------- \nCVE-2020-1350: RCE/ DNS Servers #SigRed\nCVE-2018-6789: RCE/ Exim mail transfer\nCVE-2018-4939: RCE/ Adobe's Cold Fusion\n\nWorkstation Local Privilege Escalation:\n-------------------------\nCVE-2020-0601: ECC spoofing #CurveBall\nCVE-2019-0803: Win32k Elevation of Privilege\n\nInternal Applications:\n--------------------\nCVE-2020-0688: RCE/MS Exchange\nCVE-2020-2555: RCE/Oracle Weblogic\nCVE-2019-11580: RCE/Atlassian Crowd\nCVE-2019-18935: RCE/ASP.Net\nCVE-2015-4852: RCE/Apache\nCVE-2019-3396: Unauthorized Access/Confluence\nCVE-2020-10189: RCE/Desktop Central", "creation_timestamp": "2020-11-06T22:00:17.000000Z"}, {"uuid": "fe357dd8-5149-4adb-98d4-1917b849e05b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/mis_team/169", "content": "\u0416\u0430\u0440\u043a\u0438\u0435 \u043b\u0435\u0442\u043d\u0438\u0435 \u0442\u0432\u043e\u0438\u2026 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u041b\u0435\u0442\u043e 2020 \u0433\u043e\u0434\u0430 \u0431\u043e\u0433\u0430\u0442\u043e \u043d\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u044e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (\u0432\u0438\u0434\u0438\u043c\u043e \u043f\u0440\u0438\u0431\u043b\u0438\u0436\u0430\u0435\u0442\u0441\u044f \u043f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432 \u043c\u0438\u0440\u0435 \u0418\u0411). \u041f\u0435\u043d\u0442\u0435\u0441\u0442\u0435\u0440, \u0430 \u0442\u0435\u043c \u0431\u043e\u043b\u0435\u0435 RedTeam \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442, \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0442\u0430\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435 \u0437\u0430\u043a\u0430\u0437\u0447\u0438\u043a\u0430, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u0420\u043e\u0421 \u043d\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d. \u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e, \u043d\u0435 \u0432\u0441\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e, \u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0442\u0430\u043a\u043e\u0433\u043e \u0440\u043e\u0434\u0430 \u0434\u0435\u043b\u0430\u0435\u0442 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0431\u0435\u0437\u0437\u0430\u0449\u0438\u0442\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u0434 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c. \u0414\u0435\u043b\u0438\u043c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u043e\u0431\u0437\u043e\u0440\u043e\u043c \u0433\u043e\u0440\u044f\u0447\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0442\u044c \u0438\u0445 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c.\n\n\u041f\u0430\u0442\u0447\u0438 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u043d\u0430 \u0432\u0441\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435, \u0447\u0442\u043e \u043e\u043d\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b (\u0438\u043b\u0438 \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b)!\n\n1. F5 BIG-IP\n\nTMUI RCE vulnerability CVE-2020-5902\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u043c \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0440\u0430\u0444\u0438\u043a\u043e\u043c (Traffic Management User Interface) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0444\u0430\u0439\u043b\u044b, \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u0438 (\u0438\u043b\u0438) \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 Java \u043a\u043e\u0434 \n\nCVSSv2: 10\nCVSSv3: 9.8\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: https://support.f5.com/csp/article/K52145254\n\n\u0420\u043e\u0421: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_bigip_tmui_rce.rb\n\n2. Citrix\n\n5 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0440\u0430\u0437\u043d\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445: https://support.citrix.com/article/CTX276688\n\nPoC: \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u043d\u0435\u0442, \u043d\u043e \u0435\u0441\u0442\u044c \u0445\u043e\u0440\u043e\u0448\u0435\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439: https://blog.unauthorizedaccess.nl/2020/07/07/adventures-in-citrix-security-research.html\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 - CVE-2020-8193\n\n\u041e\u0431\u0445\u043e\u0434 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP\n\nCVSSv2: 5\nCVSSv3: 6.5\n\nPoC: https://github.com/jas502n/CVE-2020-8193 (\u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d)\n\n3. Palo Alto\n\nPAN-OS: Authentication Bypass in SAML Authentication\n\n\u0412 PAN-OS \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043f\u043e\u0434\u043f\u0438\u0441\u0435\u0439 \u0432 SAML \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0432 \u0441\u0435\u0442\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\n\nCVSSv2: 9.8\nCVSSv3: 10\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: https://security.paloaltonetworks.com/CVE-2020-2021\n\nPoC: \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435 \u043d\u0435\u0442\n\n4. Windows DNS Server\n\nCVE-2020-1350\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u043e \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0433\u043e\u0432\u043e\u0440\u044f\u0442 \u0432\u0441\u0435!\n\n\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043d\u0430 DNS \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438\n\nCVSSv2: 10\nCVSSv3: 10\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350\n\nPoC: \u0411\u0443\u0434\u044c\u0442\u0435 \u0430\u043a\u043a\u0443\u0440\u0430\u0442\u043d\u044b \u0441 \u0444\u0435\u0439\u043a\u043e\u0432\u044b\u043c\u0438 PoC!\nhttps://github.com/ZephrFish/CVE-2020-1350 - \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u043c\u044b\u0439 PoC \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0444\u0435\u0439\u043a\u043e\u0432\u044b\u043c\n\n5. Bitrix\n\nBitrix SSRF CVE-2020-13484\n\n\u0412\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Bitrix \u0434\u043e 20.0.975 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0443 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043a \u0432\u043d\u0435\u0448\u043d\u0438\u043c IP-\u0430\u0434\u0440\u0435\u0441\u0430\u043c + \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0438 \u0433\u0435\u043d\u0435\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435\n\nCVSSv2: 7.5\nCVSSv3: 9.8\n\nPoC: https://gist.github.com/mariuszpoplwski/f261a4bc06adde5c78760559db9d63bd", "creation_timestamp": "2020-07-16T10:00:46.000000Z"}, {"uuid": "7ce6a7ae-4e76-40cc-a992-c1b1a4c5d209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/770", "content": "\u041f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0439\u0442\u0435 \u043f\u0440\u0438\u0432\u0435\u0442 17-\u0442\u0438 \u043b\u0435\u0442\u043d\u0435\u043c\u0443 \u0431\u0430\u0433\u0443 \u0432 Windows DNS.\nSIGRed CVE-2020-1350, CVSS: 10,0\n\nhttps://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/\n\nhttps://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server/", "creation_timestamp": "2020-07-15T15:29:50.000000Z"}, {"uuid": "3e12d766-f163-4315-9600-d1add28b8552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/ctinow/23502", "content": "https://ift.tt/38UJxpW\n@CheckPointSW disclosed a critical security vulnerability in Microsoft DNS Servers. Microsoft defined the vulnerability as warmable RCE with CVSS 10.0 and has issued a security update for CVE-2020-1350. INCD advise you to update your DNS Server immediately! #DNS #PatchTuesday\n\n*Israel_Cyber*", "creation_timestamp": "2020-07-14T20:14:26.000000Z"}, {"uuid": "f89083a8-666d-4661-8a13-0e40b8bd86b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/Ninjutsu_os/343", "content": "WINDOWS 10 PRO 2004 [19041] X64\nVersion: 2004\nBuild: 19041.450\nEdition: Pro\nArch: x64\nLang: en-US\n\n---------------------------------------------------------\nChangelog / Updates:\n\n\u2705 26/08/2020\n\nFeatures:\n\u2705 Windows 10 Pre-Installed Penetration Testing, Red Teaming.\n\u2705 More than 800 penetration testing tools.\n\u2705 Customize Windows 10 with powerful tweak and optimize to Protect your privacy.\n\u2705 Unwanted Windows components removal.\n\u2705 Disable many of the annoying features built into windows.\n\u2705 Remove/Disable many Windows programs and services.\n\u2705 Prefills the commandline.\n\u2705 Windows Terminal Powerline in PowerShell  \n\u2705 .NET Framework (4.0/4.5/4.6/4.7/4.8/2.x/3.x)\n\u2705 Optimized WINDOWS\n\u2705 Performs privacy &amp; security check of Windows 10\n\n\n\nRemove/Disables component:\n\u2705 Greenshot Apps\n\u2705 Vega Web Scanner\n\u2705 yogadns\n\u2705 Microsoft Edge Browser\n\u2705 Docker\n\u2705 Nox Android Emulator\n\u2705 COMODO Firewall\n\u2705 Winja\n\u2705 MarkdownEdit\n\u2705 Windows Apps and System Apps\n\u2705 Windows Security / Defender  / Smartscreen\n\u2705 OneDrive\n\u2705 Disable UAC (Never notify)\n\u2705 Internet Explorer 11\n\u2705 Media Features\n\u2705 Windows powershell v2\n\n\n### Updated Tools :\n\n# Antivirus Evasion Tools\n\u2705 Macro Pack-Automatize Obfuscation &amp; Generation of MS Office\n\n# Exploitation Tools\n\u2705 Goby Attack surface mapping\n\u2705 Metasploit\n\n# Information Gathering\n\u2705 subfinder\n\u2705 Sublist3r\n\u2705 FinalRecon\n\u2705 findomain\n\u2705 amass\n\u2705 gitleaks\n\u2705 EyeWitness\n\u2705 Maltego\n\n# Malware Analysis\n\u2705 Detect It Easy\n\u2705 dnSpy\n\u2705 loki\n\u2705 Process Explorer\n\n# Mobile Security Tools\n\u2705 Mobile-Security-Framework-MobSF\n\n# Proxy and Privacy Tools\n\u2705 Tor Browser\n\u2705 SimpleDNSCrypt\n\u2705 WPD\n\u2705 O&amp;O ShutUp10\n\u2705 W10Privacy\n\n# Reverse Engineering\n\u2705 x64dbg\n\u2705 dnSpy\n\n# Web Application Attack\n\u2705 WPScan-WordPress Vulnerability Scanner\n\u2705 BuprSuite \n\u2705 testssl.sh\n\u2705 commix\n\u2705 droopescan\n\u2705 sqlmap\n\u2705 nuclei\n\u2705 sslscan\n\u2705 gowitness\n\n# Wireless Attacks\n\u2705 bettercap\n\n# Utility Tools\n\u2705 chrome\n\u2705 Firefox\n\u2705 Brave\n\u2705 Sharex\n\n\n## Added Tools :\n\n# Command &amp; Control\n\u2705 LocalXpose\n\u2705 One-Lin3r\n\u2705 UPnP PortMapper\n\n# Exploitation Tools\n\u2705 HiveJack  dump Windows credentials\n\n# Information Gathering\n\u2705 IP List Generator 2 (x64)\n\n# Malware Analysis\n\u2705 AnVir Task Manager\n\u2705 Dependency Walker\n\u2705 HijackThis\n\u2705 YARA\n\n# Mobile Security Tools\n\n# Networking Attack\n\u2705 superscan\n\u2705 sipp\n\u2705 sippts\n\u2705 SIPP -VOIP Test\n\u2705 SIPVicious suite\n\u2705 sipscan\n\u2705 nbrute\n\u2705 winbox\n\u2705 SNMPCheck SNMP enumerator\n\u2705 SIP Scanner\n\u2705 OWASP-Nettacker\n\n# Password Attacks\n\u2705 ncrack\n\n# Proxy and Privacy Tools\n\u2705 privatezilla\n\u2705 Clear All Event Logs\n\u2705 BleachBit\n\u2705 TMAC (MAC Address Changer)\n\u2705 SoftEther VPN Client Manager (Free VPN)\n\u2705 tor bundle (terminal #tor)\n\n# Reverse Engineering\n\u2705 Cutter\n\n# Vulnerability Analysis\n\n# Web Application Attack\n\u2705 WS-Attacker-1.8\n\u2705 wsdigger\n\u2705 weblogicScanner\n\u2705 CMSMap CMS vulnerability scanner\n\u2705 All-in-One OS command injection\n\u2705 WSDigger -Web Services\n\n\n# Wireless Attacks\n\u2705 CommViewforWiFi\n\n# Wordlists\n\u2705 Cheatsheet-God\n\u2705 penetration-testing-cheat-sheet\n\u2705 PentesterSpecialDict\n\n# Utility Tools\n\u2705 TCPOptimizer\n\u2705 Markdown Monster\n\u2705 ccenhancer\n\u2705 Driver Easy\n\u2705 IrfanView\n\u2705 TreeSizeFree\n\n\n# Nmpa NSE :\n\n\u2705 CVE-2020-0796_new\n\u2705 smb2-capabilities_patched\n\u2705 cve-2020-1350\n\u2705 cve-2020-0796\n\u2705 http-vuln-cve2020-3452\n\u2705 http-vuln-cve2020-5902\n\u2705 http-raw-headers\n\u2705 http-vuln-cve2017-18195\n\u2705 dlink-cve-2019-13101\n\u2705 cisco-cve-2019-1937\n\u2705 abb-cve-2019-7226\n\u2705 cve_2019_1653\n\u2705 CVE-2019-19781\n\u2705 http-vuln-CVE-2019-16759\n\u2705 weblogic-CNVD-C-2019-48814\n\u2705 smb-vuln-cve-2020-0796\n\n\n### Privacy Tweaks ###\n\u2705 Block pop-ups and annoying ads on websites (Hosts)\n\u2705 Disable Inventory  Collector\n\u2705 Disable Get Even more out of windows\n\u2705 Disable app access to notificaton , account info ,email ..etc \n\u2705 Disable Telemetry\n\u2705 Disable WiFi Sense\n\u2705 Disable SmartScreen\n\u2705 Disable WebSearch\n\u2705 Disable App Suggestions\n\u2705 Disable Activity History\n\u2705 Disable Background Apps\n\u2705 Disable Sensors\n\u2705 Disable Location\n\u2705 Disable MapUpdates\n\u2705 Disable Feedback\n\u2705 Disable Tailored Experiences\n\u2705 Disable Advertising ID\n\u2705 Disable WebLangList\n\u2705 Disable Cortana\n\u2705 Disable Error Reporting\n\u2705 Disable SetP2P", "creation_timestamp": "2020-08-27T17:04:45.000000Z"}, {"uuid": "e84c81e4-89bc-474b-a415-8e4842dc42b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "Telegram/O6E1EoFDWemnmTfC2OGOEOM43mQJjWsAVM2wzYrhR63iXLHf", "content": "", "creation_timestamp": "2020-12-22T17:16:26.000000Z"}, {"uuid": "f8132bfe-ff2e-4459-9746-ade45cea029e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/dxk9U9pJSyDeDXdb6VtSRMMd7-15JKhb_on0cIZ4eTYd6WY", "content": "", "creation_timestamp": "2023-06-14T20:12:58.000000Z"}, {"uuid": "bfad9226-2fe2-4f74-9674-91410ce3b401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/Ninjutsu_os/6563", "content": "WINDOWS 10 PRO 2004 [19041] X64\nVersion: 2004\nBuild: 19041.450\nEdition: Pro\nArch: x64\nLang: en-US\n\n---------------------------------------------------------\nChangelog / Updates:\n\n\u2705 26/08/2020\n\nFeatures:\n\u2705 Windows 10 Pre-Installed Penetration Testing, Red Teaming.\n\u2705 More than 800 penetration testing tools.\n\u2705 Customize Windows 10 with powerful tweak and optimize to Protect your privacy.\n\u2705 Unwanted Windows components removal.\n\u2705 Disable many of the annoying features built into windows.\n\u2705 Remove/Disable many Windows programs and services.\n\u2705 Prefills the commandline.\n\u2705 Windows Terminal Powerline in PowerShell  \n\u2705 .NET Framework (4.0/4.5/4.6/4.7/4.8/2.x/3.x)\n\u2705 Optimized WINDOWS\n\u2705 Performs privacy &amp; security check of Windows 10\n\n\n\nRemove/Disables component:\n\u2705 Greenshot Apps\n\u2705 Vega Web Scanner\n\u2705 yogadns\n\u2705 Microsoft Edge Browser\n\u2705 Docker\n\u2705 Nox Android Emulator\n\u2705 COMODO Firewall\n\u2705 Winja\n\u2705 MarkdownEdit\n\u2705 Windows Apps and System Apps\n\u2705 Windows Security / Defender  / Smartscreen\n\u2705 OneDrive\n\u2705 Disable UAC (Never notify)\n\u2705 Internet Explorer 11\n\u2705 Media Features\n\u2705 Windows powershell v2\n\n\n### Updated Tools :\n\n# Antivirus Evasion Tools\n\u2705 Macro Pack-Automatize Obfuscation &amp; Generation of MS Office\n\n# Exploitation Tools\n\u2705 Goby Attack surface mapping\n\u2705 Metasploit\n\n# Information Gathering\n\u2705 subfinder\n\u2705 Sublist3r\n\u2705 FinalRecon\n\u2705 findomain\n\u2705 amass\n\u2705 gitleaks\n\u2705 EyeWitness\n\u2705 Maltego\n\n# Malware Analysis\n\u2705 Detect It Easy\n\u2705 dnSpy\n\u2705 loki\n\u2705 Process Explorer\n\n# Mobile Security Tools\n\u2705 Mobile-Security-Framework-MobSF\n\n# Proxy and Privacy Tools\n\u2705 Tor Browser\n\u2705 SimpleDNSCrypt\n\u2705 WPD\n\u2705 O&amp;O ShutUp10\n\u2705 W10Privacy\n\n# Reverse Engineering\n\u2705 x64dbg\n\u2705 dnSpy\n\n# Web Application Attack\n\u2705 WPScan-WordPress Vulnerability Scanner\n\u2705 BuprSuite \n\u2705 testssl.sh\n\u2705 commix\n\u2705 droopescan\n\u2705 sqlmap\n\u2705 nuclei\n\u2705 sslscan\n\u2705 gowitness\n\n# Wireless Attacks\n\u2705 bettercap\n\n# Utility Tools\n\u2705 chrome\n\u2705 Firefox\n\u2705 Brave\n\u2705 Sharex\n\n\n## Added Tools :\n\n# Command &amp; Control\n\u2705 LocalXpose\n\u2705 One-Lin3r\n\u2705 UPnP PortMapper\n\n# Exploitation Tools\n\u2705 HiveJack  dump Windows credentials\n\n# Information Gathering\n\u2705 IP List Generator 2 (x64)\n\n# Malware Analysis\n\u2705 AnVir Task Manager\n\u2705 Dependency Walker\n\u2705 HijackThis\n\u2705 YARA\n\n# Mobile Security Tools\n\n# Networking Attack\n\u2705 superscan\n\u2705 sipp\n\u2705 sippts\n\u2705 SIPP -VOIP Test\n\u2705 SIPVicious suite\n\u2705 sipscan\n\u2705 nbrute\n\u2705 winbox\n\u2705 SNMPCheck SNMP enumerator\n\u2705 SIP Scanner\n\u2705 OWASP-Nettacker\n\n# Password Attacks\n\u2705 ncrack\n\n# Proxy and Privacy Tools\n\u2705 privatezilla\n\u2705 Clear All Event Logs\n\u2705 BleachBit\n\u2705 TMAC (MAC Address Changer)\n\u2705 SoftEther VPN Client Manager (Free VPN)\n\u2705 tor bundle (terminal #tor)\n\n# Reverse Engineering\n\u2705 Cutter\n\n# Vulnerability Analysis\n\n# Web Application Attack\n\u2705 WS-Attacker-1.8\n\u2705 wsdigger\n\u2705 weblogicScanner\n\u2705 CMSMap CMS vulnerability scanner\n\u2705 All-in-One OS command injection\n\u2705 WSDigger -Web Services\n\n\n# Wireless Attacks\n\u2705 CommViewforWiFi\n\n# Wordlists\n\u2705 Cheatsheet-God\n\u2705 penetration-testing-cheat-sheet\n\u2705 PentesterSpecialDict\n\n# Utility Tools\n\u2705 TCPOptimizer\n\u2705 Markdown Monster\n\u2705 ccenhancer\n\u2705 Driver Easy\n\u2705 IrfanView\n\u2705 TreeSizeFree\n\n\n# Nmpa NSE :\n\n\u2705 CVE-2020-0796_new\n\u2705 smb2-capabilities_patched\n\u2705 cve-2020-1350\n\u2705 cve-2020-0796\n\u2705 http-vuln-cve2020-3452\n\u2705 http-vuln-cve2020-5902\n\u2705 http-raw-headers\n\u2705 http-vuln-cve2017-18195\n\u2705 dlink-cve-2019-13101\n\u2705 cisco-cve-2019-1937\n\u2705 abb-cve-2019-7226\n\u2705 cve_2019_1653\n\u2705 CVE-2019-19781\n\u2705 http-vuln-CVE-2019-16759\n\u2705 weblogic-CNVD-C-2019-48814\n\u2705 smb-vuln-cve-2020-0796\n\n\n### Privacy Tweaks ###\n\u2705 Block pop-ups and annoying ads on websites (Hosts)\n\u2705 Disable Inventory  Collector\n\u2705 Disable Get Even more out of windows\n\u2705 Disable app access to notificaton , account info ,email ..etc \n\u2705 Disable Telemetry\n\u2705 Disable WiFi Sense\n\u2705 Disable SmartScreen\n\u2705 Disable WebSearch\n\u2705 Disable App Suggestions\n\u2705 Disable Activity History\n\u2705 Disable Background Apps\n\u2705 Disable Sensors\n\u2705 Disable Location\n\u2705 Disable MapUpdates\n\u2705 Disable Feedback\n\u2705 Disable Tailored Experiences\n\u2705 Disable Advertising ID\n\u2705 Disable WebLangList\n\u2705 Disable Cortana\n\u2705 Disable Error Reporting\n\u2705 Disable SetP2P", "creation_timestamp": "2020-08-27T17:04:45.000000Z"}, {"uuid": "e0b19548-d1cd-46ca-8114-0070a04b7c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/X_gZgMn5wuo9TBNoO2qxhjcXOJvM-MMEG3bvckmjf15XFw", "content": "", "creation_timestamp": "2023-11-22T10:47:31.000000Z"}, {"uuid": "0e91348b-3198-465c-85ec-096b45d21de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/1PF_WcWugly-2zqDiyOgAS5lM2N1l4eLQQK4ItTbQRn7O221", "content": "", "creation_timestamp": "2024-11-04T20:50:20.000000Z"}, {"uuid": "26a71c1c-e212-4074-ba30-ca373e69a0e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/kz2hWFMgUsDLhsktrbqHX5s1uwQGPO-Qnun35BZPa_2E2g", "content": "", "creation_timestamp": "2021-09-29T16:24:36.000000Z"}, {"uuid": "7153660b-0823-472a-b3cf-62f92512eba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/arpsyndicate/188", "content": "#ExploitObserverAlert\n\nCVE-2020-1350\n\nDESCRIPTION: Exploit Observer has 111 entries related to CVE-2020-1350. A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.\n\nFIRST-EPSS: 0.942410000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-11-17T03:23:23.000000Z"}, {"uuid": "9298c13b-8b77-4b28-aff8-aea30eb34dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/eeaPMzYQ1jcVIiDIQVQZ2DX6gu2klVxmMmrDU9HNMdAotg", "content": "", "creation_timestamp": "2020-07-16T19:06:44.000000Z"}, {"uuid": "a7d16812-b92b-4234-b941-18c30c18392f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "Telegram/FqbC5YNdIoPafh11sh-m10jbY1ifaCCcyyaxLywZtrXJjw", "content": "", "creation_timestamp": "2020-07-16T04:28:55.000000Z"}, {"uuid": "6bcbd476-3add-4646-ae94-5f0ba3d2e63e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/UagRGXjSo-EpKno4a7bn-8LmRTRIiz6tO0Nzwfti8u7poQ", "content": "", "creation_timestamp": "2020-10-11T04:57:56.000000Z"}, {"uuid": "5269a638-fd62-4d32-a462-745a1df4ba6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "Telegram/i4pf0r6xQwo2k0utDeP3vVAZJByvY1jhJx0g6SOqq8nivw", "content": "", "creation_timestamp": "2020-11-03T14:43:24.000000Z"}, {"uuid": "d9cb894e-fe23-486d-8846-adce684d6beb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/SecLabNews/8085", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Check Point \u0421\u0430\u0433\u0438 \u0422\u0446\u0430\u0434\u0438\u043a (Sagi Tzadik) \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e, \u043a\u0440\u0430\u0439\u043d\u0435 \u043e\u043f\u0430\u0441\u043d\u0443\u044e \u0447\u0435\u0440\u0432\u0435\u043e\u0431\u0440\u0430\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Windows Server 2003-2019. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-1350), \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 SigRed, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0434\u043e\u043c\u0435\u043d\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438 \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 IT-\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438. \u041f\u043e \u0448\u043a\u0430\u043b\u0435 \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u043d\u0438\u044f \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 CVSS \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 10 \u0431\u0430\u043b\u043b\u043e\u0432 \u0438\u0437 10.    \n\u0412 Windows Server \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043a\u0440\u0430\u0439\u043d\u0435 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c 17-\u043b\u0435\u0442\u043d\u0435\u0439 \u0434\u0430\u0432\u043d\u043e\u0441\u0442\u0438", "creation_timestamp": "2020-08-14T20:14:17.000000Z"}, {"uuid": "393dc98a-191c-4534-b019-6122230f4706", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/true_secator/770", "content": "\u200b\u200b\u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0446\u044b \u043a\u0440\u0430\u0439\u043d\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e \u043e\u0442\u043d\u0435\u0441\u043b\u0438\u0441\u044c \u043a \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0443\u0433\u0440\u043e\u0437\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043d\u0430 \u0434\u043d\u044f\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2020-1350 aka SIGRed \u0432 Microsoft Windows Server.\n\n\u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0435 \u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b (CISA) \u043e\u0431\u0440\u0430\u0442\u0438\u043b\u043e\u0441\u044c \u043a\u043e \u0432\u0441\u0435\u043c \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u043c \u043e\u0440\u0433\u0430\u043d\u0430\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0432\u043b\u0430\u0441\u0442\u0438 \u0438 \u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f\u043c \u0421\u0428\u0410  \u0441 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c (!) \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 24 \u0447\u0430\u0441\u043e\u0432 (\u0434\u043e 14:00 EST 17 \u0438\u044e\u043b\u044f) \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u043e \u0432\u0441\u0435\u0445 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445.\n\nCISA \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u0432 \u0441\u0432\u043e\u0435\u043c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0438, \u0447\u0442\u043e \"\u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u043d\u0435\u043f\u0440\u0438\u0435\u043c\u043b\u0435\u043c\u043e \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0440\u0438\u0441\u043a \u0434\u043b\u044f \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0432\u043b\u0430\u0441\u0442\u0438 \u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u044b\u0445 \u0438 \u043d\u0435\u043e\u0442\u043b\u043e\u0436\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439\".\n\n\u0422\u0430\u043a\u0436\u0435 \u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0438 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u0441\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u0441\u0435\u0442\u0435\u0439 \u0441\u0438\u0441\u0442\u0435\u043c \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows Server \u0432 \u0441\u043b\u0443\u0447\u0430\u0435, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u044b \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 7 \u0434\u043d\u0435\u0439. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e CISA \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0441\u0435 \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0438 \u043e\u0440\u0433\u0430\u043d\u0430\u043c \u0432\u043b\u0430\u0441\u0442\u0438 \u0448\u0442\u0430\u0442\u043e\u0432 \u0438 \u043c\u0443\u043d\u0438\u0446\u0438\u043f\u0430\u043b\u0430\u043c\u0438.\n\n\u0427\u0442\u043e\u0431\u044b \u0431\u044b\u043b \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u043d\u044f\u0442\u0435\u043d \u043c\u0430\u0441\u0448\u0442\u0430\u0431 \u043f\u043e\u0434\u043d\u044f\u0442\u043e\u0433\u043e \u043a\u0438\u043f\u0438\u0448\u0430 - \u0412\u0421\u0415 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u044b \u0432\u043b\u0430\u0441\u0442\u0438 \u0421\u0428\u0410, \u0437\u0430 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u041c\u0438\u043d\u043e\u0431\u043e\u0440\u043e\u043d\u044b \u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431, \u043e\u0431\u044f\u0437\u0430\u043d\u044b \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f CISA.\n\n\u041d\u0443 \u0430 \u0447\u0442\u043e \u0436\u0435 \u043d\u0430\u0448\u0438 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f? \u0410, \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430, \u043d\u0438\u0447\u0435\u0433\u043e. \u041d\u0430 \u0433\u043b\u0430\u0434\u043a\u043e\u0439 \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u0438 \u0431\u043e\u043b\u043e\u0442\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0433\u043e \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u043d\u0444\u043e\u0441\u0435\u043a\u0430 \u043d\u0435 \u0432\u0441\u043a\u043e\u043b\u044b\u0445\u043d\u0443\u043b\u0430\u0441\u044c \u043d\u0438 \u043e\u0434\u043d\u0430 \u043a\u043e\u0447\u043a\u0430. \u041a\u043e\u043d\u0435\u0446 \u043d\u0435\u0434\u0435\u043b\u0438 \u0436\u0435, \u043a\u0430\u043a\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0432\u044b \u043e \u0447\u0435\u043c...", "creation_timestamp": "2020-07-17T11:43:00.000000Z"}, {"uuid": "e04f7cf3-232b-4642-89d1-0252fe82066d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/true_secator/761", "content": "\u200b\u200b\u0412\u0447\u0435\u0440\u0430 \u0443\u0436\u0435 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432 \u043d\u043e\u0447\u0438 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u044e\u043b\u044c\u0441\u043a\u0438\u0439 Security Update, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c, \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u0440\u043e\u0447\u0435\u0433\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-1350 \u0432 Windows Server, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430\u044f \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 17 (!) \u043b\u0435\u0442.\n\nCVE-2020-1350 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0432\u0435\u043d\u0434\u043e\u0440\u0430 CheckPoint \u0432 \u0430\u043f\u0440\u0435\u043b\u0435, \u0432 \u043c\u0430\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u0431\u044b\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u043d\u044b \u0432 Microsoft, \u0430 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u0438\u044e\u043b\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043f\u0440\u0438\u0437\u043d\u0430\u043b\u0438, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0432 10 \u0438\u0437 10 \u0441 \u0442\u043e\u0447\u043a\u0438 \u0437\u0440\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u043a\u0440\u044b\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0431\u043e\u043b\u044c\u0448\u0438\u0445 DNS-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044e \u0445\u0430\u043a\u0435\u0440 \u043c\u043e\u0433 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0432\u0437\u044f\u0442\u044c \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u043f\u043e\u0434 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c.\n\n\u041a\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0431\u044b\u0432\u0430\u0435\u0442 \u0432 \u0442\u0430\u043a\u0438\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438 Microsoft \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u044b\u0445 \u043e\u0431 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 CVE-2020-1350 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u043d\u0435\u0442, \u043d\u043e \u0432\u0435\u0441\u044c\u043c\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0447\u0442\u043e \u0437\u0430 17 \u043b\u0435\u0442 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0435\u0435 \u043a\u0442\u043e-\u043d\u0438\u0431\u0443\u0434\u044c \u043d\u0430\u0448\u0435\u043b \u0438 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f.\n\n\u041a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430, \u0432\u0441\u0435\u0445, \u043a\u043e\u0433\u043e \u044d\u0442\u043e\u0442 \u0432\u043e\u043f\u0440\u043e\u0441 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f, \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u043c \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u0442\u0441\u044f.", "creation_timestamp": "2020-07-15T09:59:59.000000Z"}, {"uuid": "66745270-48a3-495c-9c41-abdb9a6775d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "Telegram/0sD_EyHySREvSWLaWKL-XHqTqDduPkHhIy1vEKF4pCPQbv8", "content": "", "creation_timestamp": "2020-10-28T02:58:38.000000Z"}, {"uuid": "3ac8769f-4adb-430e-8a9c-731ebe63d790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13509", "type": "seen", "source": "https://t.me/cibsecurity/21028", "content": "\u203c CVE-2020-13509 \u203c\n\nAn information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) Using the IRP 0x9c4060cc gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability and this access could allow for information leakage of sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:07.000000Z"}, {"uuid": "f2ebd9a9-8c56-4ec6-a989-28e573a2956c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://t.me/thehackernews/761", "content": "WARNING \ud83d\udd25 CVE-2020-1350 (CVSS 10)\n \nA critical 17-year-old 'wormable' RCE vulnerability affects Windows DNS Servers (2013 to 2019 editions) that could let unauthenticated hackers gain 'Domain Admin' privileges on the targeted servers.\n \nResearchers confirm the new Windows vulnerability, dubbed 'SigRed,' is a wormable bug, allowing attackers to launch #malware attacks that can spread from one vulnerable computer to another without any human interaction.\n \nDetails \u2014 https://thehackernews.com/2020/07/windows-dns-server-hacking.html", "creation_timestamp": "2020-07-14T19:20:01.000000Z"}, {"uuid": "2cd13927-de19-4d41-b150-7902369e72c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://t.me/canyoupwnme/6716", "content": "Anatomy of an Exploit: RCE with CVE-2020-1350 SIGRed\nhttps://www.graplsecurity.com/post/anatomy-of-an-exploit-rce-with-cve-2020-1350-sigred", "creation_timestamp": "2021-03-05T13:51:16.000000Z"}, {"uuid": "fec451eb-d264-40ed-8176-8c690016b5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6636", "content": "Exploiting SIGRed (CVE-2020\u20131350) on Windows Server 2012/2016/2019\nhttps://medium.com/@datafarm.cybersecurity/exploiting-sigred-cve-2020-1350-on-windows-server-2012-2016-2019-80dd88594228", "creation_timestamp": "2020-09-29T09:52:59.000000Z"}, {"uuid": "b5eaa29a-5a8d-4c3e-971b-b3a9c623cbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/canyoupwnme/6522", "content": "CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350", "creation_timestamp": "2020-07-14T20:37:16.000000Z"}, {"uuid": "c9243900-a109-4e55-9167-e1555a088ce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://t.me/information_security_channel/39204", "content": "Microsoft patched a critical 17-Year-old vulnerability with Windows DNS Server that can be triggered by an attacker with malicious DNS response. The Windows DNS Server is an essential part of the Windows Domain environment and runs the DNS queries on Windows Server. The vulnerability dubbed SIGRed (CVE-2020-1350) is wormable and it receives a CVSS base [\u2026]\nThe post Microsoft Patches Critical Wormable 17-Year-old Windows DNS Server Flaw that Affects Windows Server Versions 2003 to 2019 (https://gbhackers.com/windows-dns-server/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-07-15T06:52:34.000000Z"}, {"uuid": "6dd2cd01-6657-4ff7-84da-915fb05ddd61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/SecLabNews/8118", "content": "\u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u043e \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (DHS CISA) \u0421\u0428\u0410 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u043e \u0447\u0440\u0435\u0437\u0432\u044b\u0447\u0430\u0439\u043d\u0443\u044e \u0434\u0438\u0440\u0435\u043a\u0442\u0438\u0432\u0443 (ED 20-03), \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0432\u0441\u0435\u043c \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f\u043c \u043f\u0440\u0435\u0434\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043c\u0435\u0440\u044b \u043f\u043e \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 SIGRed (CVE-2020-1350) \u0432 Windows Server \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 24 \u0447\u0430\u0441\u043e\u0432.    \nCISA \u043f\u0440\u0438\u0437\u0432\u0430\u043b\u043e \u0433\u043e\u0441\u043e\u0440\u0433\u0430\u043d\u044b \u0441\u0440\u043e\u0447\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 SIGRed", "creation_timestamp": "2024-08-06T16:58:13.000000Z"}, {"uuid": "f475bd00-bfca-4997-af25-bb1c88010db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/SecLabNews/8121", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u043b\u0430\u043d\u043e\u0432\u044b\u0445 \u0438\u044e\u043b\u044c\u0441\u043a\u0438\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 123 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 13 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SigRed (CVE-2020-1350). SigRed \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 DNS-\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 Windows Server, \u0430 \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 IT-\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0438\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u043f\u043e \u0432\u0441\u0435\u0439 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0441\u0435\u0442\u0438. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 10 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows Server.    \n\u041e\u0431\u0437\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e: 17 \u0438\u044e\u043b\u044f 2020 \u0433\u043e\u0434\u0430", "creation_timestamp": "2020-09-03T19:11:47.000000Z"}, {"uuid": "43b532a4-ab06-4742-b758-3442ce427a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://t.me/arvin_club/2461", "content": "WARNING \ud83d\udd25 CVE-2020-1350 (CVSS 10)\n \nA critical 17-year-old 'wormable' RCE vulnerability affects Windows DNS Servers (2013 to 2019 editions) that could let unauthenticated hackers gain 'Domain Admin' privileges on the targeted servers.\n \nResearchers confirm the new Windows vulnerability, dubbed 'SigRed,' is a wormable bug, allowing attackers to launch #malware attacks that can spread from one vulnerable computer to another without any human interaction.\n \nDetails \u2014 https://thehackernews.com/2020/07/windows-dns-server-hacking.html", "creation_timestamp": "2020-07-14T19:20:37.000000Z"}, {"uuid": "32d8e41f-7e4b-4b5f-8aa4-1b88757014d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "Telegram/VUFJVfzpG0HyeiTqhJvAJSGdUBqNJDNxNIIRom_b5gFlng", "content": "", "creation_timestamp": "2020-07-15T11:02:58.000000Z"}, {"uuid": "3fe1e07b-b3f3-4347-9f8d-ba07bbb90f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/1422", "content": "#Threat_Research\nSIGRed (CVE-2020-1350) - Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers\nhttps://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers\nPoC1: https://github.com/ZephrFish/CVE-2020-1350\nPoC2: https://github.com/maxpl0it/CVE-2020-1350-DoS", "creation_timestamp": "2025-03-11T18:47:12.000000Z"}, {"uuid": "26658ddf-3770-4907-b68c-70838b9a0a2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "Telegram/iRvkqHoOzhHb8A4In8iZ-aqs6bpabrL_PPuTDiSqMAE8_jM", "content": "", "creation_timestamp": "2020-12-22T17:16:26.000000Z"}, {"uuid": "b670fcab-3ee4-4b59-bb65-4c657924fc3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13509", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2318", "content": "Multiple vulnerabilities in NZXT computer monitoring software (PoCs)\nCVE-2020-13509 - CVE-2020-13511:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1110\nCVE-2020-13512 - CVE-2020-13514:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1111\nCVE-2020-13515:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1112\nCVE-2020-13516:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1113\nCVE-2020-13517:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1114\nCVE-2020-13518:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1115\nCVE-2020-13519:\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1116", "creation_timestamp": "2025-01-04T20:00:16.000000Z"}, {"uuid": "7468c373-a4d4-4a75-b6bf-84fdcd67dc55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2845", "content": "#Threat_Research\n1. SUNSHUTTLE Second-Stage Backdoor\nhttps://www.fireeye.com/blog/threat-research/2021/03/sunshuttle-second-stage-backdoor-targeting-us-based-entity.html\n2. Anatomy of an Exploit:\nRCE with CVE-2020-1350 SIGRed\nhttps://www.graplsecurity.com/post/anatomy-of-an-exploit-rce-with-cve-2020-1350-sigred", "creation_timestamp": "2022-02-22T05:06:11.000000Z"}, {"uuid": "7bb8cd0b-ea7f-48ab-8cce-94076db14cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2865", "content": "#Analytics\n10 most exploited vulnerabilities of the week (march 2-8)\n\nCVE-2020-1350 - Exploit SIGRed/Windows DNS Server RCE\nCVE-2021-21972 - VMware vCenter RCE (PoC1, PoC2, PoC3)\nCVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065 - ProxyLogon MS Exchange Server RCE\nCVE-2021-21166 - Chrome Audio RCE\nCVE-2021-21978 - VMware View Planner\u00a0RCE\nCVE-2021-21315 - Node.JS OS sanitize service Parameters Command Injection\nCVE-2021-23132 - RCE in Joomla core &lt;=3.9.24", "creation_timestamp": "2024-10-14T07:14:24.000000Z"}, {"uuid": "ac3244fd-fa5d-4d88-915c-361687013228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2358", "content": "#Analytics\nTop-10 exploited vulnerabilities in July-December 2020:\n1. CVE-2020-0601 - CurveBall CryptoAPI\nhttps://t.me/cybersecuritytechnologies/628\n2. CVE-2019-17026/CVE-2020-0674 - 0-Day Vulnerability in Mozilla Firefox\nhttps://t.me/cybersecuritytechnologies/914\n3. CVE-2020-0796 - Windows SMBv3 LPE exploit\nhttps://t.me/cybersecuritytechnologies/874\n4. CVE-2020-1472 - Microsoft Zerologon\nhttps://t.me/cybersecuritytechnologies/1742\n5. CVE-2020-5902/5903 - F5 BigIP TMUI Critical RCE\nhttps://t.me/cybersecuritytechnologies/1378\n6. CVE-2018-10561 - Dasan GPON Router Auth. Bypass\nhttps://t.me/cybersecuritytechnologies/51\n7. CVE-2020-1350 - Exploit SIGRed\nhttps://t.me/cybersecuritytechnologies/1422\n8. CVE-2020-15999 + CVE-2020-17087 = Win Kernel cng.sys buffer overflow 0-Day\nhttps://t.me/cybersecuritytechnologies/1960\nhttps://t.me/cybersecuritytechnologies/2010\n9. CVE-2020-16898 - \"Bad Neighbor\" RCE Vulnerability\nhttps://t.me/cybersecuritytechnologies/1912\n10. CVE-2020-1938 - \"Ghostcat\" Apache Tomcat\nhttps://t.me/cybersecuritytechnologies/705", "creation_timestamp": "2025-01-04T20:00:34.000000Z"}, {"uuid": "e695f9ca-92e3-4fc4-8395-4a8376cbd567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2661", "content": "#Analytics\n10 most exploited vulnerabilities of the week (feb 1-7)\nCVE-2020-1350 - Exploit SIGRed/Windows DNS Server RCE\nhttps://t.me/cybersecuritytechnologies/1422\nCVE-2021-3156 - Heap-Based Buffer Overflow in Sudo\nhttps://t.me/cybersecuritytechnologies/2577\nCVE-2020-7961 - Arbitrary code execution via JSONWS\nhttps://t.me/cybersecuritytechnologies/869\nCVE-2021-25646 - Apache Druid &lt;=0.20.1 RCE\nhttps://t.me/cybersecuritytechnologies/2639\nCVE-2020-27932 - A type confusion in MacOS 10.15.7\nhttps://t.me/cybersecuritytechnologies/2383\nCVE-2019-9041 - ZzzCMS RCE\nhttps://mobile.twitter.com/i/web/status/1357931580098899970\nCVE-2021-22122 - XSS vulnerability in FortiWeb\nhttps://vulmon.com/vulnerabilitydetails?qid=CVE-2021-22122\nCVE-2019-5127 - A cmd injection in YouPHPTube Encoder\nhttps://mobile.twitter.com/i/web/status/1357546718821142528\nCVE-2020-17523 - Apache Shiro pathMatches Auth. Bypass\nhttps://t.me/cybersecuritytechnologies/2650", "creation_timestamp": "2024-05-22T06:15:17.000000Z"}, {"uuid": "3cdadc24-c80f-45dd-89c6-d148bbf65729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "Telegram/DJIZTFUDBfWcSlYCYNuOeybSi9V-hRlys-qYMGLxp-j6ZXA", "content": "", "creation_timestamp": "2020-07-15T03:11:46.000000Z"}, {"uuid": "701d54aa-98a2-413d-9345-cded732d20bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1350", "type": "seen", "source": "Telegram/BWhXwloBxLC_WzvLQBW7d5U0JmnhLOQFRpYBWZKWEo2dMQ", "content": "", "creation_timestamp": "2020-07-19T11:47:21.000000Z"}]}