An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.
- http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2019/Mar/36
- https://www.exploit-db.com/exploits/46634/
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AfvanMoopen/tryhackme-
- https://github.com/Tiaonmmn/ccc_2019_web_pdfcreator
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/catsecorg/CatSec-TryHackMe-WriteUps
- https://github.com/electronforce/py2to3
- https://github.com/jev770/badmoodle-scan
- https://github.com/nhthongDfVn/File-Converter-Exploit
- https://github.com/testermas/tryhackme
- https://github.com/uttambodara/Awesome-Hacking-Learning-Path