Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 11 / 12
233 résultats taggé Vulnerability  ✕
On Bypassing eBPF Security Monitoring https://blog.doyensec.com/2022/10/11/ebpf-bypass-security-monitoring.html
13/10/2022 11:05:20
QRCode
archive.org

There are many security solutions available today that rely on the Extended Berkeley Packet Filter (eBPF) features of the Linux kernel to monitor kernel functions. Such a paradigm shift in the latest monitoring technologies is being driven by a variety of reasons

doyensec doyensecurity EN 2022 vulnerability exploit eBPF bypass research
Jamf Threat Labs identifies macOS Archive Utility vulnerability allowing for Gatekeeper bypass (CVE-2022-32910) https://www.jamf.com/blog/jamf-threat-labs-macos-archive-utility-vulnerability/
08/10/2022 22:24:01
QRCode
archive.org
thumbnail

Read how macOS vulnerability in Archive Utility could lead to the execution of an unsigned and unnotarized application without displaying security prompts.

jamf EN 2022 Archive Utility macOS vulnerability CVE-2022-32910 Gatekeeper bypass
CVE-2022-41352 https://attackerkb.com/topics/1DDTvUNFzH/cve-2022-41352/rapid7-analysis
07/10/2022 10:22:03
QRCode
archive.org
thumbnail

On September 25, 2022, CVE-2022-41352 was filed for Zimbra Collaboration Suite. The vulnerability is a remote code execution flaw that arises from unsafe usage…

attackerkb EN 2022 CVE-2022-41352 Zimbra vulnerability
Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
30/09/2022 09:27:43
QRCode
archive.org
thumbnail

Circa the beginning of August 2022, while doing security monitoring & incident response services, GTSC SOC team discovered that a critical infrastructure was being attacked, specifically to their Microsoft Exchange application. During the investigation, GTSC Blue Team experts determined that the attack utilized an unpublished Exchange security vulnerability, i.e., a 0-day vulnerability, thus immediately came up with a temporary containment plan.

gteltsc.vn EN 2022 Microsoft-Exchange Exchange 0-day RCE vulnerability campaign IoCs
Microsoft Issues Out-of-Band Patch for Flaw Allowing Lateral Movement, Ransomware Attacks https://www.securityweek.com/microsoft-issues-out-band-patch-flaw-allowing-lateral-movement-ransomware-attacks
25/09/2022 18:08:50
QRCode
archive.org

Microsoft this week released an out-of-band security update for its Endpoint Configuration Manager solution to patch a vulnerability that could be useful to malicious actors for moving around in a targeted organization’s network.

The vulnerability is tracked as CVE-2022-37972 and it has been described by Microsoft as a medium-severity spoofing issue. The tech giant has credited Brandon Colley of Trimarc Security for reporting the flaw.

Microsoft EN 2022 CVE-2022-37972 Endpoint-Configuration-Manager patch vulnerability
Unpatched 15-year old Python bug allows code execution in 350k projects https://www.bleepingcomputer.com/news/security/unpatched-15-year-old-python-bug-allows-code-execution-in-350k-projects/
25/09/2022 12:01:06
QRCode
archive.org
thumbnail

A vulnerability in the Python programming language that has been overlooked for 15 years is now back in the spotlight as it likely affects more than 350,000 open-source repositories and can lead to code execution.

bleepingcomputer Code-Execution Path-Traversal Python Vulnerability CVE-2007-4559
Tarfile: Exploiting the World With a 15-Year-Old Vulnerability https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html
25/09/2022 12:00:13
QRCode
archive.org
thumbnail

Trellix Advanced Research Center stumbled across a vulnerability in Python’s tarfile module. As we dug into the issue, we realized this was in fact CVE-2007-4559. The vulnerability is a path traversal attack in the extract and extractall functions in the tarfile module that allow an attacker to overwrite arbitrary files by adding the “..” sequence to filenames in a TAR archive. Over the course of our research into the impact of this vulnerability we discovered that hundreds of thousands of repositories were vulnerable to this vulnerability. While the vulnerability was originally only marked as a 6.8, we were able to confirm that in most cases an attacker can gain code execution from the file write.

trellix EN 2022 CVE-2007-4559 tarfile Python vulnerability
PSA: Nearly 5 Million Attacks Blocked Targeting 0-Day in BackupBuddy Plugin https://www.wordfence.com/blog/2022/09/psa-nearly-5-million-attacks-blocked-targeting-0-day-in-backupbuddy-plugin/
09/09/2022 15:28:47
QRCode
archive.org
thumbnail

Late evening, on September 6, 2022, the Wordfence Threat Intelligence team was alerted to the presence of a vulnerability being actively exploited in BackupBuddy, a WordPress plugin we estimate has around 140,000 active installations. This vulnerability makes it possible for unauthenticated users to download arbitrary files from the affected site which can include sensitive information. ...Read More

wordfence EN 2022 Wordpress vulnerability 0-day BackupBuddy plugin
Researchers found one-click exploits in Discord and Teams https://www.malwarebytes.com/blog/news/2022/08/researchers-found-one-click-exploits-in-discord-and-teams
31/08/2022 16:58:02
QRCode
archive.org
thumbnail

A group of security researchers found a series of vulnerabilities in the software underlying popular apps like Discord, Microsoft Teams, Spotify and many others

malwarebytes EN 2022 Electron vulnerability
Realtek SDK Vulnerability Exposes Routers From Many Vendors to Remote Attacks https://www.securityweek.com/realtek-sdk-vulnerability-exposes-routers-many-vendors-remote-attacks
13/08/2022 19:21:14
QRCode
archive.org

A serious vulnerability affecting the eCos SDK made by Taiwanese semiconductor company Realtek could expose the networking devices of many vendors to remote attacks.

securityweek EN 2022 SDK remote attack vulnerability Rrealtek CVE-2022-27255
Zimbra Credential Theft Vulnerability Exploited in Attacks https://www.securityweek.com/zimbra-credential-theft-vulnerability-exploited-attacks
08/08/2022 11:17:14
QRCode
archive.org

CISA has urged organizations to patch a recent Zimbra credential theft vulnerability after reports of exploitation in the wild.

securityweek EN Zimbra vulnerability CVE-2022-27924 credential-theft exploited CISA email
CVE-2022-35650 Analysis https://0x1337.ninja/2022/07/30/cve-2022-35650-analysis/
04/08/2022 10:38:47
QRCode
archive.org

CVE-2022-35650

The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.

Anna 0x1337 CVE-2022-35650 Analysis Moodle vulnerability PHP
[CVE-2022-34918] A crack in the Linux firewall https://www.randorisec.fr/crack-linux-firewall/
21/07/2022 19:12:52
QRCode
archive.org
thumbnail

In our previous article Yet another bug into Netfilter, I presented a vulnerability found within the netfilter subsystem of the Linux kernel. During my investigation, I found a weird comparison that does not fully protect a copy within a buffer. It led to a heap buffer overflow that was exploited to obtain root privileges on Ubuntu 22.04.

randorisec EN 2022 CVE-2022-34918 Linux netfilter Vulnerability analysis
Retbleed – serious vulnerability discovered in microprocessors https://www.ncsc.admin.ch/retbleed-en
12/07/2022 21:32:11
QRCode
archive.org

12.07.2022 - Security researchers from the ETH Zürich have discovered a serious security vulnerability in Intel and AMD microprocessors. The vulnerability, called Retbleed, potentially allows an attacker to access any memory area. Initial countermeasures have already been defined. The NCSC has assigned the internationally valid CVE identifiers for the vulnerability of both manufacturers.

NCSC EN 2022 retbleed Vulnerability CVE-2022-29900 CVE-2022-29901
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection https://blog.sonarsource.com/zimbra-mail-stealing-clear-text-credentials-via-memcache-injection/
15/06/2022 18:18:08
QRCode
archive.org
thumbnail

We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.

sonarsource EN 2022 Zimbra memcache Vulnerability email steal credentials
Vulnerability discovered in Apple M1 chip https://www.theregister.com/2022/06/10/apple_m1_pacman_flaw/
13/06/2022 19:17:10
QRCode
archive.org
thumbnail

MIT CSAIL boffins devise PACMAN attack to let existing exploits avoid pointer authentication

theregister EN 2022 M1 Apple PACMAN attache ARM chip Vulnerability
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
07/06/2022 10:49:00
QRCode
archive.org

On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability.

Guidance CVE-2022-30190 mitigation Workarounds Vulnerability Microsoft EN 2022 Follina
Follina — a Microsoft Office code execution vulnerability https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
30/05/2022 11:33:04
QRCode
archive.org

Two days ago, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus...

doublepulsar EN 2022 Office vulnerability msdt.exe PowerShell Follina
Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121) https://research.nccgroup.com/2022/03/24/remote-code-execution-on-western-digital-pr4100-nas-cve-2022-23121/
24/05/2022 08:22:41
QRCode
archive.org
thumbnail

This blog post describes an unchecked return value vulnerability found and exploited in September 2021 by Alex Plaskett, Cedric Halbronn and Aaron Adams working at the Exploit Development Group (EDG) of NCC Group. We successfully exploited it at Pwn2Own 2021 competition in November 2021 when targeting the Western Digital PR4100.

CVE-2022-23121 nccgroup EN 2022 Netatalk WesternDigital vulnerability AppleDouble
Exploiting an Unbounded memcpy in Parallels Desktop https://blog.ret2.io/2022/05/19/pwn2own-2021-parallels-desktop-exploit/
20/05/2022 11:15:52
QRCode
archive.org
thumbnail

This post details the development of a guest-to-host virtualization escape for Parallels Desktop on macOS, as used in our successful Pwn2Own 2021 entry. Give...

ret2 EN 2022 macOS Parallels Pwn2Own escape exploit VM vulnerability research reverseengineering binary-exploitation program-analysis
page 11 / 12
4379 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio