Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 4 / 13
257 résultats taggé vulnerability  ✕
A look at the recent rsync vulnerability https://lwn.net/SubscriberLink/1005302/0eac0cf6f7cd7504/
22/01/2025 22:36:48
QRCode
archive.org

On January 14, Nick Tait announced the discovery of six vulnerabilities in rsync, the popular file-synchronization tool. While software vulnerabilities are not uncommon, the most serious one he announced allows for remote code execution on servers that run rsyncd — and possibly other configurations. The bug itself is fairly simple, but this event provides a nice opportunity to dig into it, show why it is so serious, and consider ways the open-source community can prevent such mistakes in the future.

The vulnerabilities were found by two groups of researchers: Simon Scannell, Pedro Gallegos, and Jasiel Spelman from Google's Cloud Vulnerability Research identified five of them, including the most serious one. Aleksei Gorban, a security researcher at TikTok, discovered the sixth — a race condition in how rsync handles symbolic links.

LWN.net EN 2025 rsync vulnerability CVE-2024-12084
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
19/01/2025 10:28:27
QRCode
archive.org
thumbnail

ESET researchers have discovered a vulnerability that allows bypassing UEFI Secure Boot, affecting the majority of UEFI-based systems. This vulnerability, assigned CVE-2024-7344, was found in a UEFI application signed by Microsoft’s Microsoft Corporation UEFI CA 2011 third-party UEFI certificate. Exploitation of this vulnerability leads to the execution of untrusted code during system boot, enabling potential attackers to easily deploy malicious UEFI bootkits (such as Bootkitty or BlackLotus) even on systems with UEFI Secure Boot enabled, regardless of the installed operating system.

welivesecurity EN 2025 CVE-2024-7344 UEFI Secure Boot vulnerability certificate
Microsoft: macOS bug lets hackers install malicious kernel drivers https://www.bleepingcomputer.com/news/security/microsoft-macos-bug-lets-hackers-install-malicious-kernel-drivers/
13/01/2025 19:43:30
QRCode
archive.org
thumbnail

Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.
#Apple #Computer #InfoSec #Integrity #Microsoft #Protection #SIP #Security #System #Vulnerability #macOS

bleepingcomputer EN 2024 CVE-2024-44243 System macOS Apple Security Integrity SIP
Industrial networking manufacturer Moxa reports 'critical' router bugs https://cyberscoop.com/industrial-networking-manufacturer-moxa-reports-critical-router-bugs/
12/01/2025 21:13:47
QRCode
archive.org
thumbnail

Firmware in cellular routers, secure routers and network security appliances made by Moxa are vulnerable to a pair of high severity bugs.

cyberscoop EN 2025 vulnerability Firmware Moxa iot CVE-2024-9138 CVE-2024-9140
SonicWall urges admins to patch exploitable SSLVPN bug immediately https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/
09/01/2025 16:49:41
QRCode
archive.org
thumbnail

SonicWall is emailing customers urging them to upgrade their firewall's SonicOS firmware to patch an authentication bypass vulnerability in SSL VPN and SSH management that is

bleepingcomputer EN 2024 Authentication-Bypass Firewall Security-Advisory SonicWall Vulnerability
DigiEver Fix That IoT Thing! https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing
20/12/2024 09:36:53
QRCode
archive.org
  • A vulnerability in DigiEver DS-2105 Pro DVRs is being exploited to spread malware.

  • The Akamai Security Intelligence Research Team (SIRT) noticed this activity in their honeypots on November 18, 2024.

  • The vulnerability was originally discovered by Ta-Lun Yen and a CVE identifier has been requested by the Akamai SIRT.

  • The malware is a Mirai variant that has been modified to use improved encryption algorithms.

  • We have included a list of indicators of compromise (IoCs) in this blog post to assist in defense against this threat.

akamai EN 2024 mirai DigiEver DS-2105 Pro DVR vulnerability
Citrix Denial of Service: Analysis of CVE-2024-8534 https://www.assetnote.io/resources/research/citrix-denial-of-service-analysis-of-cve-2024-8534
13/12/2024 08:28:16
QRCode
archive.org

An analysis of CVE-2024-8534, a memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway.

assetnote EN 2024 CVE-2024-8534 analysis NetScaler Gateway ADC vulnerability
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/
09/12/2024 18:54:45
QRCode
archive.org
thumbnail
volexity EN VPN analysis FortiClient Vulnerability BrazenBamboo DEEPDATA stealer
zizmor would have caught the Ultralytics workflow vulnerability https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
08/12/2024 15:42:01
QRCode
archive.org
thumbnail

TL;DR: zizmor would have caught the vulnerability that caused this…mostly. Read on for details.

yossarian EN 2024 Supply-Chain-Attack zizmor Ultralytics vulnerability workflow
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster - Rhino Security Labs https://rhinosecuritylabs.com/research/cve-2024-1212unauthenticated-command-injection-in-progress-kemp-loadmaster/
03/12/2024 15:37:41
QRCode
archive.org
thumbnail

CVE-2024-1212 is an unauthenticated command injection found in Progress Kemp LoadMaster load balancer's administrator web interface by Rhino Security Labs.

rhinosecuritylabs EN 2024 vulnerability Progress Kemp LoadMaster unauthenticated command injection
Windows Server 2012 Mark of the Web Vulnerability (0day) - and Free Micropatches for it https://blog.0patch.com/2024/11/windows-server-2012-mark-of-web.html
03/12/2024 09:33:44
QRCode
archive.org
thumbnail

Our researchers discovered a previously unknown vulnerability on Windows Server 2012 and Server 2012 R2 that allows an attacker to bypass a ...

0patch EN 2024 WindowsServer2012 0day Mark-of-the-Web Vulnerability
7-Zip flaw enables code smuggling with manipulated archives https://www.heise.de/en/news/7-Zip-flaw-enables-code-smuggling-with-manipulated-archives-10083922.html
25/11/2024 10:43:37
QRCode
archive.org
thumbnail

Attackers can use manipulated archives to try to inject malicious code into 7-Zip users. An update is available.

heise.de EN 2024 7-Zip vulnerability CVE-2024-11477
Exploit attempts for unpatched Citrix vulnerability https://isc.sans.edu/diary/31446
20/11/2024 22:19:03
QRCode
archive.org
thumbnail

Exploit attempts for unpatched Citrix vulnerability, Author: Johannes Ullrich

sans EN 2024 Exploit unpatched Citrix vulnerability
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack https://www.wired.com/story/synology-zero-click-vulnerability/
01/11/2024 16:06:26
QRCode
archive.org
thumbnail

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse.

wired EN 2024 Synology photos vulnerabilities RCE Pwn2Own critical vulnerability
Attacker Abuses Victim Resources to Reap Rewards from Titan Network https://www.trendmicro.com/en_us/research/24/j/titan-network.html
30/10/2024 14:37:36
QRCode
archive.org
thumbnail
  • Trend Micro researchers observed an attacker exploiting the Atlassian Confluence vulnerability CVE-2023-22527 to achieve remote code execution for cryptomining via the Titan Network.
  • The malicious actor used public IP lookup services and various system commands to gather details about the compromised machine.
  • The attack involved downloading and executing multiple shell scripts to install Titan binaries and connect to the Titan Network with the attacker’s identity.
  • The malicious actor connects compromised machines to the Cassini Testnet, which allows them to participate in the delegated proof of stake system for reward tokens.
trendmicro EN 2024 Titan Network Confluence exploitation Atlassian Confluence vulnerability CVE-2023-22527
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs https://doublepulsar.com/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773
23/10/2024 09:53:22
QRCode
archive.org

Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do.

doublepulsar EN 2024 FortiJump FortiManager vulnerability 0-day medium
Hackers exploit Roundcube webmail flaw to steal email, credentials https://www.bleepingcomputer.com/news/security/hackers-exploit-roundcube-webmail-flaw-to-steal-email-credentials/
22/10/2024 14:48:04
QRCode
archive.org
thumbnail

Threat actors have been exploiting a vulnerability in the Roundcube Webmail client to target government organizations in the Commonwealth of Independent States (CIS) region, the successor of the former Soviet Union.

bleepingcomputer EN 2024 Actively-Exploited CVE-2024-37383 Cross-Site-Scripting Email Roundcube Vulnerability XSS
Jetpack fixes critical information disclosure flaw existing since 2016 https://www.bleepingcomputer.com/news/security/jetpack-fixes-critical-information-disclosure-flaw-existing-since-2016/
16/10/2024 20:47:05
QRCode
archive.org
thumbnail

WordPress plugin Jetpack released a critical security update earlier today, addressing a vulnerability that allowed a logged-in user to access forms submitted by other visitors to the site.

bleepingcomputer 2024 EN Information Security Vulnerability WordPress Computer InfoSec Plugin Disclosure Jetpack
Critical flaw in NVIDIA Container Toolkit allows full host takeover https://www.bleepingcomputer.com/news/security/critical-flaw-in-nvidia-container-toolkit-allows-full-host-takeover/
01/10/2024 11:16:27
QRCode
archive.org
thumbnail

A critical vulnerability in NVIDIA Container Toolkit impacts all AI applications in a cloud or on-premise environment that rely on it to access GPU resources.

bleepingcomputer EN 2024 AI Artificial-Intelligence Cloud Cloud-Security Container-Escape NVIDIA Vulnerability Security InfoSec Computer-Security
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments | Wiz Blog https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability
29/09/2024 19:11:38
QRCode
archive.org
thumbnail

Critical severity vulnerability CVE-2024-0132 affecting NVIDIA Container Toolkit and GPU Operator presents high risk to AI workloads and environments.

wiz EN 2024 Nvidia CVE-2024-0132 Container AI-workloads Toolkit GPU-Operator vulnerability GPU
page 4 / 13
4888 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn