Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 9 / 12
231 résultats taggé Vulnerability  ✕
Ivanti warns of second vulnerability used in attacks on Norway gov’t https://therecord.media/ivanti-warns-of-second-vulnerability-norway-government-attack
30/07/2023 20:32:11
QRCode
archive.org
thumbnail

A second vulnerability affecting mobile endpoint management software from IT giant Ivanti has been discovered, according to a new advisory from the company.

therecord EN 2023 vulnerability Ivanti Norway
Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws https://www.bleepingcomputer.com/news/security/almost-40-percent-of-ubuntu-users-vulnerable-to-new-privilege-elevation-flaws/
26/07/2023 23:40:45
QRCode
archive.org
thumbnail

Two Linux vulnerabilities introduced recently into the Ubuntu kernel create the potential for unprivileged local users to gain elevated privileges on a massive number of devices.

bleepingcomputer EN 2023 Code-Execution Kernel Linux Linux-Kernel Local-Privilege-Escalation Ubuntu Vulnerability CVE-2023-2640 CVE-2023-32629
CVE-2023-38408: Remote Code Execution in OpenSSH’s forwarded ssh-agent https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
20/07/2023 11:18:06
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit (TRU) has discovered a remote code execution vulnerability in OpenSSH's forwarded ssh-agent. This vulnerability allows a remote…

qualys EN 2023 OpenSSH remote code execution vulnerability ssh-agent
chonked pt.2: exploiting cve-2023-33476 for remote code execution https://blog.coffinsec.com/0day/2023/06/19/minidlna-cve-2023-33476-exploits.html
20/06/2023 10:55:31
QRCode
archive.org

second part in a two-part series going over heap overflow in MiniDLNA (CVE-2023-33476). this post provides a walkthrough of steps taken to write an exploit for this vulnerability in order to achieve remote code execution and pop a shell.

coffinsec EN 2023 MiniDLNA vulnerability CVE-2023-33476 rce
KeePassXC Vulnerability CVE-2023-35866 allows attackers to change the master password and second-factor authentication settings https://securityonline.info/keepassxc-vulnerability-cve-2023-35866-allows-attackers-to-change-the-master-password-and-second-factor-authentication-settings/
19/06/2023 20:29:04
QRCode
archive.org
thumbnail

The core of CVE-2023-35866 lies in disturbing ease of access. A local attacker, within an authenticated KeePassXC Database session

securityonline EN 2023 KeePassXC Vulnerability CVE-2023-35866
A simple bug exposed access to thousands of smart security alarm systems https://techcrunch.com/2023/06/16/eaton-secureconnect-security-alarm-vulnerability/
17/06/2023 20:08:32
QRCode
archive.org
thumbnail

The vulnerability — now fixed — was discovered in a cloud-based system that allows customers to remotely manage their security alarm systems.

techcrunch EN 2023 security cybersecurity home-security-systems smart security alarm systems IoT vulnerability
CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Threat Brief https://unit42.paloaltonetworks.com/threat-brief-moveit-cve-2023-34362/
07/06/2023 20:25:16
QRCode
archive.org
thumbnail

On May 31, Progress Software posted a notification alerting customers of a critical Structured Query Language injection (SQLi) vulnerability (CVE-2023-34362) in their MOVEit Transfer product. MOVEit Transfer is a managed file transfer (MFT) application intended to provide secure collaboration and automated file transfers of sensitive data.

paloaltonetworks EN 2023 MOVEit SQL Injection Vulnerability CVE-2023-34362
Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/
04/06/2023 23:02:39
QRCode
archive.org
thumbnail

Rapid7 is observing exploitation of a critical vulnerability in Progress Software’s MOVEit Transfer solution across multiple customer environments.

Rapid7 EN 2023 MOVEit Transfer Vulnerability
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2023/05/30/new-macos-vulnerability-migraine-could-bypass-system-integrity-protection/
04/06/2023 22:30:35
QRCode
archive.org
thumbnail

A new vulnerability, which we refer to as “Migraine” for its involvement with macOS migration, could allow an attacker with root access to automatically bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device

Microsoft en 2023 research vulnerability macOS Migraine bypass SIP
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft
03/06/2023 18:10:00
QRCode
archive.org
thumbnail

Analysis of a zero-day vulnerability in MOVEit Transfer, and containment and hardening guidance.

mandiant EN 2023 0-day MOVEit Transfer Vulnerability analysis
WordPress Plugin Vulnerability Exposed Ferrari Website to Hackers https://www.securityweek.com/wordpress-plugin-vulnerability-exposed-ferrari-website-to-hackers/
15/05/2023 13:41:19
QRCode
archive.org
thumbnail

A vulnerability in a WordPress plugin exposed the official website of sports car maker Ferrari to hacker attacks.

securityweek EN 2023 WordPress Ferrari vulnerability
The Race to Patch: Attackers Leverage Sample Exploit Code in Wordpress Plugin | Akamai https://www.akamai.com/blog/security-research/attackers-leverage-sample-exploit-wordpress-plugin
14/05/2023 17:20:39
QRCode
archive.org
thumbnail

The time for attackers to respond to known vulnerabilities is shrinking. See an example of an attacker using sample code.

  • The Akamai Security Intelligence Group (SIG) has been analyzing attack attempt activity following the announcement of a critical vulnerability in a WordPress custom fields plug-in affecting more than 2 million sites.

  • Exploiting this vulnerability could lead to a reflected cross-site scripting (XSS) attack, in which malicious code is injected into a victim site and pushed to its visitors.

  • On May 4, 2023, the WP Engine team announced the security fix in version 6.1.6, including sample exploit code as a proof of concept (PoC).

  • Starting on May 6, less than 48 hours after the announcement, the SIG observed significant attack attempt activity, scanning for vulnerable sites using the sample code provided in the technical write-up.

  • This highlights that the response time for attackers is rapidly decreasing, increasing the need for vigorous and prompt patch management.

akamai EN 2023 XSS vulnerability WordPress plugin third-party-risk CVE-2023-30777
oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory https://seclists.org/oss-sec/2023/q2/133
10/05/2023 08:23:43
QRCode
archive.org
thumbnail

An issue has been discovered in the Linux kernel that can be abused by
unprivileged local users to escalate privileges.

The issue is about Netfilter nf_tables accepting some invalid updates
to its configuration.

seclists.org EN 2023 CVE-2023-32233 Linux Kernel Netfilter nf_tables arbitrary memory vulnerability
WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability https://patchstack.com/database/vulnerability/advanced-custom-fields-pro/wordpress-advanced-custom-fields-pro-plugin-6-1-5-reflected-cross-site-scripting-xss-vulnerability
08/05/2023 11:18:18
QRCode
archive.org
thumbnail

Rafie Muhammad (Patchstack) discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Advanced Custom Fields PRO Plugin. This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site. This vulnerability has been fixed in version 6.1.6.

patchstack EN 2023 WP CVE-2023-30777 Advanced Custom Fields Pro plugin XSS vulnerability Wordpress plugin
VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest https://www.securityweek.com/vmware-patches-critical-vulnerability-disclosed-at-pwn2own-hacking-contest/
26/04/2023 11:27:38
QRCode
archive.org
thumbnail

VMware this week released patches for a critical vulnerability disclosed at the Pwn2Own Vancouver 2023 hacking contest.

securityweek EN 2023 VMware critical vulnerability Pwn2Own CVE-2023-20869
Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) https://vulncheck.com/blog/cve-2023-1671-analysis
22/04/2023 20:04:20
QRCode
archive.org
thumbnail

CVE-2023-1671 is a pre-authenticated command injection in Sophos Web Appliance. In this blog post, VulnCheck researchers analyze the vulnerability and develop a proof of concept (PoC) for it.

vulncheck EN 2023 analysis vulnerability Sophos CVE-2023-1671 pre-authenticated command injection
Google Chrome emergency update fixes first zero-day of 2023 https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-first-zero-day-of-2023/
16/04/2023 23:40:34
QRCode
archive.org
thumbnail

Google has released an emergency Chrome security update to address the first zero-day vulnerability exploited in attacks since the start of the year.

bleepingcomputer EN 2023 0-day vulnerability Emergency-Update Chrome Browser Zero-Day
Remote Code Execution Vulnerability in Google They Are Not Willing To Fix https://giraffesecurity.dev/posts/google-remote-code-execution/
16/04/2023 22:03:00
QRCode
archive.org

This is a story about a security vulnerability in Google that allowed me to run arbitrary code on the computers of 50+ Google employees. Although Google initially considered my finding a serious security incident, later on, it changed its mind and stated that my finding is not, in fact, a vulnerability, but the intended behavior of their software.

giraffesecurity EN 2023 vulnerability disclosure Google RCE intended
Windows Installer EOP (CVE-2023-21800) https://blog.doyensec.com//2023/03/21/windows-installer.html
21/03/2023 16:51:18
QRCode
archive.org

This blog post describes the details and methodology of our research targeting the Windows Installer (MSI) installation technology.

doyensec doyensecurity EN 2023 vulnerability exploit CVE-2023-21800 MSI Windows
CVE-2023-27532 https://www.veeam.com/kb4424?s=09
08/03/2023 19:14:41
QRCode
archive.org
thumbnail

Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.

veeam EN 2023 advisory vulnerability Backup
page 9 / 12
4373 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio