Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé Root  ✕
Cisco warns that Unified CM has hardcoded root SSH credentials https://www.bleepingcomputer.com/news/security/cisco-removes-unified-cm-callManager-backdoor-root-account/
02/07/2025 19:48:39
QRCode
archive.org
thumbnail

Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpatched devices with root privileges.

Cisco Unified Communications Manager (CUCM), formerly known as Cisco CallManager, serves as the central control system for Cisco's IP telephony systems, handling call routing, device management, and telephony features.

The vulnerability (tracked as CVE-2025-20309) was rated as maximum severity, and it is caused by static user credentials for the root account, which were intended for use during development and testing.

bleepingcomputer EN CVE-2025-20309 2025 CUCM CallManager Unified Security Password Root Hardcoded Communications Cisco
Critical Cisco ISE bug can let attackers run commands as root https://www.bleepingcomputer.com/news/security/critical-cisco-ise-bug-can-let-attackers-run-commands-as-root/
06/02/2025 21:07:01
QRCode
archive.org
thumbnail

Cisco has fixed two critical Identity Services Engine (ISE) vulnerabilities that can let attackers with read-only admin privileges bypass authorization and run commands as root.

bleepingcomputer EN 2025 Bypass Cisco Cisco-ISE Identity-Services-Engine RCE Remote-Command-Execution Root
Cisco warns of NX-OS zero-day exploited to deploy custom malware https://www.bleepingcomputer.com/news/security/cisco-warns-of-nx-os-zero-day-exploited-to-deploy-custom-malware/
01/07/2024 19:59:25
QRCode
archive.org
thumbnail

Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches.

bleepingcomputer EN 2024 China Cisco Command-Injection Malware NX-OS Root Switch Velvet-Ant Zero-Day
Les retards du serveur racine C https://www.bortzmeyer.org/c-root-retard.html
23/05/2024 21:09:52
QRCode
archive.org

On fait souvent remarquer que c'est pendant les pannes qu'on peut le mieux observer comment un système marche. Les perturbations qui affectent le serveur racine du DNS identifié par la lettre C sont donc l'occasion d'apprendre comment fonctionne ce système des serveurs racine.

bortzmeyer FR 2024 root DNS c.root-servers.net retard cogent
Sustaining Digital Certificate Security - TrustCor Certificate Distrust https://security.googleblog.com/2023/01/sustaining-digital-certificate-security_13.html
16/01/2023 06:37:40
QRCode
archive.org
thumbnail

Google includes or removes CA certificates within the Chrome Root Store as it deems appropriate for user safety in accordance with our policies. The selection and ongoing inclusion of CA certificates is done to enhance the security of Chrome and promote interoperability.

googleblog EN 2023 Digital Certificate Security Root TrustCor Distrust
Mysterious company with government ties plays key internet role https://www.washingtonpost.com/technology/2022/11/08/trustcor-internet-addresses-government-connections/
09/11/2022 20:48:59
QRCode
archive.org
thumbnail

TrustCor Systems vouches for the legitimacy of websites. But its physical address is a UPS Store in Toronto.

washingtonpost EN 2022 Trustcore root certificate trust US
Chromium Blog: Announcing the Launch of the Chrome Root Program https://blog.chromium.org/2022/09/announcing-launch-of-chrome-root-program.html
21/09/2022 23:28:46
QRCode
archive.org
thumbnail

In 2020, we announced we were in the early phases of establishing the Chrome Root Program and launching the Chrome Root Store.

The Chrome Root Program ultimately determines which website certificates are trusted by default in Chrome, and enables more consistent and reliable website certificate validation across platforms.

This post shares an update on our progress and how these changes help us better protect Chrome’s users.

chromium EN 2022 root store certificates trust
MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639 https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root-privilege-escalation-vulnerability-a-deep-di.html
06/04/2022 10:11:02
QRCode
archive.org
thumbnail

We discovered a now-patched vulnerability in macOS SUHelper, designated as CVE-2022-22639. If exploited, the vulnerability could allow malicious actors to gain root privilege escalation.

trendmicro research reports EN 2022 MacOS CVE-2022-22639 SUHelper root
4521 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio