Aggregator
I Opt Out: System, Governance, And Coordination Must Change Bacause of AI Echoes
10 Best Code Security Tools in 2024
As the world becomes more reliant on technology, viruses and security weaknesses may eventually develop in our operating systems. However, developers are ready for this because they have Javascript code security tools that help them find and fix internal computer bugs by giving them more information, such as a snapshot of the application’s state. Recently, […]
The post 10 Best Code Security Tools in 2024 appeared first on Cyber Security News.
基于cloudflare worker的telegraph图床
基于cloudflare worker的telegraph图床
用Go语言重写了gh-proxy加速
用Go语言重写了gh-proxy加速
National Public Data confirms a data breach
National Public Data confirms a data breach
Bitcoin Is The Hulk
USENIX Security ’23 – PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit
USENIX Security ’23 – PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit
Authors/Presenters:Oliver Broadrick, Poorvi Vora, Filip Zagórski
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit appeared first on Security Boulevard.
Azure domains and Google abused to spread disinformation and malware
New Mad Liberator gang uses fake Windows update screen to hide data theft
New Mad Liberator gang uses fake Windows update screen to hide data theft
在 Ryzen 9 9950X 上对比 Windows 11 和 Ubuntu 24.04 性能
在 Ryzen 9 9950X 上对比 Windows 11 和 Ubuntu 24.04 性能
CVE-2024-7703 | reputeinfosystems ARMember Plugin up to 4.0.37 on WordPress SVG File cross site scripting
Tetrel Security 公布 OpenBMC 高危漏洞细节
Tetrel Security 公布 OpenBMC 高危漏洞细节
OpenBMC 是一个为服务器开发标准基板管理控制器(BMC)的标准实现框架。BMC允许对服务器硬件进行远程管理,广泛部署在服务器硬件中,提供监控、日志记录功能以及带外恢复和维护工具。由于BMC通常具有高度特权,因此将BMC网络接口隔离到一个独立的管理网络是安全最佳实践。
Tetrel在审查OpenBMC源代码时发现了slpd-lite子组件中的两个内存损坏漏洞。在典型部署中,成功利用这些漏洞将允许具有对BMC管理网络访问权限的攻击者完全攻陷BMC。
第一个漏洞涉及堆中分配的数据的越界读取,可能泄露信息给攻击者。第二个漏洞允许攻击者在堆中分配的数据结构范围之外进行写入。结合这两个漏洞,可以直接实现远程漏洞利用。Tetrel公开了漏洞成因,和相关技术细节,包括代码片段和漏洞的潜在利用方式。同时,还提供了有关如何确认堆损坏可能性的重现步骤,以及在Ubuntu 22.04.04 LTS上测试漏洞的过程。
如果你的数据中心使用了集成spld-lite的OEM厂商提供的BMC(无论是否基于OpenBMC),务必尽快升级。HardenedVault的OpenBMC实现由于spld-lite并没有集成,所以不受影响。”