Aggregator
Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection
1 year 2 months ago
A security flaw has been disclosed in OpenWrt's Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages.
The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and reporting the
The Hacker News
Ускорить компьютер в 1000 раз: как физики приручают альтермагнетизм
1 year 2 months ago
Для рекордной памяти не нужны токсичные металлы.
Attacking Entra Metaverse: Part 1
1 year 2 months ago
hotnops
对攻击者保持视野领先:从漏洞情报到「扩展漏洞情报」
1 year 2 months ago
随着漏洞大爆发时代的来临以及黑产、暗网交易等盛行,如何以更全面、更有针对性的漏洞情报帮助企业在与攻击者的较量中占据高位,成为了业界关注的重点课题之一。在FCIS 2024网络安全创新大会上,斗象科技C
CVE-2018-12123 | Node.js up to 6.14.x/8.13.x/10.13.x/10.2.x javascript URL url.parse interpretation input (Nessus ID 119511 / ID 172114)
1 year 2 months ago
A vulnerability, which was classified as critical, has been found in Node.js up to 6.14.x/8.13.x/10.13.x/10.2.x. Affected by this issue is the function url.parse of the component javascript URL Handler. The manipulation leads to misinterpretation of input.
This vulnerability is handled as CVE-2018-12123. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-21848 | Mattermost Server up to 8.1.10/9.5.0 Call access control
1 year 2 months ago
A vulnerability, which was classified as critical, was found in Mattermost Server up to 8.1.10/9.5.0. Affected is an unknown function of the component Call Handler. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2024-21848. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-29221 | Mattermost Server up to 8.1.10/9.3.2/9.4.3/9.5.1/9.6.0 Add Member /api/v4/users/me/teams access control
1 year 2 months ago
A vulnerability has been found in Mattermost Server up to 8.1.10/9.3.2/9.4.3/9.5.1/9.6.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/v4/users/me/teams of the component Add Member Handler. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2024-29221. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-2447 | Mattermost up to 8.1.10/9.3.2/9.4.3/9.5.1/9.6.0 Post Action access control
1 year 2 months ago
A vulnerability classified as critical was found in Mattermost up to 8.1.10/9.3.2/9.4.3/9.5.1/9.6.0. Affected by this vulnerability is an unknown functionality of the component Post Action Handler. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2024-2447. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-31341 | AMD μProf Tool out-of-bounds write
1 year 2 months ago
A vulnerability has been found in AMD μProf Tool and classified as critical. This vulnerability affects unknown code. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2023-31341. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-8075 | TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 setDiagnosisCfg os command injection
1 year 2 months ago
A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg. The manipulation leads to os command injection.
This vulnerability is known as CVE-2024-8075. The attack can be launched remotely. There is no exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-3127 | GitLab Enterprise Edition up to 17.1.5/17.2.3/17.3.0 IP Restriction access control
1 year 2 months ago
A vulnerability classified as critical has been found in GitLab Enterprise Edition up to 17.1.5/17.2.3/17.3.0. This affects an unknown part of the component IP Restriction Handler. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-3127. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-31307 | AMD Radeon RX 6000 Graphics Cards Power Management Firmware denial of service
1 year 2 months ago
A vulnerability was found in AMD Radeon RX 6000 Graphics Cards and Radeon PRO W6000 Graphics Cards. It has been classified as problematic. Affected is an unknown function of the component Power Management Firmware. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-31307. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-43804 | urllib3 HTTP Header Cookie cross-domain policy (Nessus ID 209788)
1 year 2 months ago
A vulnerability was found in urllib3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component HTTP Header Handler. The manipulation of the argument Cookie leads to permissive cross-domain policy with untrusted domains.
This vulnerability is handled as CVE-2023-43804. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
关键的 Windows UI 自动化框架漏洞允许黑客绕过 EDR
1 year 2 months ago
error code: 521
Ultralytics Supply-Chain Attack
1 year 2 months ago
Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary:
On December 4, a malicious version 8.3.41 of the popular AI library ultralytics —which has almost 60 million downloads—was published to the Python Package Index (PyPI) package repository. The package contained downloader code that was downloading the XMRig coinminer. The compromise of the project’s build environment was achieved by exploiting a known and previously reported GitHub Actions script injection.
Lots more details at that link. Also ...
The post Ultralytics Supply-Chain Attack appeared first on Security Boulevard.
Bruce Schneier
Codice di condotta privacy per le imprese di sviluppo e produzione disoftware gestionale
1 year 2 months ago
Il Garante per la privacy ha approvato il codice di condotta per il trattamento dei dati personali e
BSides Munich: /proc for Security Analysts
1 year 2 months ago
AbstractIn the intricate landscape of cybersecurity, the ability to uncover hidde
DeepSec: RAT Builders - How to catch them all
1 year 2 months ago
AbstractCybercriminals now have unprecedented ease in creating their own remote a
Shell Script Compiler (shc)
1 year 2 months ago
IntroductionAfter installing the payload, the shell script inst.sh runs a backdoo