Aggregator
How to Generate a CrowdStrike RFM Report With AI in Tines
1 year 2 months ago
Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform.
Their bi-annual “You Did What with Tines?!” competition highlights some of the most interesting workflows submitted by their
The Hacker News
How to Generate a CrowdStrike RFM Report With AI in Tines
1 year 2 months ago
Automation / Endpoint SecurityRun by the team at orchestration, AI, and automation platform Tines,
CVE-2024-52059 | RTI Connext Professional up to 6.1.2.16/7.3.0.1 buffer overflow
1 year 2 months ago
A vulnerability has been found in RTI Connext Professional up to 6.1.2.16/7.3.0.1 and classified as critical. This vulnerability affects unknown code. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2024-52059. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52066 | RTI Connext Professional up to 6.0.1.39/6.1.2.20/7.3.0.4 Routing Service buffer overflow
1 year 2 months ago
A vulnerability, which was classified as critical, was found in RTI Connext Professional up to 6.0.1.39/6.1.2.20/7.3.0.4. This affects an unknown part of the component Routing Service. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-52066. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52065 | RTI Connext Professional up to 5.3.1.40/6.1.2.20/7.3.0.1 on Non-Windows Persistence Service buffer overflow
1 year 2 months ago
A vulnerability, which was classified as critical, has been found in RTI Connext Professional up to 5.3.1.40/6.1.2.20/7.3.0.1 on Non-Windows. Affected by this issue is some unknown functionality of the component Persistence Service. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2024-52065. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52064 | RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.1 Core Libraries buffer overflow
1 year 2 months ago
A vulnerability classified as critical was found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.1. Affected by this vulnerability is an unknown functionality of the component Core Libraries. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-52064. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52063 | RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4 Core Libraries/Routing Service buffer overflow
1 year 2 months ago
A vulnerability classified as critical has been found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4. Affected is an unknown function of the component Core Libraries/Routing Service. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-52063. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52062 | RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4 Core Libraries buffer overflow
1 year 2 months ago
A vulnerability was found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4. It has been rated as critical. This issue affects some unknown processing of the component Core Libraries. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-52062. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52061 | RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4 Core Libraries buffer overflow
1 year 2 months ago
A vulnerability was found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4. It has been declared as critical. This vulnerability affects unknown code of the component Core Libraries/Queuing Service/Recording Service/Routing Service. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2024-52061. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52058 | RTI Connext Professional up to 6.1.2.18/7.3.0.1 System Designer os command injection
1 year 2 months ago
A vulnerability was found in RTI Connext Professional up to 6.1.2.18/7.3.0.1. It has been classified as critical. This affects an unknown part of the component System Designer. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-52058. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52057 | RTI Connext Professional up to 5.2.x/6.1.2.16/7.3.0 Queuing Service sql injection
1 year 2 months ago
A vulnerability was found in RTI Connext Professional up to 5.2.x/6.1.2.16/7.3.0 and classified as critical. Affected by this issue is some unknown functionality of the component Queuing Service. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-52057. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52060 | RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4 Routing Service buffer overflow
1 year 2 months ago
A vulnerability has been found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Routing Service/Recording Service/Queuing Service/Observability Collector Service/Cloud Discovery Service. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-52060. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Unix通用打印系统cups-browsed远程代码执行漏洞分析
1 year 2 months ago
安全研究员Simone Margaritelli披露了Unix通用打印系统CUPS存在一系列安全漏洞,利用多个漏洞组合可在受影响的系统上执行远程命令。启明星辰ADLab研究人员对该漏洞的原理进行深入分析,同时提出修复建议和缓解措施。
Unix通用打印系统cups-browsed远程代码执行漏洞分析
1 year 2 months ago
更多安全资讯和分析文章请关注启明星辰ADLab微信公众号及官方网站(adlab.venustech.com.cn)一、漏洞描述2024年9月,安全研究员Simone Margaritelli披露了Un
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization
1 year 2 months ago
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems
Researchers Discover Malware Used by Nation-Sates to Attack Industrial Systems
1 year 2 months ago
IOCONTROL, a custom-built IoT/OT malware, was used by Iran-affiliated groups to attack Israel- and US-based OT/IoT devices, according to Claroty
在青甘大环线逆时针自驾,看大西北的荒芜与绚烂
1 year 2 months ago
近几年,自驾游重新成为热门旅行方式,国内有几条有名的自驾游路线,例如「此生必驾」318、川西环线、独库公路、青甘环线、环海南岛路线等。恰逢今年国庆调休可以实现「请 2 休 10」,于是在综合考量可玩性
新的隐蔽 Pumakit Linux rootkit 恶意软件在野外被发现
1 year 2 months ago
error code: 521
观点 | 用法治手段加强网络谣言治理
1 year 2 months ago
网络谣言往往使处于网络空间中的个体在无法验证信息真伪的状况下,产生群体非理性认同。相较于传统媒体传播的信息,网络谣言呈现传播“碎片化”、内容“情感化”、后果“公共化”等新特征。