Aggregator
CVE-2018-17382 | Jobs Factory 2.0.4 on Joomla filter_letter sql injection (File 149524/Joo / EDB-45469)
9 months 2 weeks ago
A vulnerability was found in Jobs Factory 2.0.4 on Joomla. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument filter_letter as part of Parameter leads to sql injection.
This vulnerability is known as CVE-2018-17382. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
勒索软件团伙利用 SimpleHelp RMM 漏洞入侵公用事业计费公司
9 months 2 weeks ago
HackerNews 编译,转载请注明出处: 攻击者通过利用SimpleHelp远程监控与管理(RMM)工具中的漏洞,成功入侵了一家公用事业软件计费服务提供商的客户系统。网络安全和基础设施安全局(CISA)发布的新公告警告称,此事件反映出勒索组织自2025年1月以来针对未修复版本SimpleHelp RMM的广泛攻击模式。 SimpleHelp 5.5.7及更早版本存在多个漏洞,其中包括路径遍历漏洞CVE-2024-57727。CISA指出:“勒索组织很可能利用CVE-2024-57727漏洞访问下游客户未修复的SimpleHelp RMM工具,通过双重勒索手段破坏服务。” 所有软件供应商、下游客户及终端用户均被敦促立即核查是否因该漏洞遭受入侵,并采取缓解措施。 漏洞利用详情 路径遍历漏洞CVE-2024-57727于2025年1月公开,并于同年2月13日被列入CISA已知可利用漏洞(KEV)目录。该漏洞可使未经认证的远程攻击者通过构造特殊HTTP请求,从SimpleHelp主机下载任意文件(包括含有机密信息和哈希用户密码的服务器配置文件)。 2025年5月,Sophos研究人员观察到DragonForce勒索软件通过组合利用CVE-2024-57727及同期披露的另外两个漏洞(CVE-2024-57728:允许管理员用户通过上传特制压缩包在文件系统任意位置写入文件的高危漏洞;CVE-2024-57726:允许低权限技术人员创建越权API密钥的严重漏洞)入侵多个客户网络。加密数据后,攻击者采用双重勒索策略,在索要赎金的同时威胁泄露窃取数据。CISA未透露攻击公用事业软件提供商的勒索组织名称。 防护措施 CISA针对不同主体提出建议: 1.软件供应商 若供应商自有软件中嵌入了SimpleHelp,或第三方服务提供商在下游客户网络中部署了SimpleHelp,应核查服务器版本(位于配置文件顶部)。若发现自2025年1月以来使用过5.5.7或更早版本,需立即执行: 隔离SimpleHelp服务器实例与互联网连接或停止服务器进程 升级至最新版本修复漏洞 通知所有下游客户并指导其加固终端设备,同时在网络中开展威胁狩猎 2.下游客户与终端用户 下游客户需立即核查系统是否直接或通过第三方软件间接运行未修复的SimpleHelp RMM。 若发现存在SimpleHelp,可通过向服务器发起HTTP查询确认版本。若确认系统存在5.5.7或更早版本,组织应: 开展威胁狩猎行动寻找入侵证据 持续监控SimpleHelp服务器的异常进出流量 若未发现入侵痕迹,立即升级至最新版本;若无法立即修复则应用临时解决方案 补充说明 SimpleHelp Ltd公司已发布移动端远程支持工具,但该应用与此次漏洞无关。CISA强调,及时升级和主动监控是应对此类供应链攻击的关键防线。 消息来源: infosecurity-magazine; 本文由 HackerNews.cc 翻译整理,封面来源于网络; 转载请注明“转自 HackerNews.cc”并附上原文
hackernews
战神榜6月限定福利!现金+豪礼,等你来战!
9 months 2 weeks ago
战神榜奖金池限时上线!不限权重等级,瓜分数千元现金!
CVE-2006-4687 | Microsoft Internet Explorer up to 5.01 HTML Rendering memory corruption (VU#197852 / Nessus ID 23644)
9 months 2 weeks ago
A vulnerability was found in Microsoft Internet Explorer up to 5.01. It has been rated as critical. This issue affects some unknown processing of the component HTML Rendering. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2006-4687. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2006-4704 | Microsoft Visual Studio .net 2005 ActiveX Control wmiscriptutils.dll memory corruption (VU#854856 / Nessus ID 23836)
9 months 2 weeks ago
A vulnerability classified as critical was found in Microsoft Visual Studio .net 2005. Affected by this vulnerability is an unknown functionality in the library wmiscriptutils.dll of the component ActiveX Control. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2006-4704. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2006-4446 | Microsoft Internet Explorer daxctle.ocx spline memory corruption (Nessus ID 23644 / ID 100038)
9 months 2 weeks ago
A vulnerability was found in Microsoft Internet Explorer. It has been declared as critical. This vulnerability affects the function spline of the file daxctle.ocx. The manipulation leads to memory corruption.
This vulnerability was named CVE-2006-4446. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2006-4446 | Microsoft Internet Explorer up to 6 daxctle.ocx CPathCtl::KeyFrame heap-based overflow (EDB-2358 / Nessus ID 23644)
9 months 2 weeks ago
A vulnerability has been found in Microsoft Internet Explorer up to 6 and classified as critical. This vulnerability affects the function CPathCtl::KeyFrame of the file daxctle.ocx. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2006-4446. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to disable the affected component.
vuldb.com
CVE-2006-4790 | Gnu GnuTLS up to 1.4.3 Certificates verify.c (Nessus ID 22724 / ID 156242)
9 months 2 weeks ago
A vulnerability was found in Gnu GnuTLS up to 1.4.3. It has been declared as problematic. This vulnerability affects unknown code of the file verify.c of the component Certificates. The manipulation leads to an unknown weakness.
This vulnerability was named CVE-2006-4790. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
超 26.9 万个网站一个月内感染 JavaScript 恶意代码
9 months 2 weeks ago
HackerNews 编译,转载请注明出处: 网络安全研究人员披露了一个在合法网站上注入恶意 JavaScript 的大规模攻击活动。 据 Palo Alto Networks Unit 42 报告,这些恶意注入代码使用 JSFuck 进行混淆。JSFuck 指的是一种“深奥且具有教育意义的编程风格”,它仅使用有限的字符集来编写和执行代码。 由于涉及不雅用语,这家网络安全公司将该技术赋予了另一个名称“JSFireTruck”。 “已识别出多个网站被注入了使用 JSFireTruck混淆的恶意 JavaScript,该混淆主要由符号 [, ], +, $, {, } 构成,”安全研究员哈迪克·沙赫(Hardik Shah)、布拉德·邓肯(Brad Duncan)和普拉奈·查帕瓦尔(Pranay Kumar Chhaparwal)表示。“代码的混淆隐藏了其真实目的,阻碍了分析。” 进一步的分析确定,注入的代码旨在检查网站的引荐来源(“document.referrer”),该信息标识了发出请求的网页地址。 如果引荐来源是诸如 Google、Bing、DuckDuckGo、Yahoo! 或 AOL 这样的搜索引擎,JavaScript 代码就会将受害者重定向到可以传播恶意软件、漏洞利用程序、进行流量变现和传播恶意广告(malvertising)的恶意网址。 Unit 42 表示,其遥测数据显示,在 2025 年 3 月 26 日至 4 月 25 日期间,有 269,552 个网页被发现感染了使用 JS消防车技术的 JavaScript 代码。该活动在 4 月 12 日首次出现峰值,当天单日就发现了超过 5 万个受感染的网页。 “该活动的规模和隐蔽性构成了重大威胁,”研究人员说。“这些感染的普遍性表明存在一项协同努力,旨在通过攻陷合法网站作为攻击载体,以实施进一步的恶意活动。” 这一消息发布的背景是:Gen Digital 揭开了一种名为 HelloTDS 的复杂流量分发服务(Traffic Distribution Service, TDS)的面纱。该服务旨在通过注入网站的远程托管 JavaScript 代码,有条件地将网站访问者重定向到虚假验证码(CAPTCHA)页面、技术支持诈骗页面、虚假浏览器更新提示、不需要的浏览器扩展以及加密货币骗局。 该 TDS 的主要目标是将受害者设备采集指纹特征后,作为一个网关来确定要向他们投放的具体内容性质。如果用户未被认定为合适的目标,受害者会被重定向到一个良性网页。 “攻击活动的入口点是受感染或被攻击者控制的其他流媒体网站、文件共享服务,以及恶意广告(malvertising)活动。”研究员沃伊捷赫·克莱萨(Vojtěch Krejsa)和米兰·斯平卡(Milan Špinka)在本月发布的一份报告中表示。 “受害者的筛选会基于地理位置、IP地址和浏览器指纹特征;例如,通过VPN或无头浏览器的连接会被检测并拒绝。” 其中一些攻击链已被发现会提供虚假验证码页面,这些页面利用 ClickFix 策略欺骗用户运行恶意代码,从而使他们的机器感染一种名为“峰值之光”(PEAKLIGHT,也称为 Emmenhtal Loader)的恶意软件。已知该恶意软件会加载信息窃取程序,如 Lumma。 HelloTDS 基础设施的核心是使用 .top、.shop 和 .com 顶级域名来托管 JavaScript 代码,并在经过多阶段(旨在收集网络和浏览器信息)的指纹采集过程后触发重定向。 “这些虚假验证码活动背后的 HelloTDS 基础设施,展示了攻击者如何不断完善其方法,以绕过传统防护措施、逃避检测并有选择性地锁定受害者。”研究人员表示。 “通过利用复杂的指纹识别、动态域名基础设施和欺骗手段(例如模仿合法网站或向研究人员提供良性内容),这些活动既能保持隐蔽性,又能达到大规模。” 消息来源: thehackernews; 本文由 HackerNews.cc 翻译整理,封面来源于网络; 转载请注明“转自 HackerNews.cc”并附上原文
hackernews
JVN: 複数のAVEVA製品における複数の脆弱性
9 months 2 weeks ago
AVEVAが提供する複数の製品には、複数の脆弱性が存在します。
JVN: 複数のPTZカメラにおける複数の脆弱性
9 months 2 weeks ago
複数のPTZ(Pan-Tilt-Zoom)カメラには、複数の脆弱性が存在します。
CVE-2024-52677 | HkCms up to 2.3.2.240702 Upload.php getFileName unrestricted upload (EUVD-2024-46031)
9 months 2 weeks ago
A vulnerability, which was classified as critical, was found in HkCms up to 2.3.2.240702. Affected is the function getFileName in the library /app/common/library/Upload.php. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2024-52677. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-52944 | Veritas Enterprise Vault up to 15.1 HTTP Request cross site scripting (ZDI-CAN-24698 / EUVD-2024-45978)
9 months 2 weeks ago
A vulnerability was found in Veritas Enterprise Vault up to 15.1. It has been classified as problematic. Affected is an unknown function of the component HTTP Request Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-52944. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-52945 | Veritas NetBackup up to 10.4 on Windows untrusted search path (EUVD-2024-45979)
9 months 2 weeks ago
A vulnerability has been found in Veritas NetBackup up to 10.4 on Windows and classified as critical. This vulnerability affects unknown code. The manipulation leads to untrusted search path.
This vulnerability was named CVE-2024-52945. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52941 | Veritas Enterprise Vault up to 15.1 HTTP Request cross site scripting (ZDI-CAN-24695 / EUVD-2024-45975)
9 months 2 weeks ago
A vulnerability was found in Veritas Enterprise Vault up to 15.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component HTTP Request Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-52941. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-52926 | Delinea Privilege Manager up to 12.0.1 Agent privileges management (EUVD-2024-45973)
9 months 2 weeks ago
A vulnerability, which was classified as critical, was found in Delinea Privilege Manager up to 12.0.1. This affects an unknown part of the component Agent. The manipulation leads to improper privilege management.
This vulnerability is uniquely identified as CVE-2024-52926. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-52943 | Veritas Enterprise Vault up to 15.1 HTTP Request cross site scripting (ZDI-CAN-24697 / EUVD-2024-45977)
9 months 2 weeks ago
A vulnerability classified as problematic has been found in Veritas Enterprise Vault up to 15.1. This affects an unknown part of the component HTTP Request Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-52943. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-52942 | Veritas Enterprise Vault up to 15.1 HTTP Request cross site scripting (EUVD-2024-45976)
9 months 2 weeks ago
A vulnerability was found in Veritas Enterprise Vault up to 15.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-52942. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
Kubernetes 安全攻防演练平台
9 months 2 weeks ago
分享一篇文章。