Posts
2525
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

Mixing watering hole attacks with history leak via CSS https://adepts.of0x.cc/css-history-leaks/

0
1
0
repeated

I’m in shock

0
2
0
repeated
repeated

The folks from Xiaomi didn't pick up their Pwnie for Lamest Vendor Response, so we're keeping it safe for them until they decide to come accept it.

1
3
0
repeated
Edited 10 months ago

Ivanti security advisories: August Security Update
Today, fixes have been released for the following solutions: Ivanti Neurons for ITSM, Ivanti Avalanche and Ivanti Virtual Traffic Manager (vTM).

The concerning CVEs:

  • CVE-2024-7569 (9.6 critical) An information disclosure vulnerability in Ivanti ITSM on-prem and Neurons for ITSM
  • CVE-2024-7593 (9.8 critical) authentication bypass in Ivanti vTM (PUBLICLY DISCLOSED)
    • "We are not aware of any customers being exploited by this vulnerability at the time of disclosure. However, a Proof of Concept is publicly available"

"We have no evidence of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti products or solutions."

See related Bleeping Computer reporting: Ivanti warns of critical vTM auth bypass with public exploit

0
2
0
[RSS] Talos discovers 11 vulnerabilities between Microsoft, Adobe software disclosed on Patch Tuesday

https://blog.talosintelligence.com/talos-discovers-11-vulnerabilities-between-microsoft-adobe-software-disclosed-on-patch-tuesday/
0
0
0
repeated

Palo Alto Networks security advisories:

"Palo Alto Networks is not aware of any malicious exploitation of this issue."

1
1
0
SolarWinds fixes critical RCE bug affecting all Web Help Desk versions

https://www.bleepingcomputer.com/news/security/solarwinds-fixes-critical-rce-bug-affecting-all-web-help-desk-versions/

This is CVE-2024-28986, pre-auth Java deserialization

h/t @Viss
0
0
1
[RSS] Microsoft Windows CLIPSP.SYS License Update Field Type 0xCC out-of-bounds read vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1971
0
0
0
[RSS] Microsoft CLIPSP.SYS License Update out-of-bounds read vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1988
0
0
0
[RSS] Microsoft CLIPSP.SYS License update privilege escalation vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1966
0
1
0
repeated

Taylorism is a management philosophy based on using scientific optimization to maximize labor productivity and economic efficiency.

Here's the result of making the false Taylorist assumption that the output of scientific research is scientific papers—the more, faster, and cheaper, the better.

1
2
0
repeated

Me to Microsoft: You can avoid a whole class of vulnerability if non-admin users can't create subdirectories off of the root directory. You should fix this.

MS: Nah.

Me: Well, you folks should probably at least run Crassus on your code.

MS: Nah.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38098

3
4
0
repeated

Reminder that my book—Rust Atomics and Locks—is freely available online: https://marabos.nl/atomics/ 😊

(If you read it, please leave a review on https://www.goodreads.com/book/show/63291820-rust-atomics-and-locks)

2
6
0
repeated

This is cool! https://quic.xargs.org/ [if you’re a security geek.]

Click on a few bubbles.

h/t @nelson

4
2
0
repeated

In our writeup https://sector7.computest.nl/post/2024-06-cve-2024-20693-windows-cached-code-signature-manipulation/ about CVE-2024-20693, we noted that Microsoft did not structurally address the trust of "$KERNEL.*" Extended Attributes on SMB shares. Today's Patch Tuesday addresses -2024-38133, doing the same thing again, but in this case even an USB disk would work!

I think this may be the first time we got an "Exploitation More Likely", so achievement unlocked I guess?

0
1
0
repeated

Better late than never, patches from and are finally out - and 6 bugs are under active attack. Check out all the details, including some wormable bugs, as @TheDustinChilds breaks down the release. https://www.zerodayinitiative.com/blog/2024/8/13/the-august-2024-security-update-review

0
1
0
Show older