Posts
2524
Following
647
Followers
1461
"I'm interested in all kinds of astronomy."
repeated

Veeam security advisory from 06 November 2024 Veeam Backup Enterprise Manager Vulnerability (CVE-2024-40715)
CVE-2024-40715 (7.7 high) Veeam Backup & Replication Enterprise Manager authentication bypass. No mention of exploitation.

0
1
0
repeated

The contrast between two CUPS vulns is amazing. This one, CVE-2024-35235, seems to have flown completely under the radar - in total contrast to CVE-2024-47176. It was an LPE with an exploit chain that sounds very reliable. I only heard about it for the first time today.

https://bird.makeup/@snyksec/1841524163921453552

0
4
0
repeated

In case you missed it, here's the recording of our talk "Exploiting File Writes in Hardened Environments"!

It's a short and sweet 30-minute talk, so grab a coffee and sit back while @scryh goes from HTTP request to ROP chain in Node.js โ˜•

https://www.youtube.com/watch?v=ltmZNTP2KX4

0
5
0
repeated

Palo Alto Networks Security Advisory: PAN-SA-2024-0015 Important Informational Bulletin: Ensure Access to Management Interface is Secured
Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface. They do not know the specifics of the claimed vulnerability.

We strongly recommend customers to ensure access to your management interface is configured correctly in accordance with our recommended best practice deployment guidelines. In particular, we recommend that you ensure that access to the management interface is possible only from trusted internal IPs and not from the Internet. The vast majority of firewalls already follow this Palo Alto Networks and industry best practice.

1
2
0
repeated
repeated

Please make this happen. I would love nothing more than to have an image parser run during a bugcheck

https://bird.makeup/@clemensv/1814209068082270285

1
2
1
[RSS] Was It Really GPAC? (No!) Getting a CVE Removed from CISA KEV

https://jericho.blog/2024/11/07/was-it-really-gpac-no-getting-a-cve-removed-from-cisa-kev/
0
2
3
[RSS] Introduction to Procedural Debugging through Binary Libification [USENIX paper]

https://www.usenix.org/conference/woot24/presentation/brossard

%27In this article, we introduce the notions of "libification" and "procedural debugging" to facilitate partial debugging of binaries at the procedural level. These techniques allow the transformation of arbitrary dynamically linked ELF binaries into shared libraries, and the study of memory corruption bugs by directly calling the vulnerable functions, hence separating the memory corruption intraprocedural analysis from the reachability problem. %27
0
0
1
Woohoo! My PR got merged and deployed to prod so now you can search MITRE ATT&CK with the !attack Bang with @kagihq \o/

https://github.com/kagisearch/bangs/pull/125
1
1
8
I remember a set of torrents for de-facto standard online content like Wikipedia, Arch Wiki, etc. but can't seem to find them.

Any clues?
1
1
1
repeated

bert hubert ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡บ๐Ÿ‡ฆ

If as it appears likely that ๐Ÿ‡ช๐Ÿ‡บwill have to start defending itself against Russia ๐Ÿ‡ท๐Ÿ‡บ alone it may be good to realize our IT systems and society arenโ€™t remotely ready for that. https://berthub.eu/articles/posts/cyber-security-pre-war-reality-check/

0
6
0
repeated

Ekoparty 2024 Binary Gecko Challenge ๐Ÿ‡ฆ๐Ÿ‡ท

Complete the challenge to get a ticket to our VIP dinner/party event in Buenos Aires during the conference.

Winners will also get an interview for a Security Researcher position at Binary Gecko.

https://github.com/Binary-Gecko/ekoparty2024_challenge

0
2
0
#music #uspol #punk
Show content
0
0
0
repeated

William Gibson talks about and , as well as the dangers of cyberspace, back in 1993.

1
2
0
repeated

strcpy can cause a buffer overflow

user finds strcpy in code

user files a CRITICAL security report against for using strcpy in source code. Proof? Well he did grep the code and shows that it does indeed use strcpy...

Never a dull moment.

7
2
0
Mind the v8 patch gap: Electron's Context Isolation is insecure

https://s1r1us.ninja/posts/electron-contextbridge-is-insecure/

/via exploits.club
0
1
3
Idiomatic #Rust bindings for the #IDAPro SDK, enabling the development of standalone analysis tools using IDA v9.0โ€™s idalib.

https://github.com/binarly-io/idalib

/via exploits.club
0
0
2
repeated

CISA: CISA Adds Four Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-5910 (9.3 critical) Palo Alto Expedition Missing Authentication Vulnerability
  • CVE-2024-43093 (high) Android Framework Privilege Escalation Vulnerability
  • CVE-2024-51567 (10.0 critical ๐Ÿฅณ) CyberPanel Incorrect Default Permissions Vulnerability
  • CVE-2019-16278 (9.8 critical) Nostromo nhttpd Directory Traversal Vulnerability

0
1
0
repeated

Cisco multiple security advisories from 06 November 2024:

  1. CVE-2024-20418 (10.0 critical ๐Ÿฅณ) Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability
  2. CVE-2024-20536 (8.8 high) Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability
  3. CVE-2024-20484 (7.5 high) Cisco Enterprise Chat and Email Denial of Service Vulnerability
  4. CVE-2024-20445 (5.3 medium) Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability
  5. CVE-2024-20533 and CVE-2024-20534 (4.8 medium) Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities
  6. Cisco Identity Services Engine Vulnerabilities
    • CVE-2024-20476 (4.3 medium) Cisco ISE Authorization Bypass Vulnerability
    • CVE-2024-20487 (4.3 medium) Cisco ISE Stored XSS Vulnerability
  7. Cisco Identity Services Engine Vulnerabilities
    • CVE-2024-20525 and CVE-2024-20530 (6.1 medium) Cisco ISE Reflected Cross-Site Scripting Vulnerabilities
    • CVE-2024-20527, CVE-2024-20529, and CVE-2024-20532 (5.5 medium) Cisco ISE Arbitrary File Read and Delete Vulnerabilities
    • CVE-2024-20531 (5.5 medium) Cisco ISE XML External Entity Injection Vulnerability
    • CVE-2024-20528 (3.8 low) Cisco ISE Path Traversal Vulnerability
  8. Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities
    • CVE-2024-20537 (6.5 medium) Cisco ISE Authorization Bypass Vulnerability
    • CVE-2024-20538 (6.1 medium) Cisco ISE Cross-Site Scripting Vulnerability
    • CVE-2024-20539 (4.8 medium) Cisco ISE Stored Cross-Site Scripting Vulnerability
  9. CVE-2024-20457 (6.5 medium) Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability
  10. CVE-2024-20504 (5.4 medium) Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability
  11. CVE-2024-20514 (5.4 medium) Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability
  12. CVE-2024-20511 (6.1 medium) Cisco Unified Communications Manager Cross-Site Scripting Vulnerability
  13. CVE-2024-20507 (4.3 medium) Cisco Meeting Management Information Disclosure Vulnerability
  14. CVE-2024-20540 (5.4 medium) Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability
  15. CVE-2024-20371 (5.3 medium) Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

1
1
0
Show older