Forwarded from Splunk> Knowledge Base
xz Utils versions 5.6.0 and 5.6.1 appear to be compromised.
XZ Utils is data compression software and may be present in Linux distributions. The malicious code may allow unauthorized access to affected systems.
#CVE #XZ #linux
@splunk_kb
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - FabioBaroni/CVE-2024-3094-checker: Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed…
Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094) - FabioBaroni/CVE-2024-3094-checker
این مقاله در مورد یک آسیب پذیری حیاتی در سیستم عامل Brocade Fabric است. در مورد تأثیر بالقوه آسیب پذیری و چگونگی کاهش خطر بحث می کند. آسیبپذیری، CVE-2023-3454، به مهاجمان راه دور اجازه میدهد تا کد را روی سوئیچهای آسیبدیده اجرا کنند . که می تواند به آنها کنترل کامل روی سوئیچ و شبکه را بدهد. نسخه های سیستم عامل Brocade Fabric 9.x تا 9.2.0 آسیب پذیر هستند . ارتقاء به نسخه 9.2.0 یا جدیدتر توصیه می شود .
#cve
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
این مقاله یک آسیب پذیری امنیتی حیاتی با نام CVE-2024-2389 را مورد بحث قرار می دهد که بر ابزار نظارت شبکه Progress Flowmon تأثیر می گذارد.
#cve
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Progress Flowmon Vulnerability Let Attackers Inject Malicious Code
A new critical vulnerability has been discovered in Progress Flowmon which has been assigned with CVE-2024-2389.
👏1
Critical RCE bug in 92,000 D-Link NAS devices now exploited in attacks
این آسیبپذیری میتواند به دلیل ترکیبی از دو ضعف مورد سوء استفاده قرار گیرد: یک حساب رمزگذاریشده و توانایی تزریق دستورات از طریق پارامتر «سیستم».
طبق گفته GreyNoise، هکرها در حال انجام حملات هستند!
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
BleepingComputer
Critical RCE bug in 92,000 D-Link NAS devices now exploited in attacks
Attackers are now actively targeting over 92,000 end-of-life D-Link Network Attached Storage (NAS) devices exposed online and unpatched against a critical remote code execution (RCE) zero-day flaw.
👍1
یک آسیب پذیری حیاتی در کتابخانه استاندارد Rust کشف شده است که سیستم های مبتنی بر ویندوز را در معرض خطر اجرای کد دلخواه قرار می دهد. این نقص که به عنوان CVE-2024-24576 ردیابی می شود، به طور بالقوه می تواند توسط مهاجمان برای به دست آوردن کنترل غیرمجاز یک سیستم مورد سوء استفاده قرار گیرد.
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Cybersecurity News
CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks
The flaw, tracked as CVE-2024-24576, could potentially be exploited by attackers to gain unauthorized control of a system.
👍1
A 0-day vulnerability in PAN-OS that allows an unauthenticated attacker to execute arbitrary code on the firewall with root rights. According to Palo Alto Networks, attacks have already been carried out that exploit this vulnerability!
👉 Dork: tag.name:"palo_alto"
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Palo Alto Networks Product Security Assurance
CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurat...
Search for data on vulnerabilities and indicators of compromise Search for data on vulnerabilities and indicators of compromise
🔎 Online services
⏺ MITRE CVE — is a search engine, database and generally accepted classifier of vulnerabilities.
⏺ NIST NVD — search the official American government vulnerability database.
⏺ GitHub Advisory Database — a database of vulnerabilities that includes CVEs and security recommendations.
⏺ CVEDetails, osv.dev, VulDB, maltiverse — a number of other sources of data on vulnerabilities and indicators of compromise.
⏺ opencve.io — CVE search engine with built-in alerts new threats.
⏺ security.snyk.io и Mend Vulnerability Database, Vulncode-DB — open source vulnerability databases.
#tool #CVE
تیم سورین
#tool #CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub Advisory Database
A database of software vulnerabilities, using data from maintainer-submitted advisories and from other vulnerability databases.
❤2
هشدار - یک آسیب پذیری حیاتی در PuTTY نسخه های 0.68 تا 0.80 می تواند منجر به به خطر افتادن کلید خصوصی شود.
Don't let hackers take control—update immediately.
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
LRQA
CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM
A walkthrough of CVE-2024-20356, a high severity Command Injection vulnerability affecting a range of Cisco products. This vulnerability can be used in a larger attack chain to compromise the Secure Boot configuration and run unauthorised software (in this…
Oracle VirtualBox Prior to 7.0.16 is vulnerable to Local Privilege Escalation via Symbolic Link Following leading to Arbitrary File Delete and Arbitrary File Move.
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - mansk1es/CVE-2024-21111: Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability
Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability - mansk1es/CVE-2024-21111