Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Axiomtek is launching the AIE100-903-FL-NX AI Edge framework that can perform in rugged conditions.
#Technologies
#Technologies
Forwarded from DailyCVE
Dailycve
URI.js input validation error vulnerability | CVE
Details:
URI.js has an input validation error flaw, which comes from causing the host name to be spoofed by using a backslash (``) character followed by an at (`@`) The decision may be wrong if the host name is included in the protection decision. The effectβ¦
URI.js has an input validation error flaw, which comes from causing the host name to be spoofed by using a backslash (``) character followed by an at (`@`) The decision may be wrong if the host name is included in the protection decision. The effectβ¦
Forwarded from DailyCVE
π΅Multiple vulnerabilities in Aterm SA3500G provided by NEC Corporation:
https://dailycve.com/node/17
https://dailycve.com/node/17
Dailycve
Multiple vulnerabilities in Aterm SA3500G provided by NEC Corporation | CVE
Details:
OS Command Injection ( CWE-78 ) --CVE-2020-5635
CVSS v3CVSS: 3.0 / AV: A / AC: L / PR: N / UI: N / S: U / C: H / I: H / A: HBase value: 8.8
CVSS v2AV: A / AC: L / Au: N / C: P / I: P / A: PBase value: 5.8
OS Command Injection ( CWE-78 ) --CVE-2020-5635
CVSS v3CVSS: 3.0 / AV: A / AC: L / PR: N / UI: N / S: U / C: H / I: H / A: HBase value: 8.8
CVSS v2AV: A / AC: L / Au: N / C: P / I: P / A: PBase value: 5.8
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π Bring your favorite shell wherever you go through the ssh:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½
PyPi 3
1) pip3 install xxh-xxh
pipx - good alternative to brew and pip, read comparision
2) pipx install xxh-xxh
Conda-forge feedstock
3) conda config --add channels conda-forge
conda install xxh-xxh
Β» Homebrew
> brew install xxh
Β» Linux portable binary
1) mkdir ~/xxh && cd ~/xxh
2) wget https://github.com/xxh/xxh-portable/raw/master/result/xxh-portable-musl-alpine-Linux-x86_64.tar.gz
3) tar -xzf xxh-portable-musl-alpine-Linux-x86_64.tar.gz
4) ./xxh
> >Linux AppImage
1) mkdir ~/xxh && cd ~/xxh
2) wget -O xxh https://github.com/xxh/xxh-appimage/releases/
download/continuous/xxh-release-x86_64.AppImage
3) chmod +x xxh && ./xxh
β β β Uππ»βΊπ«Δπ¬πβ β β β
π Bring your favorite shell wherever you go through the ssh:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½
PyPi 3
1) pip3 install xxh-xxh
pipx - good alternative to brew and pip, read comparision
2) pipx install xxh-xxh
Conda-forge feedstock
3) conda config --add channels conda-forge
conda install xxh-xxh
Β» Homebrew
> brew install xxh
Β» Linux portable binary
1) mkdir ~/xxh && cd ~/xxh
2) wget https://github.com/xxh/xxh-portable/raw/master/result/xxh-portable-musl-alpine-Linux-x86_64.tar.gz
3) tar -xzf xxh-portable-musl-alpine-Linux-x86_64.tar.gz
4) ./xxh
> >Linux AppImage
1) mkdir ~/xxh && cd ~/xxh
2) wget -O xxh https://github.com/xxh/xxh-appimage/releases/
download/continuous/xxh-release-x86_64.AppImage
3) chmod +x xxh && ./xxh
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· xxh/xxh-appimage
xonsh.AppImage continuous build. Contribute to xxh/xxh-appimage development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
Dailycve
Plone XXE attacks | CVE
Details:
Plone is a Zope Technology Server-based open source content management system (CMS). In Plone versions prior to 5.2.3, there is a security vulnerability which allows XXE attacks to be carried out without permission through features protected byβ¦
Plone is a Zope Technology Server-based open source content management system (CMS). In Plone versions prior to 5.2.3, there is a security vulnerability which allows XXE attacks to be carried out without permission through features protected byβ¦
π¦free recommended project Haka:
An open source security oriented language which allows to describe protocols and apply security policies on (live) captured traffic. The scope of Haka language is twofold. First of all, it allows to write security rules in order to filter/alter/drop unwanted packets and log and report malicious activities. Second, Haka features a grammar enabling to specify network protocols and their underlying state machine.
Β» http://www.haka-security.org
An open source security oriented language which allows to describe protocols and apply security policies on (live) captured traffic. The scope of Haka language is twofold. First of all, it allows to write security rules in order to filter/alter/drop unwanted packets and log and report malicious activities. Second, Haka features a grammar enabling to specify network protocols and their underlying state machine.
Β» http://www.haka-security.org
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The truth of the 'phantom market merger' of NEC / Fujitsu, the Hinomaru Union set up by NTTT.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack/ Pentesting ios browser's with bug: guide
https://bugs.chromium.org/p/project-zero/issues/detail?id=1858
1) The class _NSDataFileBackedFuture can be deserialized even if secure encoding is enabled.
2) This class is a file-backed NSData object that loads a local file into memory when the [NSData bytes] selector is called.
3) This presents two problems. First, it could potentially allow undesired access to local files if the code deserializing the buffer ever shares it (this is more likely to cause problems in components that use serialized objects to communicate locally than in iMessage).
4) Second, it allows an NSData object to be created with a length that is different than the length of its byte array. This violates a very basic property that should always be true of NSData objects. This can allow out of bounds reads, and could also potentially lead to out-of-bounds writes, as it is now possible to create NSData objects with very large sizes that would not be possible if the buffer was backed.
π¦To reproduce the issue with the files in filebacked.zip:
1) install frida (pip3 install frida)
2) open sendMessage.py, and replace the sample receiver with the phone number or email of the target device
in injectMessage.js replace the marker "PATH" with the path of the obj file
3) in the local directory, run:
4) python3 sendMessage.py
Please note that the attached repro case is a simple example to demonstrate the reach-ability of the class in Springboard. The actual consequences of the bug are likely more serious. This PoC only works on devices with iOS 12 or later.
code/ref :
https://github.com/TinToSer/ios-RCE-Vulnerability
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack/ Pentesting ios browser's with bug: guide
https://bugs.chromium.org/p/project-zero/issues/detail?id=1858
1) The class _NSDataFileBackedFuture can be deserialized even if secure encoding is enabled.
2) This class is a file-backed NSData object that loads a local file into memory when the [NSData bytes] selector is called.
3) This presents two problems. First, it could potentially allow undesired access to local files if the code deserializing the buffer ever shares it (this is more likely to cause problems in components that use serialized objects to communicate locally than in iMessage).
4) Second, it allows an NSData object to be created with a length that is different than the length of its byte array. This violates a very basic property that should always be true of NSData objects. This can allow out of bounds reads, and could also potentially lead to out-of-bounds writes, as it is now possible to create NSData objects with very large sizes that would not be possible if the buffer was backed.
π¦To reproduce the issue with the files in filebacked.zip:
1) install frida (pip3 install frida)
2) open sendMessage.py, and replace the sample receiver with the phone number or email of the target device
in injectMessage.js replace the marker "PATH" with the path of the obj file
3) in the local directory, run:
4) python3 sendMessage.py
Please note that the attached repro case is a simple example to demonstrate the reach-ability of the class in Springboard. The actual consequences of the bug are likely more serious. This PoC only works on devices with iOS 12 or later.
code/ref :
https://github.com/TinToSer/ios-RCE-Vulnerability
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - TinToSer/ios-RCE-Vulnerability: Latest ios RCE Vulnerability disclosed by Google Security Researcher
Latest ios RCE Vulnerability disclosed by Google Security Researcher - TinToSer/ios-RCE-Vulnerability
Forwarded from DailyCVE
Dailycve
Umbraco path traversal vulnerability | CVE
Details:
Umbraco is a Content Management System (CMS) open source written by Umbraco, Denmark, in C#. There is a path traversal flaw in Umbraco CMS 8.9.1 and earlier versions, allowing arbitrary files to be written outside the home directory of the site andβ¦
Umbraco is a Content Management System (CMS) open source written by Umbraco, Denmark, in C#. There is a path traversal flaw in Umbraco CMS 8.9.1 and earlier versions, allowing arbitrary files to be written outside the home directory of the site andβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS