🕴 'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover 🕴
📖 Read
via "Dark Reading".
The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.📖 Read
via "Dark Reading".
Dark Reading
'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover
The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.
‼ CVE-2022-36276 ‼
📖 Read
via "National Vulnerability Database".
TCMAN GIM v8.0.1 is vulnerable to a SQL injection via the 'SqlWhere' parameter inside the function 'BuscarESM'. The exploitation of this vulnerability might allow a remote attacker to directly interact with the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43838 ‼
📖 Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-36277 ‼
📖 Read
via "National Vulnerability Database".
The 'sReferencia', 'sDescripcion', 'txtCodigo' and 'txtDescripcion' parameters, in the frmGestionStock.aspx and frmEditServicio.aspx files in TCMAN GIM v8.0.1, could allow an attacker to perform persistent XSS attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43804 ‼
📖 Read
via "National Vulnerability Database".
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-20259 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device. This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-20101 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are typically reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3784 ‼
📖 Read
via "National Vulnerability Database".
Garuda Linux performs an insecure user creation and authentication that allows any user to impersonate the created account. By creating users from the 'Garuda settings manager', an insecure procedure is performed that keeps the created user without an assigned password during some seconds. This could allow a potential attacker to exploit this vulnerability in order to authenticate without knowing the password.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-20235 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5371 ‼
📖 Read
via "National Vulnerability Database".
RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file📖 Read
via "National Vulnerability Database".
🕴 On the Dark Web, Prices Are Down for Middle Eastern Network Access 🕴
📖 Read
via "Dark Reading".
A mere $35 can buy you stealth access to corporate networks across the region, according to new research.📖 Read
via "Dark Reading".
Dark Reading
On the Dark Web, Prices Are Down for Middle Eastern Network Access
A mere $35 can buy you stealth access to corporate networks across the region, according to new research.
🕴 AWS Plans Multifactor Authentication Mandates for 2024 🕴
📖 Read
via "Dark Reading".
Amazon will add new MFA requirements for users with the highest privileges, with plans to include other user levels over time. 📖 Read
via "Dark Reading".
Dark Reading
AWS Plans Multifactor Authentication Mandates for 2024
Amazon will add new MFA requirements for users with the highest privileges, with plans to include other user levels over time.
🕴 Bing Chat LLM Tricked into Circumventing CAPTCHA Filter 🕴
📖 Read
via "Dark Reading".
By reframing the narrative of the filter, the large-language model chatbot was more willing to solve the visual puzzle and override its programming.📖 Read
via "Dark Reading".
Dark Reading
Bing Chat LLM Tricked Into Circumventing CAPTCHA Filter
By reframing the narrative of the filter, the large-language model chatbot was more willing to solve the visual puzzle and override its programming.
‼ CVE-2023-5391 ‼
📖 Read
via "National Vulnerability Database".
A?CWE-502:?Deserialization of untrusted data?vulnerability exists?that could allow an attacker to execute arbitrary code on the targeted system by sending a specifically crafted packet to the application. 📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3428 ‼
📖 Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3576 ‼
📖 Read
via "National Vulnerability Database".
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39191 ‼
📖 Read
via "National Vulnerability Database".
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42448 ‼
📖 Read
via "National Vulnerability Database".
Hydra is the layer-two scalability solution for Cardano. Prior to version 0.13.0, the specification states that the contestation period in the datum of the UTxO at the head validator must stay unchanged as the state progresses from Open to Closed (Close transaction), but no such check appears to be performed in the `checkClose` function of the head validator. This would allow a malicious participant to modify the contestation deadline of the head to either allow them to fanout the head without giving another participant the chance to contest, or prevent any participant from ever redistributing the funds locked in the head via a fan-out. Version 0.13.0 contains a patch for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5402 ‼
📖 Read
via "National Vulnerability Database".
A?CWE-269: Improper Privilege Management vulnerability exists?that could cause?a local privilege escalation?when the transfer command is used.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38701 ‼
📖 Read
via "National Vulnerability Database".
Hydra is the layer-two scalability solution for Cardano. Users of the Hydra head protocol send the UTxOs they wish to commit into the Hydra head first to the `commit` validator, where they remain until they are either collected into the `head` validator or the protocol initialisation is aborted and the value in the committed UTxOs is returned to the users who committed them. Prior to version 0.12.0, the `commit` validator contains a flawed check when the `ViaAbort` redeemer is used, which allows any user to spend any UTxO which is at the validator arbitrarily, meaning an attacker can steal the funds that users are trying to commit into the head validator. The intended behavior is that the funds must be returned to the user which committed the funds and can only be performed by a participant of the head. The `initial` validator also is similarly affected as the same flawed check is performed for the `ViaAbort` redeemer. Due to this issue, an attacker can steal any funds that user's try to commit into a Hydra head. Also, an attacker can prevent any Hydra head from being successfully opened. It does not allow an attacker to take funds which have been successfully collected into and currently reside in the `head` validator. Version 0.12.0 contains a fix for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27121 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in the component /framework/cron/action/humanize of Pleasant Solutions Pleasant Password Server v7.11.41.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cronString parameter.📖 Read
via "National Vulnerability Database".