当前节点:rss
时间节点
2021-07-27 04:30:35research.securitum.com
This article is about the recently published security advisory for a pretty popular software, fail2ban (CVE-2021-32749). It is about a bug that may lead to Remote Code Execution.
The post fail2ban – Remote Code Execution appeared first on research.securitum.com.
2021-07-27 04:30:33HackerOne Hacker Activity
Date: 2021-07-26 09:13 UTC
OS: Linux
PHP Version: 8.1Git-2021-07-26 (Git)
Package: Reproducible crash
Title: Core dump on PHP 8.1
2021-07-27 04:30:23Exploit-DB.com RSS Feed
XOS Shop 1.0.9 - 'Multiple' Arbitrary File Deletion (Authenticated)
2021-07-27 04:30:23Exploit-DB.com RSS Feed
NoteBurner 2.35 - Denial Of Service (DoS) (PoC)
2021-07-27 04:30:23Exploit-DB.com RSS Feed
Leawo Prof. Media 11.0.0.1 - Denial of Service (DoS) (PoC)
2021-07-27 04:30:23Exploit-DB.com RSS Feed
Elasticsearch ECE 7.13.3 - Anonymous Database Dump
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18Sploitus.com Exploits RSS Feed
2021-07-27 04:30:18SecWiki News
针对Web缓存欺骗(WCD)攻击的大规模测试的论文【英文】 by discovery

安全建设-攻防思路与实践(一) by ourren

SecWiki周刊(第386期) by ourren

LuminousMoth样本分析报告 by chamd5

论文-调查软件开发中方法命名情况 by ourren

更多最新文章,请访问SecWiki
2021-07-27 04:30:17Security Boulevard
One day after last summer's mass-hack of Twitter, KrebsOnSecurity wrote that 22-year-old British citizen Joseph "PlugwalkJoe" O'Connor appeared to have been involved in the incident. When the Justice Department last week announced O'Connor's arrest and indictment, his alleged role in the Twitter compromise was well covered in the media.
But most of the coverage so far seem to have overlooked the far more sinister criminal charges in the indictment, which involve an underground scene wherein young men turn to extortion, sextortion, SIM swapping, death threats and physical attacks -- all in a bid to seize control over highly-prized social media accounts.
The post PlugwalkJoe Does the Perp Walk appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
Learn how to approach ongoing security for applications, patch management, logging and monitoring, and incident management with a DevOps mindset.
The post Security for Startups in a DevOps World: Maintenance and Management appeared first on JumpCloud.
The post Security for Startups in a DevOps World: Maintenance and Management appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
via the comic artistry and dry wit of Randall Munroe, resident at XKCD!
The post XKCD ‘Commonly Mispronounced Equations’ appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
Cloud application security risks continue to rise as malware delivered by cloud applications continues to grow, according to a study by Netskope. The biannual study also highlighted the potential for critical data exfiltration tied to employees departing their jobs—departing employees upload three times more data to personal apps in the last 30 days of employment,..
The post Shadow IT, Cloud-Based Malware Increase AppSec Risks appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
Building secure software using the Software Bill of Materials
Photo by Josue Isai Ramos Figueroa on Unsplash
In May 2021, the President released the Executive Order on Improving the Nation’s Cybersecurity (Executive Order). The Software Bill of Materials (SBOM) directly impacts all developers. The SBOM requires third-party software companies to provide customers with the code equivalent of a “nutrition chart.” Looking toward the future, organizations should consider the impact that the Software Bill of Materials will have on software development practices.
What is the Software Bill of Materials?
Although the Executive Order mentions SBOM in the body of the text, the definition is buried at the end. The SBOM consists of the following:
A formal list of supply chain dependencies
Details about open source and commercial software used to develop software
Machine-readable format to enable automation and tool integration
Additionally, the Executive Order notes that these “gain greater value” when stored in a collect
2021-07-27 04:30:17Security Boulevard
Reflecting on the past two years, it’s impossible to ignore the impact the healthcare industry has had on nearly every community worldwide. The surge of COVID-19 brought on a monumental shift within the industry as a way to comply with COVID protocols. The healthcare sector is experiencing a growing reliance on cloud computing services, telemedicine, and treatment devices.
The post Why It’s Critical For the Healthcare Sector to Reassess their Cybersecurity Posture appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
Disinformation is rife on social media. The latest scandal is a Russian PR firm paying YouTubers to flog lies about vaccines killing people.
The post Anti-Vax Lies Spread on YouTube—Paid for ‘by Russian PR Company’ appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups' YouTube channel.
Permalink
The post BSides Vancouver 2021 – Magno Logan’s ‘Kubernetes Security: Attacking And Defending K8s Clusters’ appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
Great article in Scientific American says too much of scientific research is trying to be “appealing” (e.g. wrong, yet surprising and therefore attracting attention) instead of accurate. …surprising results are surprising because they go against what experience has led us to believe so far, which means that there’s a good chance they’re wrong. Imagine a … Continue reading Surprise! Surprises Often Are Wrong. →
The post Surprise! Surprises Often Are Wrong. appeared first on Security Boulevard.
2021-07-27 04:30:17Security Boulevard
We’re excited to announce a new free trial option of Veracode Security Labs that allows new users to try the full Enterprise Edition for 14 days. Why is this hands-on training solution so critical? Developers are the backbone of the software that powers our world today, but when they lack security skills, it’s harder for them to keep up with the rapid pace of modern software development while still producing secure code. Veracode Security Labs helps close these skill gaps by giving developers that inimitable hands-on experience, and now with this two-week trial, you’ll have plenty of time to try out these hands-on-keyboard labs with your developers and see just how effective it is in real-time.
“Veracode Security Labs engages and actively teaches developers by giving them a containerized space to work with real code and demonstrates how to avoid flaws that have led to some of the headline-making vulnerabilities of the last few years,” says Ian McLeod, Chief Product Officer at Veracode. “With this approach, in
2021-07-27 04:30:17Files ≈ Packet Storm
Red Hat Security Advisory 2021-2881-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.12.0. Issues addressed include man-in-the-middle, out of bounds write, and use-after-free vulnerabilities.
2021-07-27 04:30:17Files ≈ Packet Storm
Gentoo Linux Security Advisory 202107-55 - Multiple vulnerabilities have been found in libsdl2, the worst of which could result in a Denial of Service condition. Versions less than 2.0.14-r1 are affected.
2021-07-27 04:30:17Files ≈ Packet Storm
This Metasploit module allows an attacker with a privileged WordPress account to launch a reverse shell due to an arbitrary file upload vulnerability in WordPress SP Project and Document plugin versions prior to 4.22. The security check only searches for lowercase file extensions such as .php, making it possible to upload .pHP files for instance. Finally, the uploaded payload can be triggered by a call to /wp-content/uploads/sp-client-document-manager/
/
.php.
2021-07-27 04:30:17Files ≈ Packet Storm
Backdoor.Win32.Nbdd.bgz malware suffers from a buffer overflow vulnerability.
2021-07-27 04:30:17Files ≈ Packet Storm
Backdoor.Win32.Bifrose.acci malware suffers from a buffer overflow vulnerability that can allow for code execution.
2021-07-27 04:30:17Files ≈ Packet Storm
This Metasploit module allows an attacker with a privileged WordPress account to launch a reverse shell due to an arbitrary file upload vulnerability in WordPress Modern Events Calendar plugin versions prior to 5.16.5. This is due to an incorrect check of the uploaded file extension. Indeed, by using text/csv content-type in a request, it is possible to upload a .php payload as is is not forbidden by the plugin. Finally, the uploaded payload can be triggered by a call to /wp-content/uploads/
.php.
2021-07-27 04:30:17Files ≈ Packet Storm
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code. It was discovered that the virtual file system implementation in the Linux kernel contained an unsigned to signed integer conversion error. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.
2021-07-27 04:30:17Files ≈ Packet Storm
Gentoo Linux Security Advisory 202107-54 - Multiple vulnerabilities have been found in libyang, the worst of which could result in a Denial of Service condition. Versions less than 1.0.236 are affected.
2021-07-27 04:30:17Files ≈ Packet Storm
Backdoor.Win32.PsyRat.b malware suffers from a code execution vulnerability.
2021-07-27 04:30:17Files ≈ Packet Storm
NoteBurner version 2.35 suffers from a denial of service vulnerability.
2021-07-27 04:30:17Files ≈ Packet Storm
Backdoor.Win32.PsyRat.b malware suffers from a denial of service vulnerability.
2021-07-27 04:30:17Files ≈ Packet Storm
Backdoor.Win32.Agent.cu malware suffers from a code execution vulnerability.
2021-07-27 04:30:16Files ≈ Packet Storm
Backdoor.Win32.Agent.cu malware suffers from a man-in-the-middle vulnerability.
2021-07-27 04:30:16Files ≈ Packet Storm
Red Hat Security Advisory 2021-2883-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.12.0. Issues addressed include man-in-the-middle, out of bounds write, and use-after-free vulnerabilities.
2021-07-27 04:30:16Files ≈ Packet Storm
XOS Shop version 1.0.9 suffers from an authenticated arbitrary file deletion vulnerability.
2021-07-27 04:30:16Files ≈ Packet Storm
Red Hat Security Advisory 2021-2882-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.12.0. Issues addressed include man-in-the-middle, out of bounds write, and use-after-free vulnerabilities.
2021-07-27 04:30:16Files ≈ Packet Storm
Backdoor.Win32.Agent.cu malware suffers from an authentication bypass vulnerability that can lead to code execution.
2021-07-27 04:30:16Files ≈ Packet Storm
Leawo Prof. Media version 11.0.0.1 suffers from a denial of service vulnerability.
2021-07-27 04:30:16Files ≈ Packet Storm
Backdoor.Win32.Mazben.me malware suffers from an unauthenticated open proxy vulnerability.