Etherpad 1.8.13 - Code Execution Vulnerabilities
https://blog.sonarsource.com/etherpad-code-execution-vulnerabilities
https://blog.sonarsource.com/etherpad-code-execution-vulnerabilities
Sonarsource
Etherpad 1.8.13 - Code Execution Vulnerabilities
We discovered two code execution vulnerabilities that affected Etherpad servers and data. Learn more about the technical details and how to avoid such coding issues.
Urgent Security Notice: Critical Risk to Unpatched End-of-Life SRA & SMA 8.x Remote Access Devices | SonicWall
https://www.sonicwall.com/support/product-notification/urgent-security-notice-critical-risk-to-unpatched-end-of-life-sra-sma-8-x-remote-access-devices/210713105333210/
https://www.sonicwall.com/support/product-notification/urgent-security-notice-critical-risk-to-unpatched-end-of-life-sra-sma-8-x-remote-access-devices/210713105333210/
Joker Is Still No Laughing Matter
Рост вариаций Joker, под что маскируется, цепочка атак:
https://blog.zimperium.com/joker-is-still-no-laughing-matter/
Joker trojans are malicious Android applicationsРост вариаций Joker, под что маскируется, цепочка атак:
https://blog.zimperium.com/joker-is-still-no-laughing-matter/
How we protect users from 0-day attacks
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/amp/
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/amp/
Google
How we protect users from 0-day attacks
Google’s Threat Analysis Group (TAG) actively works to detect hacking attempts and influence operations to protect users from digital attacks, this includes hunting for 0-day vulnerabilities because they can be particularly dangerous when exploited and have…
Отчет о прошедшем Open SysConf’21
Открытая идея, как продолжение идеи Open SysConf, которая направлена на шаринг знаний, awareness в области ИТ всех заинтересованных людей, инициировало создание данного документа, в котором формально выражены ответы на полученный фидбек, анализ прошедшего мероприятия, организационные аспекты.
• https://docs.google.com/document/d/1uIRJFHdDoBORmM4DpwejoHKc7EToyY_nftQsWe-NMO4/edit?usp=sharing
Доп. ссылки:
• Оставить фидбек можно здесь - https://docs.google.com/forms/d/e/1FAIpQLScixOHh5pCNJseuRT4a04B1703vC8ux5Btrba2rismJ-lUwJA/viewform?usp=sf_link
• Стрим был здесь - https://news.1rj.ru/str/sysadm_in_channel/3199
• Сайт - https://sysconf.io
Всем Peace ✌️
Отчет о прошедшем Open SysConf’21
Открытая идея, как продолжение идеи Open SysConf, которая направлена на шаринг знаний, awareness в области ИТ всех заинтересованных людей, инициировало создание данного документа, в котором формально выражены ответы на полученный фидбек, анализ прошедшего мероприятия, организационные аспекты.
• https://docs.google.com/document/d/1uIRJFHdDoBORmM4DpwejoHKc7EToyY_nftQsWe-NMO4/edit?usp=sharing
Доп. ссылки:
• Оставить фидбек можно здесь - https://docs.google.com/forms/d/e/1FAIpQLScixOHh5pCNJseuRT4a04B1703vC8ux5Btrba2rismJ-lUwJA/viewform?usp=sf_link
• Стрим был здесь - https://news.1rj.ru/str/sysadm_in_channel/3199
• Сайт - https://sysconf.io
Всем Peace ✌️
Sys-Admin InfoSec pinned « Отчет о прошедшем Open SysConf’21 Открытая идея, как продолжение идеи Open SysConf, которая направлена на шаринг знаний, awareness в области ИТ всех заинтересованных людей, инициировало создание данного документа, в котором формально выражены ответы на…»
Getting Started with Podman on Fedora
https://fedoramagazine.org/getting-started-with-podman-in-fedora/
https://fedoramagazine.org/getting-started-with-podman-in-fedora/
Fedora Magazine
Getting Started with Podman on Fedora Linux - Fedora Magazine
Podman is a daemonless container engine for developing, managing, and running OCI Containers on your Linux System. In this article, we will introduce podman and how to use it with a small application build using nodejs. The app will be very simple and clean.…
NaaS никогда не сталкивался, но оказывается есть и такое (Network as a Service Enables)
Со слов IDC довольно востребовано:
https://idcdocserv.com/US47128521
Со слов IDC довольно востребовано:
https://idcdocserv.com/US47128521
Critical WooCommerce SQL Injection Vulnerability Details
https://patchstack.com/woocommerce-sql-injection-vulnerability/
https://patchstack.com/woocommerce-sql-injection-vulnerability/
Patchstack
Critical WooCommerce SQL Injection Vulnerability Details - Patchstack
This security advisory is written about the WooCommerce SQL Injection vulnerability. Patchstack users are safe from the vulnerability.
Cisco Adaptive Security Appliance Software Release 9.16.1 and Cisco Firepower Threat Defense Software Release 7.0.0 IPsec Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Adaptive%20Security%20Appliance%20Software%20Release%209.16.1%20and%20Cisco%20Firepower%20Threat%20Defense%20Software%20Release%207.0.0%20IPsec%20Denial%20of%20Service%20Vulnerability&vs_k=1
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Adaptive%20Security%20Appliance%20Software%20Release%209.16.1%20and%20Cisco%20Firepower%20Threat%20Defense%20Software%20Release%207.0.0%20IPsec%20Denial%20of%20Service%20Vulnerability&vs_k=1
Cisco
Cisco Security Advisory: Cisco Adaptive Security Appliance Software Release 9.16.1 and Cisco Firepower Threat Defense Software…
A vulnerability in the software cryptography module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker or an unauthenticated attacker in a man-in-the-middle position…
Remote code execution in cdnjs of Cloudflare
https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/
https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/
blog.ryotak.net
Remote code execution in cdnjs of Cloudflare
Preface
(日本語版も公開されています。)
Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments.
This article describes vulnerabilities reported through this program and published…
(日本語版も公開されています。)
Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments.
This article describes vulnerabilities reported through this program and published…
Bypassing Windows Hello Without Masks or Plastic Surgery
https://www.cyberark.com/resources/threat-research-blog/bypassing-windows-hello-without-masks-or-plastic-surgery
https://www.cyberark.com/resources/threat-research-blog/bypassing-windows-hello-without-masks-or-plastic-surgery
Cyberark
Bypassing Windows Hello Without Masks or Plastic Surgery
Biometric authentication is beginning to see rapid adoption across the enterprise as organizations look to incorporate passwordless solutions to help mitigate the numerous security risks inherent...
Vulnerability Spotlight: Multiple vulnerabilities in D-LINK DIR-3040
https://blog.talosintelligence.com/2021/07/vuln-spotlight-d-link.html
P.S. Thx for link @Thatskriptkid ✌️
https://blog.talosintelligence.com/2021/07/vuln-spotlight-d-link.html
P.S. Thx for link @Thatskriptkid ✌️
Cisco Talos Blog
Vulnerability Spotlight: Multiple vulnerabilities in D-LINK DIR-3040
Dave McDaniel discovered these vulnerabilities. Blog by Jon Munshaw.
Cisco Talos recently discovered multiple vulnerabilities in the D-LINK DIR-3040 wireless router.
The DIR-3040 is an AC3000-based wireless internet router. These vulnerabilities could allow…
Cisco Talos recently discovered multiple vulnerabilities in the D-LINK DIR-3040 wireless router.
The DIR-3040 is an AC3000-based wireless internet router. These vulnerabilities could allow…
Microsoft Windows Print Spooler Point and Print allows installation of arbitrary queue-specific files
https://kb.cert.org/vuls/id/131152
P.S. что в их Linux'e будет твориться, если в своей же системе разобраться не могут..?
https://kb.cert.org/vuls/id/131152
P.S. что в их Linux'e будет твориться, если в своей же системе разобраться не могут..?
kb.cert.org
CERT/CC Vulnerability Note VU#131152
Microsoft Windows Print Spooler Point and Print allows installation of arbitrary queue-specific files
Патчи D-LINK для недавно найденных уязвимостей ( https://news.1rj.ru/str/sysadm_in_channel/3230 )
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10228
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10228
Telegram
Sys-Admin InfoSec
Vulnerability Spotlight: Multiple vulnerabilities in D-LINK DIR-3040
https://blog.talosintelligence.com/2021/07/vuln-spotlight-d-link.html
P.S. Thx for link @Thatskriptkid ✌️
https://blog.talosintelligence.com/2021/07/vuln-spotlight-d-link.html
P.S. Thx for link @Thatskriptkid ✌️
Juniper множественный набор патчей ( Junos OS ):
https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIES&cat=SIRT_1&actp=&sort=datemodified&dir=descending&max=1000&batch=15&rss=true&itData.offset=0
https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIES&cat=SIRT_1&actp=&sort=datemodified&dir=descending&max=1000&batch=15&rss=true&itData.offset=0
Use Docker Compose with Podman to Orchestrate Containers on Fedora Linux
https://fedoramagazine.org/use-docker-compose-with-podman-to-orchestrate-containers-on-fedora/
https://fedoramagazine.org/use-docker-compose-with-podman-to-orchestrate-containers-on-fedora/
Fedora Magazine
Use Docker Compose with Podman to Orchestrate Containers on Fedora Linux - Fedora Magazine
Docker Compose is an open-source tool used by developers for orchestrating containers locally or in production. If you are new to containers, I suggest checking out the following links: Get Started with Docker A Practical Introduction to Container Terminology…
Meet WiFiDemon: iOS WiFi RCE 0-Day Vulnerability & a 'Zero-Click' Vulnerability That was Silently Patched
https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/
https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/
Jamf
Jamf Threat Labs | Blog
CVE-2021-3438: 16 Years In Hiding - Millions of Printers Worldwide Vulnerable
https://labs.sentinelone.com/cve-2021-3438-16-years-in-hiding-millions-of-printers-worldwide-vulnerable/
https://labs.sentinelone.com/cve-2021-3438-16-years-in-hiding-millions-of-printers-worldwide-vulnerable/
SentinelOne
CVE-2021-3438: 16 Years In Hiding - Millions of Printers Worldwide Vulnerable - SentinelLabs
A high severity flaw in HP, Samsung and Xerox printer drivers has existed since 2005 and could lead to an escalation of privilege.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
CVE-2021-22555: Turning \x00\x00 into 10000$ | security-research
https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
security-research
CVE-2021-22555: Turning \x00\x00 into 10000$
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Sequoia: A Local Privilege Escalation Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909)
https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909
https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909
Qualys
Sequoia: A Local Privilege Escalation Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909) | Qualys
The Qualys Research Team has discovered a size_t-to-int type conversion vulnerability in the Linux Kernel’s filesystem layer affecting most Linux operating systems. Any unprivileged user can gain root…