Tag: CVE

  • Slashdot: D-Link Won’t Fix Critical Flaw Affecting 60,000 Older NAS Devices

    Source URL: https://it.slashdot.org/story/24/11/11/2158210/d-link-wont-fix-critical-flaw-affecting-60000-older-nas-devices?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: D-Link Won’t Fix Critical Flaw Affecting 60,000 Older NAS Devices Feedly Summary: AI Summary and Description: Yes Summary: D-Link has announced no patch for a critical command injection vulnerability affecting over 60,000 NAS devices, urging users to either retire or isolate the devices. This situation emphasizes significant risks for…

  • Cloud Blog: Google Cloud deepens its commitment to security and transparency with expanded CVE program

    Source URL: https://cloud.google.com/blog/products/identity-security/google-cloud-expands-cve-program/ Source: Cloud Blog Title: Google Cloud deepens its commitment to security and transparency with expanded CVE program Feedly Summary: At Google Cloud, we recognize that helping customers and government agencies keep tabs on vulnerabilities plays a critical role in securing consumers, enterprises, and software vendors.  We have seen the Common Vulnerabilities and…

  • Hacker News: A New Era of macOS Sandbox Escapes: Overlooked Attack Surface, 10+ New Vulns

    Source URL: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/ Source: Hacker News Title: A New Era of macOS Sandbox Escapes: Overlooked Attack Surface, 10+ New Vulns Feedly Summary: Comments AI Summary and Description: Yes Summary: The blog post discusses a series of novel sandbox escape vulnerabilities discovered in macOS, including various CVEs that expose how remote code execution (RCE) within a…

  • Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/07/cisa-adds-four-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-43093 Android Framework Privilege Escalation Vulnerability CVE-2024-51567 CyberPanel Incorrect Default Permissions Vulnerability CVE-2019-16278 Nostromo nhttpd Directory Traversal Vulnerability CVE-2024-5910 Palo Alto Expedition Missing…

  • The Register: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system

    Source URL: https://www.theregister.com/2024/11/07/cisco_uiws_flaw/ Source: The Register Title: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system Feedly Summary: Ultra-Reliable Wireless Backhaul doesn’t live up to its name Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert.… AI Summary and…

  • The Register: China’s Volt Typhoon reportedly breached Singtel in ‘test-run’ for US telecom attacks

    Source URL: https://www.theregister.com/2024/11/06/chinas_volt_typhoon_breached_singtel/ Source: The Register Title: China’s Volt Typhoon reportedly breached Singtel in ‘test-run’ for US telecom attacks Feedly Summary: Alleged intrusion spotted in June Chinese government cyberspies Volt Typhoon reportedly breached Singapore Telecommunications over the summer as part of their ongoing attacks against critical infrastructure operators.… AI Summary and Description: Yes Summary: The…

  • Hacker News: Bad Software Keeps Cyber Security Companies in Business

    Source URL: https://www.dogesec.com/blog/bad_software_keeps_security_industry_in_business/ Source: Hacker News Title: Bad Software Keeps Cyber Security Companies in Business Feedly Summary: Comments AI Summary and Description: Yes **Summary**: The text provides an analysis of vulnerability trends based on CVE and CWE data from October 2023 to September 2024. It highlights that a significant number of developers still hardcode credentials…

  • Hacker News: Writing Secure Go Code

    Source URL: https://jarosz.dev/article/writing-secure-go-code/ Source: Hacker News Title: Writing Secure Go Code Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive guide on best practices for writing secure Go code. It emphasizes the importance of keeping Go versions updated, utilizing static code analyzers, checking for known vulnerabilities, and implementing best practices…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/04/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-8957 PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability CVE-2024-8956 PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability These types of vulnerabilities are frequent attack vectors…