Lucene search

K

Medtronic N'vision Clinician Programmer Security Vulnerabilities

cve
cve

CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......

7.5CVSS

7.2AI Score

0.001EPSS

2018-03-20 05:29 PM
63
ubuntucve
ubuntucve

CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......

7.5CVSS

7.2AI Score

0.001EPSS

2018-03-20 12:00 AM
11
cvelist
cvelist

CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......

7.3AI Score

0.001EPSS

2018-03-19 12:00 AM
malwarebytes
malwarebytes

Encryption 101: How to break encryption

Continuing on in our Encryption 101 series, where we gave a malware analyst's primer on encryption and demonstrated encryption techniques using ShiOne ransomware, we now look at what it takes to break an encryption. In order for something as powerful as encryption to break, there needs to be some.....

6.9AI Score

2018-03-06 07:10 PM
59
kitploit
kitploit

Ninja Shell - Port Knocking Technique With AES256-GCM

Raw socket shell with AES256-GCM, using Port Knocking technique( https://en.wikipedia.org/wiki/Port_knocking ) using specific tcp flags ,FIN,URG and PSH. Raw socket ? Raw mode is basically there to allow you to bypass some of the way that your computer handles TCP/IP. Rather than going through the....

7.3AI Score

2018-02-28 01:17 PM
15
krebs
krebs

Bot Roundup: Avalanche, Kronos, NanoCore

It's been a busy few weeks in cybercrime news, justifying updates to a couple of cases we've been following closely at KrebsOnSecurity. In Ukraine, the alleged ringleader of the Avalanche malware spam botnet was arrested after eluding authorities in the wake of a global cybercrime crackdown there.....

6.7AI Score

2018-02-27 07:10 PM
53
fedora
fedora

[SECURITY] Fedora 26 Update: ldns-1.7.0-4.fc26

ldns is a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. We also define a higher level API which allows a programmer to (for instance) create or sign...

9.8CVSS

2.3AI Score

0.004EPSS

2018-02-27 04:57 PM
10
cvelist
cvelist

CVE-2018-5448

All versions of the Medtronic 2090 Carelink Programmer are affected by a directory traversal vulnerability where the product's software deployment network could allow an attacker to read files on the...

5.5AI Score

0.0004EPSS

2018-02-27 12:00 AM
1
cvelist
cvelist

CVE-2018-5446

All versions of the Medtronic 2090 Carelink Programmer are affected by a per-product username and password that is stored in a recoverable format which could allow an attacker with physical access to a 2090 Programmer to obtain per-product credentials to the software deployment...

5.1AI Score

0.001EPSS

2018-02-27 12:00 AM
1
mageia
mageia

Updated apache-commons-email packages fix security vulnerability

Apache Commons-Email, from version 1.0 to 1.4 inclusive, does not properly validate bounce addresses. If a user of Commons-Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details...

7.5CVSS

2.4AI Score

0.001EPSS

2018-02-25 02:25 AM
10
krebs
krebs

Alleged Spam Kingpin ‘Severa’ Extradited to US

Peter Yuryevich Levashov, a 37-year-old Russian computer programmer thought to be one of the world's most notorious spam kingpins, has been extradited to the United States to face federal hacking and spamming charges. Levashov, in an undated photo. Levashov, who allegedly went by the hacker names.....

6.8AI Score

2018-02-05 06:28 PM
11
seebug
seebug

Remote Code Execution on the Smiths Medical Medfusion 4000

Remote Code Execution on the Smiths Medical Medfusion 4000 In which we detail the process of vulnerability research on a life critical embedded system: a medical infusion pump. Table of Contents Remote Code Execution on the Smiths Medical Medfusion 4000 Table of Contents Summary Introduction Why...

9.5AI Score

0.327EPSS

2018-01-26 12:00 AM
143
threatpost
threatpost

Apple Preps ChaiOS iMessage Bug Fix for Next Week

UPDATE The so-called ChaiOS message bug identified this week in Apple iOS devices will receive a fix with the rollout of the update for iOS 11.2.5, expected next week. The update will address a flaw software developer Abraham Masri publicly identified in a tweet earlier this week, according to...

-0.3AI Score

2018-01-19 12:12 PM
6
malwarebytes
malwarebytes

Alleged creator of Fruitfly indicted for 13 years of spying

Way back at the start of last year, we took a look at something called Fruitfly, a Mac backdoor using old code that had been around for a long time and could (deep breath) upload files to computers, record images and video, snoop around in victims' information, take screenshots, and also log...

6.9AI Score

2018-01-12 04:43 PM
28
thn
thn

macOS Malware Creator Charged With Spying on Thousands of PCs Over 13 Years

The U.S. Justice Department unsealed 16-count indictment charges on Wednesday against a computer programmer from Ohio who is accused of creating and installing spyware on thousands of computers for more than 13 years. According to the indictment, 28-year-old Phillip R. Durachinsky is the alleged...

7.2AI Score

2018-01-10 11:15 PM
5
zdt
zdt

Western Digital WDMyCloud 2.30.165 Multiple Vulnerabilities

WDMyCloud versions 2.30.165 and below suffer from file upload, hard coded backdoor, command injection, cross site request forgery, denial of service, and information disclosure...

0.2AI Score

2018-01-07 12:00 AM
50
seebug
seebug

WDMyCloud 2.30.165 CSRF / File Upload / Code Execution / Backdoor / DoS

Released Date: 2018-01-04 Last Modified: 2017-06-11 Company Info: Western Digital Version Info: Vulnerable * MyCloud <= 2.30.165 * MyCloudMirror <= 2.30.165 * My Cloud Gen 2 * My Cloud PR2100 * My Cloud PR4100 * My Cloud EX2 Ultra * My Cloud EX2 * My Cloud EX4 * My Cloud...

9.1AI Score

2018-01-05 12:00 AM
37
exploitpack
exploitpack

WDMyCloud 2.30.165 - Multiple Vulnerabilities

WDMyCloud 2.30.165 - Multiple...

0.2AI Score

2018-01-03 12:00 AM
22
exploitdb

7.4AI Score

2018-01-03 12:00 AM
39
googleprojectzero
googleprojectzero

aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript

by Ivan Fratric, Thomas Dullien, James Forshaw and Steven Vittitoe Intro Many widely-deployed technologies, viewed through 20/20 hindsight, seem like an odd or unnecessarily risky idea. Engineering decisions in IT are often made with imperfect information and under time pressure, and some oddities....

8AI Score

2017-12-18 12:00 AM
15
thn
thn

Three Hackers Plead Guilty to Creating IoT-based Mirai DDoS Botnet

The U.S. federal officials have arrested three hackers who have pleaded guilty to computer-crimes charges for creating and distributing Mirai botnet that crippled some of the world's biggest and most popular websites by launching the massive DDoS attacks last year. According to the federal court...

7.1AI Score

2017-12-13 05:36 AM
8
hackerone
hackerone

Open-Xchange: SSRF in VCARD photo upload functionality

FYI - Tested on local installation of App Suite 7.8.4 REV 14, CentOS 7.4, x64 Hello, I believe I may have found another SSRF re-direct vulnerability which again will allow port scanning of the App Suite server and the internal network, this is similar to my earlier report: #293847 The endpoint is.....

-0.2AI Score

2017-12-07 09:03 PM
25
fedora
fedora

[SECURITY] Fedora 27 Update: ldns-1.7.0-9.fc27

ldns is a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. We also define a higher level API which allows a programmer to (for instance) create or sign...

2.3AI Score

2017-11-21 11:38 PM
6
gentoo
gentoo

PHPUnit: Remote code execution

Background PHPUnit is a programmer-oriented testing framework for PHP. It is an instance of the xUnit architecture for unit testing frameworks. Description When PHPUnit is installed in a production environment via composer and these modules are in a web accessible directory, the eval-stdin.php...

9.8CVSS

4.1AI Score

0.975EPSS

2017-11-19 12:00 AM
85
threatpost
threatpost

Oracle Issues Emergency Patches for ‘JoltandBleed’ Vulnerabilities

Oracle pushed out an emergency update for vulnerabilities affecting several of its products that rely on its proprietary Jolt protocol. The bugs were discovered by researchers at ERPScan who named the series of five vulnerabilities JoltandBleed. The vulnerabilities are severe, with two of the bugs....

1.3AI Score

0.01EPSS

2017-11-16 05:05 PM
9
malwarebytes
malwarebytes

BadRabbit: a closer look at the new version of Petya/NotPetya

Petya/NotPetya (aka EternalPetya), made headlines in June, due to it's massive attack on Ukraine. Today, we noted an outbreak of a similar-looking malware, called BadRabbit, probably prepared by the same authors. Just like the previous edition, BadRabbit has an infector allowing for lateral...

7AI Score

2017-10-24 11:08 PM
121
ics
ics

Boston Scientific ZOOM LATITUDE PRM Vulnerabilities

OVERVIEW Researchers Jonathan Butts and Billy Rios of Whitescope have identified two vulnerabilities in Boston Scientific’s ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) – Model 3120. Boston Scientific has provided compensating controls to reduce the risk of exploitation. AFFECTED PRODUCTS The...

4.6CVSS

5.2AI Score

0.001EPSS

2017-10-19 12:00 PM
21
malwarebytes
malwarebytes

Magniber ransomware: exclusively for South Koreans

The Magnitude exploit kit has been pretty consistent over the last few months, dropping the same payload—namely, the Cerber ransomware—and targeting a few select countries in Asia. Strangely, Magnitude EK disappeared in late September, and for a while we wondered whether this was yet another...

7AI Score

2017-10-19 12:29 AM
145
thn
thn

Spanish Court Agrees to Extradite Russian Spam King to the United States

Spain's National Court ruled on Tuesday to extradite a 36-year-old Russian computer programmer, accused by American authorities of malicious hacking offences, to the United States, according to a court document. Peter Yuryevich Levashov, also known as Peter Severa, was arrested in April this...

6.5AI Score

2017-10-04 09:38 PM
5
metasploit
metasploit

Z/OS (MVS) Command Shell, Bind TCP

Provide JCL which creates a bind shell This implementation does not include ebcdic character translation, so a client with translation capabilities is required. MSF handles this...

7.3AI Score

2017-09-29 09:52 PM
34
openbugbounty
openbugbounty

iyfipgun.com XSS vulnerability

Vulnerable URL:...

6.3AI Score

2017-09-24 09:31 PM
12
hackerone
hackerone

Internet Bug Bounty: Format string implementation vulnerability, resulting in code execution

In a security audit to the sprintf implementation in perl (version 5.24.1) I found a major security vulnerability, here are the full details. Timeline: ====== * 6th of May, 2017 - disclosure to the PERL security mailing list * 8th of May, 2017 - vulnerability confirmed by PERL's security group,...

7.7AI Score

2017-09-24 04:13 PM
14
nessus
nessus

CentOS 7 : log4j (CESA-2017:2423)

An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from...

9.8CVSS

9.4AI Score

0.874EPSS

2017-09-01 12:00 AM
39
centos
centos

log4j security update

CentOS Errata and Security Advisory CESA-2017:2423 Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP...

9.8CVSS

9.3AI Score

0.874EPSS

2017-08-31 06:57 PM
89
talosblog
talosblog

Back to Basics: Worm Defense in the Ransomware Age

This post was authored by Edmund Brumaghin "Those who cannot remember the past are condemned to repeat it." - George SantayanaThe PrequelIn March 2017, Microsoft released a security update for various versions of Windows, which addressed a remote code execution vulnerability affecting a protocol...

7.7AI Score

2017-08-31 08:05 AM
21
malwarebytes
malwarebytes

Inside the Kronos malware – part 2

In the previous part of the Kronos analysis, we took a look at the installation process of Kronos and explained the technical details of the tricks that this malware uses in order to remain more stealthy. Now we will move on to look at the malicious actions that Kronos can perform. Analyzed...

7.1AI Score

2017-08-29 03:00 PM
66
schneier
schneier

Insider Attack on Lottery Software

Eddie Tipton, a programmer for the Multi-State Lottery Association, secretly installed software that allowed him to predict jackpots. What's surprising to me is how many lotteries don't use real random number generators. What happened to picking golf balls out of wind-blown steel cages on...

7AI Score

2017-08-22 11:40 AM
42
malwarebytes
malwarebytes

Inside the Kronos malware – part 1

Recently, a researcher nicknamed MalwareTech famous from stopping the WannaCry ransomware got arrested for his alleged contribution to creating the Kronos banking malware. We are still not having a clear picture whether the allegations are true or not - but let's have a look at Kronos itself....

7.2AI Score

2017-08-18 03:14 PM
107
krebs
krebs

Blowing the Whistle on Bad Attribution

The New York Times this week published a fascinating story about a young programmer in Ukraine who'd turned himself in to the local police. The Times says the man did so after one of his software tools was identified by the U.S. government as part of the arsenal used by Russian hackers suspected...

6.8AI Score

2017-08-18 04:29 AM
60
nessus
nessus

Oracle Linux 7 : log4j (ELSA-2017-2423)

From Red Hat Security Advisory 2017:2423 : An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating,.....

9.8CVSS

9.4AI Score

0.874EPSS

2017-08-10 12:00 AM
53
nessus
nessus

RHEL 7 : log4j (RHSA-2017:2423)

An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from...

9.8CVSS

9.4AI Score

0.874EPSS

2017-08-10 12:00 AM
300
carbonblack
carbonblack

August 9, 2017 – Morning Cyber Coffee Headlines – “Jesse Owens” Edition

Good morning! Sit with Carbon Black this morning over a cup of coffee (or tea) and browse a few industry headlines to get the day started. We’ve got just enough information below to get you through that first cup…enjoy! August 9, 2017 - Headlines Take Down: Hackers Looking to Shut Down Factories...

7.3AI Score

2017-08-09 07:04 PM
73
openvas
openvas

RedHat Update for log4j RHSA-2017:2423-01

The remote host is missing an update for...

9.8CVSS

9.8AI Score

0.874EPSS

2017-08-08 12:00 AM
17
redhat
redhat

(RHSA-2017:2423) Important: log4j security update

Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a...

9.3AI Score

0.874EPSS

2017-08-07 07:26 AM
97
malwarebytes
malwarebytes

TrickBot comes with new tricks – attacking Outlook and browsing data

Last year we reported about a new modular malware using a network protocol similar to Dyreza - you can read about it here. The malware was not very stealthy and some parts were looking to be under development, but we noticed its potential and capability to be easily extended. Indeed, authors of...

7AI Score

2017-08-01 07:10 PM
124
thn
thn

Creator of NanoCore RAT Pleads Guilty to Aiding CyberCriminals

A programmer who was arrested in March this year—not because he hacked someone, but because he created and distributed a remote access software that helped cyber criminals—has finally pleaded guilty. Taylor Huddleston, 26, of Hot Springs, Arkansas, pleaded guilty on Tuesday to federal charges of...

6.6AI Score

2017-07-26 07:54 PM
8
malwarebytes
malwarebytes

Bye, bye Petya! Decryptor for old versions released.

Following the outbreak of the Petya-based malware in Ukraine, the author of the original version, Janus, decided to release his master key, probably closing the project. You can read the full story here. Based on the released key, we prepared a decryptor that is capable of unlocking all the...

6.6AI Score

2017-07-24 05:17 PM
56
schneier
schneier

Book Review: Twitter and Tear Gas, by Zeynep Tufekci

There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes from the successful revolutions in Tunisia (2010-11), Egypt (2011), and Ukraine (2013). The second is that it has made them more...

7AI Score

2017-07-14 05:06 PM
131
malwarebytes
malwarebytes

Keeping up with the Petyas: Demystifying the malware family

Last June 27, there was a huge outbreak of a Petya-esque malware with WannaCry-style infector in the Ukraine. Since there is still confusion about how exactly this malware is linked to the original Petya, we have prepared this small guide on the background of the Petya family. The origin of Petya.....

6.7AI Score

2017-07-14 04:29 PM
205
Total number of security vulnerabilities1358