Lucene search

K

Medtronic N'vision Clinician Programmer Security Vulnerabilities

talosblog
talosblog

Developer account body snatchers pose risks to the software supply chain

Over the past several years, high-profile software supply chain attacks have increased in frequency. These attacks can be difficult to detect and source code repositories became a key focus of this research. Developer account takeovers present a substantial risk to the software supply chain...

AI Score

2022-10-04 12:51 PM
7
cvelist
cvelist

CVE-2022-3397 OMRON CX-Programmer Out-of-bounds Write

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary...

7.8CVSS

9.8AI Score

0.003EPSS

2022-10-04 12:00 AM
cvelist
cvelist

CVE-2022-3396 OMRON CX-Programmer Out-of-bounds Write

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary...

7.8CVSS

9.8AI Score

0.003EPSS

2022-10-04 12:00 AM
1
cisa
cisa

CISA Releases Five Industrial Control Systems Advisories

CISA has released five (5) Industrial Control Systems (ICS) advisories on October 04, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisory...

1.2AI Score

2022-10-04 12:00 AM
4
cvelist
cvelist

CVE-2022-3398 OMRON CX-Programmer Out-of-bounds Write

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary...

7.8CVSS

9.8AI Score

0.003EPSS

2022-10-04 12:00 AM
1
cve
cve

CVE-2005-4784

Multiple buffer overflows in the POSIX readdir_r function, as used in multiple packages, allow local users to cause a denial of service and possibly execute arbitrary code via (1) a symlink attack that exploits a race condition between opendir and pathcon calls and changes the filesystem to one...

7.6AI Score

0.001EPSS

2022-10-03 04:22 PM
19
cvelist
cvelist

CVE-2005-4784

Multiple buffer overflows in the POSIX readdir_r function, as used in multiple packages, allow local users to cause a denial of service and possibly execute arbitrary code via (1) a symlink attack that exploits a race condition between opendir and pathcon calls and changes the filesystem to one...

7.6AI Score

0.001EPSS

2022-10-03 04:22 PM
trellix
trellix

Open-Source Intelligence to Understand the Scope of N-Day Vulnerabilities

Open-Source Intelligence to Understand the Scope of N-Day Vulnerabilities By Charles McFarland · September 21, 2022 The zero-day is the holy grail for cybercriminals; However, N-day vulnerabilities can pose problems even years after discovery. If a target is vulnerable, it doesn’t matter whether...

7.5AI Score

0.027EPSS

2022-09-21 12:00 AM
11
trellix
trellix

Open-Source Intelligence to Understand the Scope of N-Day Vulnerabilities

Open-Source Intelligence to Understand the Scope of N-Day Vulnerabilities By Charles McFarland · September 21, 2022 The zero-day is the holy grail for cybercriminals; However, N-day vulnerabilities can pose problems even years after discovery. If a target is vulnerable, it doesn’t matter whether...

9.6AI Score

0.027EPSS

2022-09-21 12:00 AM
8
malwarebytes
malwarebytes

Explained: Fuzzing for security

Fuzzing, or fuzz testing, is defined as an automated software testing method that uses a wide range of invalid and unexpected data as input to find flaws in the software undergoing the test. The flaws do not necessarily have to be security vulnerabilities. Fuzzing can also bring other undesirable.....

-0.6AI Score

2022-09-15 12:00 PM
7
cve
cve

CVE-2022-2979

Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code...

7.8CVSS

7.8AI Score

0.001EPSS

2022-09-12 09:15 PM
21
4
prion
prion

Code injection

Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code...

7.8CVSS

7.8AI Score

0.001EPSS

2022-09-12 09:15 PM
10
rapid7blog
rapid7blog

25 Years of Nmap: Happy Scan-iversary!

I didn't know it then, but on September 1, 1997, my life changed. That was the day that Fyodor's Nmap was first released to the world, courtesy of the venerable Phrack magazine. (By the way, check out our recent podcast with Fyodor himself if you haven’t yet.) At the time, I had just started my...

-0.8AI Score

2022-09-01 02:30 PM
13
ics
ics

Omron CX-Programmer

EXECUTIVE SUMMARY CVSS v3 7,8 ATTENTION: Low attack complexity Vendor: Omron Equipment: CX-Programmer Vulnerability: Use After Free 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS...

7.8CVSS

8.3AI Score

0.001EPSS

2022-08-30 12:00 PM
19
cvelist
cvelist

CVE-2022-2979 Omron CX-Programmer

Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code...

7.8CVSS

8AI Score

0.001EPSS

2022-08-30 12:00 AM
1
cisa
cisa

CISA Releases 12 Industrial Control Systems Advisories

CISA has released 12 Industrial Control Systems (ICS) advisories on August 30, 2022. These advisories provides timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for...

AI Score

2022-08-29 12:00 AM
16
malwarebytes
malwarebytes

Twitter security under scrutiny after former executive turns whistleblower

A former Twitter executive has acted as a whistleblower and alleged some serious problems. Provided these accusations are true, the disclosure shows a side of Twitter that poses a threat to its own users' personal information, to company shareholders, to national security, and to democracy....

-0.6AI Score

2022-08-24 12:00 PM
8
zdi
zdi

Omron CX-One CX-Programmer CXP File Parsing Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CXP...

4.2AI Score

2022-08-23 12:00 AM
9
trellix
trellix

A Door Isn’t a Door When It’s Ajar - Part 2

A Door Isn’t a Door When It’s Ajar - Part II By Trellix · August 18, 2022 This story was also written by Steve Povolny and Sam Quinn Contents Introduction Software Hacking Software Hacking Shopping List Vulnerabilities Discovered CVE-2022-31479: Command injection via the web interface Vulnerable...

9.5AI Score

0.003EPSS

2022-08-18 12:00 AM
16
trellix
trellix

A Door Isn’t a Door When It’s Ajar - Part 2

A Door Isn’t a Door When It’s Ajar - Part II By Trellix · August 18, 2022 This story was also written by Steve Povolny and Sam Quinn Contents Introduction Software Hacking Software Hacking Shopping List Vulnerabilities Discovered CVE-2022-31479: Command injection via the web interface Vulnerable...

9AI Score

0.003EPSS

2022-08-18 12:00 AM
4
qualysblog
qualysblog

Qualys API Best Practices: CyberSecurity Asset Management API

The Qualys Security Blog’s API Best Practices Series is designed for Qualys customer programmers or stakeholders with a general knowledge of programming who want to implement best practices to improve development, design, and performance of their programs that use the Qualys API. For...

0.2AI Score

2022-08-05 05:09 PM
49
huntr
huntr

IDOR leads to delete messages in Message Center of others.

Description I observed that users can delete messages in other's Message Center by changing delete_id parameter to delete_id value of message which belongs to other. # Step: - Login with Physician account and determine delete_id[] of messages in Physician's Message Center - Login with Clinician...

1AI Score

2022-08-02 05:52 PM
8
mmpc
mmpc

Industrial systems: What it takes to secure and staff them

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager_ Brooke Lynn Weenig talks with Patrick C. Miller,...

-0.1AI Score

2022-07-28 04:00 PM
13
mssecure
mssecure

Industrial systems: What it takes to secure and staff them

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager_ Brooke Lynn Weenig talks with Patrick C. Miller,...

-0.1AI Score

2022-07-28 04:00 PM
14
cve
cve

CVE-2022-31204

Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This.....

7.5CVSS

8AI Score

0.001EPSS

2022-07-26 10:15 PM
48
3
prion
prion

Default credentials

Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This.....

7.5CVSS

8AI Score

0.001EPSS

2022-07-26 10:15 PM
8
thn
thn

Former CIA Engineer Convicted of Leaking 'Vault 7' Hacking Secrets to WikiLeaks

Joshua Schulte, a former programmer with the U.S. Central Intelligence Agency (CIA), has been found guilty of leaking a trove of classified hacking tools and exploits dubbed Vault 7 to WikiLeaks. The 33-year-old engineer had been charged in June 2018 with unauthorized disclosure of classified...

0.9AI Score

2022-07-14 03:06 PM
55
thn
thn

Why Developers Hate Changing Language Versions

Progress powers technology forward. But progress also has a cost: by adding new capabilities and features, the developer community is constantly adjusting the building blocks. That includes the fundamental languages used to code technology solutions. When the building blocks change, the code...

-0.5AI Score

2022-07-08 11:08 AM
18
malwarebytes
malwarebytes

5 pro-freedom technologies that could change the Internet

In the digital era, freedom is inextricably linked to privacy. After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. We have already lost a lot of control over who and what has access to our data, and there are further threats to...

-0.5AI Score

2022-07-04 12:01 PM
18
ics
ics

Omron SYSMAC CS/CJ/CP Series and NJ/NX Series

EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Omron Equipment: SYSMAC CS/CJ/CP Series and NJ/NX Series Vulnerabilities: Cleartext Transmission of Sensitive Information, Insufficient Verification of Data Authenticity, Plaintext Storage of a...

9.8CVSS

9.2AI Score

0.002EPSS

2022-06-28 12:00 PM
49
kitploit
kitploit

Sealighter - Easy ETW Tracing for Security Research

I created this project to help non-developers dive into researching Event Tracing for Windows (ETW) and Windows PreProcessor Tracing (WPP). Features Subscribe to multiple ETW and WPP Providers at once Automatically parse events into JSON without needing to know format Robust Event filtering...

-0.4AI Score

2022-06-26 09:30 PM
24
code423n4
code423n4

Unused Return

Lines of code https://github.com/code-423n4/2022-06-illuminate/blob/main/lender/Lender.sol#L221 https://github.com/code-423n4/2022-06-illuminate/blob/main/lender/Lender.sol#L229 https://github.com/code-423n4/2022-06-illuminate/blob/main/lender/Lender.sol#L416...

6.5AI Score

2022-06-26 12:00 AM
7
nessus
nessus

Omron SYSMAC CS/CJ/CP Series and NJ/NX Series Cleartext Transmission of Sensitive Information (CVE-2022-31204, CVE-2022-31207)

The device may be vulnerable to flaws related to OT:ICEFALL. These vulnerabilities identify the insecure-by-design nature of OT devices and may not have a clear remediation path. As such, Nessus is unable to test specifically for these vulnerabilities but has identified the device to be one that...

9.8CVSS

9.1AI Score

0.002EPSS

2022-06-22 12:00 AM
33
redhat
redhat

(RHSA-2022:5053) Important: log4j security update

Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): log4j: deserialization of untrusted data in SocketServer (CVE-2019-17571) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other...

1.4AI Score

0.794EPSS

2022-06-15 10:01 AM
138
hackerone
hackerone

Internet Bug Bounty: DoS via lua_read_body() [zhbug_httpd_94]

Greetings. I have found a bug that can crash httpd 2.4.53, causing a denial of service. The bug is that lua_read_body() (modules/lua/lua_request.c) uses the value of the Content-Length header to allocate memory. While ap_read_request() limits Content-Length's value to a non-negative |apr_off_t|...

7.5CVSS

8.5AI Score

0.032EPSS

2022-06-09 08:12 PM
52
githubexploit
githubexploit

Exploit for Code Injection in Vmware Identity Manager

CVE-2022-22954 PoC VMware Workspace ONE Access and Identity...

9.8CVSS

-0.1AI Score

0.974EPSS

2022-06-03 09:17 AM
247
githubexploit
githubexploit

Exploit for Code Injection in Vmware Identity Manager

CVE-2022-22954 PoC VMware Workspace ONE Access and Identity...

9.8CVSS

-0.1AI Score

0.974EPSS

2022-06-03 08:51 AM
224
githubexploit
githubexploit

Exploit for Code Injection in Vmware Identity Manager

CVE-2022-22954 PoC VMware Workspace ONE Access and Identity...

9.8CVSS

-0.1AI Score

0.974EPSS

2022-06-02 01:44 AM
247
githubexploit
githubexploit

Exploit for Code Injection in Vmware Identity Manager

CVE-2022-22954 PoC VMware Workspace ONE Access and Identity...

9.8CVSS

10AI Score

0.974EPSS

2022-06-01 07:33 PM
5
githubexploit
githubexploit

Exploit for Code Injection in Vmware Identity Manager

CVE-2022-22954 PoC VMware Workspace ONE Access and Identity...

9.8CVSS

0.3AI Score

0.974EPSS

2022-06-01 06:33 PM
224
thn
thn

New 'GoodWill' Ransomware Forces Victims to Donate Money and Clothes to the Poor

Cybersecurity researchers have disclosed a new ransomware strain called GoodWill that compels victims into donating for social causes and provide financial assistance to people in need. "The ransomware group propagates very unusual demands in exchange for the decryption key," researchers from...

0.9AI Score

2022-05-30 06:14 AM
9
mssecure
mssecure

Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices

In the last six months, we observed a 254% increase in activity from a Linux trojan called XorDdos. First discovered in 2014 by the research group MalwareMustDie, XorDdos was named after its denial-of-service-related activities on Linux endpoints and servers as well as its usage of XOR-based...

-0.5AI Score

2022-05-19 04:00 PM
24
mmpc
mmpc

Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices

In the last six months, we observed a 254% increase in activity from a Linux trojan called XorDdos. First discovered in 2014 by the research group MalwareMustDie, XorDdos was named after its denial-of-service-related activities on Linux endpoints and servers as well as its usage of XOR-based...

-0.5AI Score

2022-05-19 04:00 PM
24
github
github

Improper Input Validation Apache Commons Email

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......

7.5CVSS

2.8AI Score

0.001EPSS

2022-05-14 01:28 AM
9
osv
osv

Improper Input Validation Apache Commons Email

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......

7.5CVSS

2.8AI Score

0.001EPSS

2022-05-14 01:28 AM
4
hackerone
hackerone

Glovo: Integer overflow vulnerability

Summary: In one of my previous reports i send parameter tampering report vulnerability. Then you asked me to send PoC and you just closed it, that's why i'm sending you this new report with exactly name of vulnerability. Integer Overflows are closely related to other conditions that occur when...

7.3AI Score

2022-05-07 04:46 PM
27
kitploit
kitploit

DDexec - A Technique To Run Binaries Filelessly And Stealthily On Linux Using Dd To Replace The Shell With Another Process

In Linux in order to run a program it must exist as a file, it must be accessible in some way through the file system hierarchy (this is just how execve() works). This file may reside on disk or in ram (tmpfs, memfd) but you need a filepath. This has made very easy to control what is run on a...

-0.4AI Score

2022-04-25 12:30 PM
15
githubexploit
githubexploit

Exploit for Code Injection in Vmware Identity Manager

CVE-2022-22954 PoC VMware Workspace ONE Access and Identity...

9.8CVSS

0.3AI Score

0.974EPSS

2022-04-13 08:52 AM
281
rapid7blog
rapid7blog

7 Rapid Questions: Meet Adrian Stewart, Aspiring Pilot Turned Product Manager

Welcome back to 7 Rapid Questions, our blog series where we ask passionate leaders at Rapid7 how they’re challenging convention and making an impact. In this installment, we talk to Adrian Stewart, a product manager working on InsightAppSec, Rapid7’s dynamic application security testing (DAST)...

0.2AI Score

2022-04-08 02:28 PM
9
rapid7blog
rapid7blog

Lessons in IoT Hacking: How to Dead-Bug a BGA Flash Memory Chip

Dead-bugging — what is that, you ask? The concept comes from the idea that a memory chip, once it’s flipped over so you can attach wires to it, looks a little like a dead bug on its back. So why would we do this for the purposes of IoT hacking? The typical reason is if you want to extract the...

8.6CVSS

-0.5AI Score

0.01EPSS

2022-04-07 03:14 PM
14
Total number of security vulnerabilities1358