Plus récents

Security flaw in allows leveraging GitHub Actions to bypass the required reviews mechanism and push unreviewed code to a protected branch, potentially allowing malicious code to be used by other users or flow down the pipeline to production

medium.com/cider-sec/bypassing

CVE-2021-33021 Cross-site scripting & improper input validation vulnerabilities still remain in xArrow's xArrow SCADA informatique

isssource.com/holes-remain-in-

On April 30th, 2021, WhiteHoodHacker rickrolled his high school district. Not just his school but the entirety of Township High School District 214. It's the second-largest high school district in Illinois, consisting of 6 different schools with over 11,000 enrolled students

whitehoodhacker.net/posts/2021

*I accidentally discovered a potential vulnerability in during a late night debugging session on a MP4 muxer

realkeyboardwarrior.github.io/

💥 CVE-2021-1594 A vulnerability in the REST API of Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack & elevate privileges to root

tools.cisco.com/security/cente

Des pirates exploitent une faille du système d'authentification à 2 facteurs et pillent l'argent de plus de 6.000 comptes sur

geeko.lesoir.be/2021/10/05/des

(CVE-2021-36260) +70 Hikvision camera & NVR models affected - vulnerability allow hackers to remotely take control of devices without any user interaction

watchfulip.github.io/2021/09/1

Analysis of Autodiscover, a protocol used to authenticate to Microsoft Exchange servers and to configure client access

guardicore.com/labs/autodiscov

(CVE-2021-3437) HP OMEN Gaming Hub (omen.com) A driver privilege-escalation « bug » gives attackers kernel-mode access to millions of PCs used for . HP put out a fix on Sept. 14, 2021.

sentinelone.com/labs/cve-2021-

silently install management agents on VMs, which now have RCE & LPE vulnerabilities ! « OMI is just one example of a secret agent that's pre-installed and silently deployed in cloud environments » ; « Thanks to the combination of a simple conditional statement coding mistake and an uninitialized auth struct, any request without an Authorization header has its privileges default to uid=0, gid=0, which is root »

wiz.io/blog/secret-agent-expos

Plus anciens