Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that's known to use a backdoor referred ...
Continue ReadingDecember 14, 2023
Summary The runTailscalePing method of the TailscalePing class injects the hostname parameter inside a shell command, leading to a command injection and the possibility to run arbitrary commands on th ...
Continue ReadingDecember 14, 2023
The remote Rocky Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:0285 advisory. An out of date library (libusrsctp) contained vulnera ...
Continue ReadingDecember 14, 2023
Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, the application uses WebSocket (with Socket.io), but it does not verify that the source of communication is valid. T ...
Continue ReadingDecember 14, 2023
Eclipse Jetty Canonical Repository =============================...Read More ...
Continue ReadingDecember 14, 2023
Summary The runTailscalePing method of the TailscalePing class injects the hostname parameter inside a shell command, leading to a command injection and the possibility to run arbitrary commands on th ...
Continue ReadingDecember 14, 2023
The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:0463 advisory. An out of date library (libusrsctp) contained vulnera ...
Continue ReadingDecember 14, 2023
During the past month, we have observed an increase in the number of malicious ads on Google searches for "Zoom", the popular piece of video conferencing software. Threat actors have ...
Continue ReadingDecember 14, 2023
Back to Main