Identifiez-vous pour voir le profil complet de MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Identifiez-vous pour voir le profil complet de MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Paris et périphérie
Identifiez-vous pour voir le profil complet de MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
540 abonnés
+ de 500 relations
Identifiez-vous pour voir le profil complet de MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Voir les relations en commun avec MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Voir les relations en commun avec MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Identifiez-vous pour voir le profil complet de MBO
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Expérience et formation
-
Société Générale
****** ***** *é*****é
-
*********
**î*** ** ****é******
-
****** ****
********** ***
-
*****-**
****** * (**) *é*****é / *û***é ** *''*********** *** ****è*** *************
-
-
*****
*** *** ****** ******* ***** ****
-
Voir toute l’expérience de MBO
Découvrez son poste, son ancienneté et plus encore.
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Licences et certifications
Cours
-
Developpement Web : HTML, CSS, Javascript, PHP
-
-
Panorama de la Sécurité - Modules CEH
-
Projets
-
Certificat OSCP
En cours d'obtention
-
Extraction de donnée via une API
-
Le programme consistait à automatiser la récupération de données sur un poste d'une victime, en passant par L'API d'un site internet (nom non-fourni par mesure de sécurité).
Langues
-
Anglais
Capacité professionnelle générale
-
Espagnol
Notions
-
Japonais
Notions
Voir le profil complet de MBO
-
Découvrir vos relations en commun
-
Être mis en relation
-
Contacter MBO directement
Autres profils similaires
-
Lionel B.
ToulouseSe connecter -
💻Anaël MURAT
Cybersecurity engineer; Bugbounty Hunter; Free-lance Pentester; Co-founder of profundis.io
Saint-HerblainSe connecter -
Tom BOYER
MeyreuilSe connecter -
clément Le gargam
Expert Cybersécurité
Chartres-de-BretagneSe connecter -
Magali B.
ToulonSe connecter -
Nesrine TRITAR
Paris et périphérieSe connecter -
Hervé Blatt
MalakoffSe connecter -
Pierrick Poignant
Architecte Cybersécurité Véhicule
Paris et périphérieSe connecter -
William FILIN
Ingénieur Cybersécurité at DATASGUARD
Boisville-la-Saint-PèreSe connecter -
Ilan HAZIZA
Paris et périphérieSe connecter -
Meryam Harraz
Fontenay-sous-BoisSe connecter -
Maxime Tournier
PalaiseauSe connecter -
Florian Perret
La CiotatSe connecter -
Clémence Roulin
Intégratrice Cyberdéfense
ToulouseSe connecter -
Alexis BLANC
Toulouse et périphérieSe connecter -
Cédric Le Roy
Ingénieur Cybersécurité chez GRID TELECOM
MarseilleSe connecter -
Emmanuel PIRE
Ingénieur Cybersécurité - Chargé de sécurité
Paris et périphérieSe connecter -
Sylvain Petillon
Product Security Engineer, Orange Cyberdefense (Orange Group).
Bretagne, FranceSe connecter -
Elliot This
LyonSe connecter -
Sébastien Massing
Consultant Cybersécurité chez C2S Bouygues
ToulouseSe connecter
Découvrir plus de posts
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-39391 - [Adobe InDesign 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-39391 - 🔥 Severity: High - 📉 CVSS Score: 7.8 - 🎯 Exploit Probability EPSS: 22.307 % - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 19/08/2024 01:44 UTC - 🖥️ Vulnerable Software: [Adobe InDesign, 18.5.2, ], [Adobe InDesign, 19.4, ] 🔍 EXPLANATION: InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 📈 TECHNICAL IMPACT: Attack Vector: Requires physical access to the device. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Does not need special privileges to be exploited. User Interaction: Requires the user to perform some action, like clicking a link. Scope: Does not spread to other systems Confidentiality: May reveal sensitive and critical information. Integrity: May modify or destroy important data. Availability: May cause the system to stop working completely. 🔗 STAY SAFE AND INFORMED #AdobeInDesign #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
2
-
Hernan Espinoza
CVE-2023-49606 - CVSS 9.8 - EPSS 0.09% - A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. Ref.1: https://lnkd.in/e7G3a3RW Ref.2: https://lnkd.in/ejAm7ekx
3
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-7717 - WP Events Manager 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-7717 - 🔥 Severity: High - 📉 CVSS Score: 8.8 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 31/08/2024 09:28 UTC - 🌐 References: https://lnkd.in/egbAXgGd https://lnkd.in/epbUEPns https://lnkd.in/eZpeGSWg - 🖥️ Vulnerable Software: WP Events Manager, <= 2.1.11, WordPress Plugin 🔍 EXPLANATION: The WP Events Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter in all versions up to, and including, 2.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. 📈 TECHNICAL IMPACT: Attack Vector: Network access, Internet. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Requires some limited privileges. User Interaction: No user interaction needed, can occur in the background. Scope: Does not spread to other systems Confidentiality: May reveal sensitive and critical information. Integrity: May modify or destroy important data. Availability: May cause the system to stop working completely. 🤖 Bot-generated post, gathering data from multiple sources and enhanced by AI. 📩 Contact: raul@vulns.space #WPEventsManager #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
-
Matthew Rosenquist
The telecommunications sector is being hacked by aggressive nation states (this time China's Salt Typhoon group). The National Security Agency, Cybersecurity and Infrastructure Security Agency, and Federal Bureau of Investigation (FBI) have jointly published an alert outlining good basic security principles for the communications sector. I emphasize basic, because telcos and all other critical infrastructure heavyweights should already be doing the basics! If the NSA, CISA, and FBI need to reiterate this information to telcos, it highlights a problem that many aren't consistently adhering to fundamental #cybersecurity practices which should have been in place for more than a decade!
25
2 commentaires -
vulns.space
🚨 SECURITY ALERT: CVE-2024-39392 - Adobe InDesign 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-39392 - 🔥 Severity: High - 📉 CVSS Score: 7.8 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 02/08/2024 07:28 UTC - 🖥️ Vulnerable Software: Adobe InDesign, ID20.1 Adobe InDesign 🔍 EXPLANATION AND MITIGATION: 1. Cause of the Vulnerability: InDesign has a flaw in its file parsing mechanism. When processing certain specially crafted files, InDesign can mishandle memory, leading to a buffer overflow condition. This overflow allows an attacker to execute arbitrary code on the victim's system. 2. Steps for Mitigation: 1. Update InDesign: - Install the latest version of InDesign ID20.1 or later from Adobe's website. 2. Restrict File Access: - Configure file permissions to prevent untrusted users from opening or modifying InDesign files. 3. Use a Firewall: - Enable a firewall to block unauthorized network connections that could exploit the vulnerability. 4. Disable JavaScript: - Disable JavaScript in InDesign to prevent malicious scripts from executing. 5. Use a Sandbox: - Run InDesign in a sandboxed environment to limit its access to system resources and prevent potential exploitation. 📈 TECHNICAL IMPACT: Attack Vector: Requires physical access to the device. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Does not need special privileges to be exploited. User Interaction: Requires the user to perform some action, like clicking a link. Scope: Does not spread to other systems Confidentiality: May reveal sensitive and critical information. Integrity: May modify or destroy important data. Availability: May cause the system to stop working completely. 🔗 STAY SAFE AND INFORMED #AdobeInDesign #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
-
Nima khodadad
Windows Zero-Day Exploited in the Wild: CVE-2024-38193 A critical use-after-free vulnerability in the afd.sys driver (CVSS 7.8) is being actively exploited by threat actors, including the Lazarus Group. This vulnerability allows privilege escalation, enabling attackers to execute arbitrary code and gain NT AUTHORITY\SYSTEM privileges. Key Details: Vulnerability: Race condition between AfdRioGetAndCacheBuffer() and AfdRioDereferenceBuffer() in Windows RIO. Exploit Process: 1. Heap Spraying: Preparing fake structures in memory. 2. Triggering the Vulnerability: Deregistering buffers mid-use to cause use-after-free. 3. Privilege Escalation: Gaining full system control by overwriting sensitive structures. Targeted Malware: Linked to FudModule, a sophisticated implant. Mitigation: Patch Now: The vulnerability was patched in August 2024 Patch Tuesday. Apply the update immediately to prevent exploitation. Monitor PoC Activity: A Proof-of-Concept (PoC) for CVE-2024-38193 is available on GitHub, increasing the threat level for unpatched systems. Zero-day vulnerabilities like this highlight the evolving sophistication of attackers. #CyberSecurity #WindowsZeroDay #CVE202438193 #VulnerabilityManagement #ThreatIntelligence https://lnkd.in/eXpHcJb7
1
-
API ThreatStats
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2024-4183 Mattermost versions 8.1.x before 8.1.12, 9.6.x before 9.6.1, 9.5.x before 9.5.3, 9.4.x before 9.4.5 fail to limit the number of active sessions, which allows an authenticated attacker to crash the server via repeated requests to the getSessions API after flooding the sessions table. CVSSv3.1 Base Score: 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #mattermost #devops #apisecurity #owasp https://lnkd.in/gfz7Cgvb
5
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-9538 - ShopLentor 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-9538 - 📅 Publication Date: 2024-10-11 13:15:19 UTC - 🛡️ MITRE Tactics and Techniques: Tactics: - Tactic Name: Privilege Management: This tactic focuses on managing the assignment and use of privileges on systems networks and applications. MITRE ATTCK ID: TA0012 - Tactic Name: Software and Data Integrity: This tactic focuses on verifying and ensuring the integrity of software and data. MITRE ATTCK ID: TA0006 Techniques: - Technique Name: Least Privilege: This technique involves minimizing user and process privileges to only those necessary to perform their assigned tasks. MITRE ATTCK ID: T1098 - Technique Name: User Access Review: Regularly review and audit user accounts and their associated privileges to ensure they are still necessary and appropriate. MITRE ATTCK ID: T1097 - Technique Name: Software Configuration: This technique involves configuring software and applications securely to prevent unauthorized access modification or disclosure of sensitive information. MITRE ATTCK ID: T1204 - Technique Name: Application Layer Protocol Validation: This technique involves validating data received via application layer protocols to prevent the exploitation of vulnerabilities. MITRE ATTCK ID: T1102 - 🌐 References: https://lnkd.in/eD_6Npw9 https://lnkd.in/eRdSJjyE #CVE #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation #ShopLentor
-
Riccardo Sirigu
📢 New Draft Guidance for NIS2 Compliance Released by ENISA & European Commission The European Union Agency for Cybersecurity (ENISA) and the European Commission have issued draft technical guidance to help EU Member States, DNS providers, TLD registries, cloud providers, data centers, CDNs, managed services, online platforms, and more to align with the #NIS2 cybersecurity requirements, following the latest Commission Implementing Regulation (EU) 2024/2690. What’s inside: 📌Practical Insights: Clear advice on interpreting technical requirements and navigating NIS2 concepts. 📌Compliance Evidence: Examples of documentation that can support compliance. 📌Standards Alignment: Tables matching NIS2 requirements with EU, international, and national standards for easier compliance. You’re invited to contribute with your feedback on this draft by December 9 2024. #Cybersecurity #ENISA #infosec
14
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-1737 - BIND 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-1737 - 🔥 Severity: High - 📉 CVSS Score: 7.5 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 24/07/2024 05:51 UTC - 🖥️ Vulnerable Software: BIND, 9.11.0 9.11.37, BIND, 9.16.0 9.16.50, BIND, 9.18.0 9.18.27, BIND, 9.19.0 9.19.24 🔍 EXPLANATION AND MITIGATION: 1. Cause of the Vulnerability: BIND, a popular DNS server software, has a flaw in its handling of large numbers of DNS records RRs for a single hostname. This can slow down the server's performance when adding or updating content or processing queries for that hostname. 2. Steps for Mitigation: - Update BIND: Upgrade to BIND version 9.11.38, 9.16.51, 9.18.28, or 9.19.25 or later, which includes a fix for this issue. - Use a newer version of BIND: If you cannot upgrade to the latest version, consider using a newer version of BIND 9.12 or later that does not have this vulnerability. - Limit the number of RRs: Reduce the number of RRs for a single hostname to a reasonable level. This can be done by using wildcards or by splitting the records into multiple zones. - Use a caching proxy: Implement a caching proxy server in front of BIND to reduce the load on the BIND server. - Disable recursion: Disable recursion in BIND to prevent it from forwarding queries to other DNS servers. This can improve performance but may also limit the functionality of your DNS server. 📈 TECHNICAL IMPACT: Attack Vector: Network access, Internet. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Does not need special privileges to be exploited. User Interaction: No user interaction needed, can occur in the background. Scope: Does not spread to other systems Confidentiality: Does not affect data confidentiality. Integrity: Does not affect data integrity. Availability: May cause the system to stop working completely. 🔗 STAY SAFE AND INFORMED #BIND #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-7415 - Remember Me Controls 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-7415 - 🔥 Severity: Medium - 📉 CVSS Score: 5.3 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 06/09/2024 04:30 UTC - 🌐 References: https://lnkd.in/e4Fef2dw https://lnkd.in/ef_p46me https://lnkd.in/ePCby7Xt - 🖥️ Vulnerable Software: Remember Me Controls, <= 2.0.1, WordPress Plugin 🔍 EXPLANATION: Cause: The Remember Me Controls plugin for WordPress, versions up to and including 2.0.1, allows direct access to its `bootstrap.php` file. This file has the PHP setting `display_errors` enabled. Impact: With `display_errors` enabled, the `bootstrap.php` file may expose the full server path of the WordPress application when an error occurs. This information, while not directly exploitable, can be leveraged by attackers to assist in other attacks against the website. 📈 TECHNICAL IMPACT: Attack Vector: Network access, Internet. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Does not need special privileges to be exploited. User Interaction: No user interaction needed, can occur in the background. Scope: Does not spread to other systems Confidentiality: May reveal limited information. Integrity: Does not affect data integrity. Availability: Does not affect system availability. 🤖 Bot-generated post, gathering data from multiple sources and enhanced by AI. 📩 Contact: raul@vulns.space #RememberMeControls #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-1596 - Ninja Forms 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-1596 - 🔥 Severity: High - 📉 CVSS Score: 7.2 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 07/09/2024 12:51 UTC - 🌐 References: https://lnkd.in/eSz62zNT https://lnkd.in/e-GtTV8U https://lnkd.in/eA2pWQcn - 🖥️ Vulnerable Software: Ninja Forms - File Uploads, <= 3.3.16, Wordpress Plugin 🔍 EXPLANATION: The Ninja Forms - File Uploads plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded file (e.g. RTX file) in all versions up to, and including, 3.3.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 📈 TECHNICAL IMPACT: Attack Vector: Network access, Internet. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Does not need special privileges to be exploited. User Interaction: No user interaction needed, can occur in the background. Scope: Can affect other connected systems. Confidentiality: May reveal limited information. Integrity: May modify data in a limited way. Availability: Does not affect system availability. 🤖 Bot-generated post, gathering data from multiple sources and enhanced by AI. 📩 Contact: raul@vulns.space #NinjaForms #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-33042 - CPE not yet published 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-33042 - 🔥 Severity: High - 📉 CVSS Score: 7.8 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 02/09/2024 12:54 UTC - 🌐 References: https://lnkd.in/eFVK8t6w - 🖥️ Vulnerable Software: CPE not yet published 🔍 EXPLANATION: Memory corruption when Alternative Frequency offset value is set to 255. 📈 TECHNICAL IMPACT: Attack Vector: Requires physical access to the device. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Requires some limited privileges. User Interaction: No user interaction needed, can occur in the background. Scope: Does not spread to other systems Confidentiality: May reveal sensitive and critical information. Integrity: May modify or destroy important data. Availability: May cause the system to stop working completely. 🤖 Bot-generated post, gathering data from multiple sources and enhanced by AI. 📩 Contact: raul@vulns.space #CPEnotyetpublished #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
1
-
Hernan Espinoza
CVE-2017-7938 - CVSS 9.8 - EPSS 1,24% - Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files. Ref.: https://lnkd.in/ea26bBra
1
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-8363 - Share This Image 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-8363 - 🔥 Severity: Medium - 📉 CVSS Score: 6.4 - 🎯 Exploit Probability EPSS: The EPSS for this CVE has not been published yet. - 📜 Status according to CISA: Not actively exploited vulnerability. - 🛠️ Exploit: No exploit on GitHub or ExploitDB. - 🛡️ IoCs: No IoCs associated - 📅 Publication Date: 05/09/2024 10:03 UTC - 🌐 References: https://lnkd.in/eq5ADVwH https://lnkd.in/essQiV4p https://lnkd.in/ejqxWNZF https://lnkd.in/eN9MdAvx - 🖥️ Vulnerable Software: Share This Image, <= 2.02, WordPress Plugin 🔍 EXPLANATION: The Share This Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's STI Buttons shortcode in all versions up to, and including, 2.02 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 📈 TECHNICAL IMPACT: Attack Vector: Network access, Internet. Attack Complexity: Easy to exploit, does not require special skills. Privileges Required: Requires some limited privileges. User Interaction: No user interaction needed, can occur in the background. Scope: Can affect other connected systems. Confidentiality: May reveal limited information. Integrity: May modify data in a limited way. Availability: Does not affect system availability. 🤖 Bot-generated post, gathering data from multiple sources and enhanced by AI. 📩 Contact: raul@vulns.space #ShareThisImage #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
-
vulns.space
🚨 SECURITY ALERT: CVE-2024-43557 🚨 📝 CVE DETAILS: - 🆔 Vulnerability: CVE-2024-43557 - 📅 Publication Date: 2024-10-08 18:15:22 UTC - 🛡️ MITRE Tactics and Techniques: Tactics: - Tactic Name: Prevent adversaries from exploiting vulnerabilities to gain initial access to the network. MITRE ATTCK ID: TA0001 - Tactic Name: Detect adversary activities and potential malicious events. MITRE ATTCK ID: TA0005 - Tactic Name: Contain incident effects and reduce the damage they cause. MITRE ATTCK ID: TA0008 Techniques: - Technique Name: Update software to the latest versions. MITRE ATTCK ID: T1015 - Technique Name: Disable unnecessary services to reduce the attack surface. MITRE ATTCK ID: T1056 - Technique Name: Employ network intrusion detection systems to identify and alert on suspicious network activity. MITRE ATTCK ID: T1040 - Technique Name: Implement system logging and monitoring to track system behavior and detect anomalies. MITRE ATTCK ID: T1041 - Technique Name: Utilize system recovery tools and backups to restore system functionality in case of a denial of service attack. MITRE ATTCK ID: T1061 - 🌐 References: https://lnkd.in/euhnunG4 #CVE #CyberSecurity #InfoSec #Vulnerability #TechNews #AI #Automation
1
-
CVE Find
[CVE-2024-21537: HIGH] Versions of the package lilconfig from 3.1.0 and before 3.1.1 are vulnerable to Arbitrary Code Execution due to the insecure usage of eval in the dynamicImport function. An attacker can exploit this vulnerability by passing a malicious input through the defaultLoaders function. https://lnkd.in/eppUhdhf