AnyDesk Public Exploit Disclosure – Arbitrary file write by symbolic link attack lead to denial-of-service attack on local machine

Read Time:24 Second

Posted by chan chan on Jun 27

Hi FullDisclosure,

I would like to publish an exploit that I found on AnyDesk as follows.

# Exploit Title: AnyDesk allow arbitrary file write by symbolic link
attack lead to denial-of-service attack on local machine
# Google Dork: [if applicable]
# Date: 24/5/2022
# Exploit Author: Erwin Chan
# Vendor Homepage: https://anydesk.com/en
# Software Link: https://anydesk.com/en
# Version: 7.0.9
# Tested on: Windows 11

It was found that AnyDesk…

Read More

SEC-T CFP ongoing

Read Time:27 Second

Posted by Mattias Bååth via Fulldisclosure on Jun 27

Hey all

It’s now less than two weeks to submit a talk to SEC-T 2022, at least if
you want to be part of the first talk selection round (recommended) that
we kick off July first.

SEC-T is non-profit, non-corporate, two day, single track, con in
Stockholm, Sweden. We pay travel, accommodation and an honorary to all
speakers.

If you have something fun you’d like to present, send us a submission
before July 1st… or at least before…

Read More

CFP No cON Name 2022 – Barcelona

Read Time:19 Second

Posted by Jose Nicolas Castellano via Fulldisclosure on Jun 27

No cON Name 2022 – Barcelona

************************************
*****  Call For Papers        ******
************************************

https://www.noconname.org/call-for-papers/

Exact place not disclosed until a few weeks before due celebration.

    * INTRODUCTION
The organization has  opened CFP proposals. No cON Name is the eldest
Hacking
and Security Conference in Span. Our goal is to get highly qualified
requests
for…

Read More

CVE-2017-20099

Read Time:11 Second

A vulnerability was found in Analytics Stats Counter Statistics Plugin 1.2.2.5 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.

Read More

CVE-2017-20098

Read Time:12 Second

A vulnerability was found in Admin Custom Login Plugin 2.4.5.2. It has been classified as problematic. Affected is an unknown function. The manipulation leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely.

Read More

Security startup Cerby debuts with platform to manage shadow IT

Read Time:27 Second

Security automation startup Cerby is exiting stealth mode with the public launch of a security platform designed to help companies deal with shadow IT—information technology products that are used by staff without prior approval or knowledge of IT decision makers.

Such products are either selected and onboarded by business units other than the IT department, and may not support industry standards like SAML (security assertion markup language) and SCIM (system for cross-domain identity management) for logging and exchanging identity data.

To read this article in full, please click here

Read More

CVE-2013-2216

Read Time:9 Second

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Read More