Posted by Michael Coers on Feb 18
Exploit Title: Datarobot — Remote Code Execution
Date: 9/28/2021
Vendor Homepage: https://www.datarobot.com
Software Link: https://app.datarobot.com/
Version: TBD – awaiting build version from vendor
Tested on: The issue affects all versions of the product up to the date of this submission
Exploit Authors: Mike Coers & Pathfynder Inc
Exploit Contact: sm0key a t dnsfiltrate_io & micheal.coers a t pathfynder dot_io
Exploit Technique:…
More Stories
LSN-0093-1: Kernel Live Patch Security Notice
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations....
USN-5972-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a...
CVE-2018-25083
The pullit package before 1.4.0 for Node.js allows OS Command Injection because eval is used on an attacker-supplied Git branch...
USN-5954-2: Firefox regressions
USN-5954-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. We apologize for the...
jpegoptim-1.5.3-1.fc38
FEDORA-2023-ee0bc9afb6 Packages in this update: jpegoptim-1.5.3-1.fc38 Update description: v1.5.3 - fix potential heap-buffer-overflow (read) when using stdin/stdout and processing corrupt...
jpegoptim-1.5.3-1.el9
FEDORA-EPEL-2023-9391e7aeda Packages in this update: jpegoptim-1.5.3-1.el9 Update description: v1.5.3 - fix potential heap-buffer-overflow (read) when using stdin/stdout and processing corrupt...