Posted by Stefan Kanthak on Sep 28
Hi @ll,
<https://cwe.mitre.org/data/definitions/73.html >
CWE-73: External Control of File Name or Path
is a well-known and well-documented weakness.
<https://seclists.org/fulldisclosure/2020/Mar/48 > as well as
<https://skanthak.homepage.t-online.de/offender.html > demonstrate how to
(ab)use just one instance of this weakness (introduced about 7 years ago
with Microsoft Defender, so-called “security software”) due to…
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 28
SEC Consult Vulnerability Lab Security Advisory < 20240925-0 >
=======================================================================
title: Uninstall Password Bypass
product: BlackBerry CylanceOPTICS Windows Installer Package
vulnerable version: CylanceOPTICS <3.3 MR2
CylanceOPTICS <3.2 MR5
fixed version: CylanceOPTICS 3.3 MR2
CylanceOPTICS…
Posted by Patrick via Fulldisclosure on Sep 28
Document Title:
===============
Apple iOS 17.2.1 – Screen Time Passcode Retrieval (Mitigation Bypass)
Release Date:
=============
2024-09-24
Affected Product(s):
====================
Vendor: Apple Inc.
Product: Apple iOS 17.2.1 (possibly all < 18.0 excluding 18.0)
References:
====================
VIDEO PoC: https://www.youtube.com/watch?v=vVvk9TR7qMo
The vulnerability has been patched in the latest release of the operating
system (iOS…
Simone Margaritelli reported several vulnerabilities in cups-filters.
Missing validation of IPP attributes returned from an IPP server and
multiple bugs in the cups-browsed component can result in the execution
of arbitrary commands without authentication when a print job is
started.
https://security-tracker.debian.org/tracker/DSA-5778-1
Simone Margaritelli reported that cups, the Common UNIX Printing System,
does not properly sanitize IPP attributes when creating PPD files, which
may result in the execution of arbitrary code.
https://security-tracker.debian.org/tracker/DSA-5779-1
Posts navigation
News, Advisories and much more