Category Archives: Advisories

chromium-129.0.6668.58-1.fc41

Read Time:22 Second

FEDORA-2024-b85d941d78

Packages in this update:

chromium-129.0.6668.58-1.fc41

Update description:

update to 129.0.6668.58

High CVE-2024-8904: Type Confusion in V8
Medium CVE-2024-8905: Inappropriate implementation in V8
Medium CVE-2024-8906: Incorrect security UI in Downloads
Medium CVE-2024-8907: Insufficient data validation in Omnibox
Low CVE-2024-8908: Inappropriate implementation in Autofill
Low CVE-2024-8909: Inappropriate implementation in UI

Read More

chromium-129.0.6668.58-1.el8

Read Time:22 Second

FEDORA-EPEL-2024-2cc55c9f93

Packages in this update:

chromium-129.0.6668.58-1.el8

Update description:

update to 129.0.6668.58

High CVE-2024-8904: Type Confusion in V8
Medium CVE-2024-8905: Inappropriate implementation in V8
Medium CVE-2024-8906: Incorrect security UI in Downloads
Medium CVE-2024-8907: Insufficient data validation in Omnibox
Low CVE-2024-8908: Inappropriate implementation in Autofill
Low CVE-2024-8909: Inappropriate implementation in UI

Read More

USN-7023-1: Git vulnerabilities

Read Time:58 Second

Maxime Escourbiac and Yassine Bengana discovered that Git incorrectly
handled some gettext machinery. An attacker could possibly use this issue
to allows the malicious placement of crafted messages. This issue was fixed
in Ubuntu 16.04 LTS. (CVE-2023-25815)

It was discovered that Git incorrectly handled certain submodules.
An attacker could possibly use this issue to execute arbitrary code.
This issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32002)

It was discovered that Git incorrectly handled certain cloned repositories.
An attacker could possibly use this issue to execute arbitrary code. This
issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32004, CVE-2024-32465)

It was discovered that Git incorrectly handled local clones with hardlinked
files/directories. An attacker could possibly use this issue to place a
specialized repository on their target’s local system. This issue was fixed
in Ubuntu 18.04 LTS. (CVE-2024-32020)

It was discovered that Git incorrectly handled certain symlinks. An
attacker could possibly use this issue to impact availability and
integrity creating hardlinked arbitrary files into users repository’s
objects/directory. This issue was fixed in Ubuntu 18.04 LTS.
(CVE-2024-32021)

Read More

Stored XSS in “Edit Profile” – htmlyv2.9.9

Read Time:24 Second

Posted by Andrey Stoykov on Sep 18

# Exploit Title: Stored XSS in “Edit Profile” – htmlyv2.9.9
# Date: 9/2024
# Exploit Author: Andrey Stoykov
# Version: 2.9.9
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2024/09/friday-fun-pentest-series-11-stored-xss.html

Stored XSS #1:

Steps to Reproduce:

1. Login as author
2. Browse to “Edit Profile”
3. In “Content” field add payload “><img src=x onerror=alert(1)>
4. Then…

Read More

Stored XSS in “Menu Editor” – htmlyv2.9.9

Read Time:24 Second

Posted by Andrey Stoykov on Sep 18

# Exploit Title: Stored XSS in “Menu Editor” – htmlyv2.9.9
# Date: 9/2024
# Exploit Author: Andrey Stoykov
# Version: 2.9.9
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2024/09/friday-fun-pentest-series-10-stored-xss.html

Stored XSS #1:

Steps to Reproduce:

1. Login as admin
2. Browse to “Menu Editor”
3. In “Name” field add payload “><img src=x onerror=alert(1)>
4. In…

Read More

Backdoor.Win32.BlackAngel.13 / Unauthenticated Remote Command Execution

Read Time:20 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/d1523df44da5fd40df92602b8ded59c8.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.BlackAngel.13
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 1850. Third party
adversaries who can reach an infected host can issue commands made
available by the backdoor….

Read More

Backdoor.Win32.CCInvader.10 / Authentication Bypass

Read Time:20 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/cb86af8daa35f6977c80814ec6e40d63.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.CCInvader.10
Vulnerability: Authentication Bypass
Description: The malware runs an FTP server. Third-party adversarys
who can reach infected systems can logon using any username/password
combination. Intruders may then upload…

Read More

Backdoor.Win32.Delf.yj / Information Disclosure

Read Time:21 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/f991c25f1f601cc8d14dca4737415238.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.Delf.yj
Vulnerability: Information Disclosure
Description: The malware listens on TCP port 8080. Third-party
adversaries who can reach an infected system, can download screen
captures of a victims machine by making a simple…

Read More