HackDig : Dig high-quality web security articles for hackers

P for Privacy – The Background Story of CVE-2020-9773

Affected Component: all iOS versions < 14.0 LSDIconCache Latest Vulnerable Version: iOS 13.7 Vendor: Apple, Inc. CVE: CVE-2020-9773 Disclosure Timeline Bug discovered: December 1st, 2019 Vendor notified: December 17th, 2019 First patch attempt: March 24th, 2020  Final patch released: September 15th, 2020 Summary A sandboxed application can circumvent upd
Publish At:2020-11-18 09:35 | Read:220 | Comments:0 | Tags:iOS Apple CVE

Understanding and mitigating CVE-2020-8563: vSphere credentials leak in the cloud-controller-manager log

While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8563) in Kubernetes that may cause sensitive data leakage. When creating a k8s cluster over vSphere, and enabling vSphere as a cloud provider with logging level set to 4 or above, the vSphere user credentials will be included in the cloud-controller-manager‘s log
Publish At:2020-10-16 11:06 | Read:500 | Comments:0 | Tags:Falco Kubernetes Sysdig Secure cve falco VSphere Cloud

c0ntextomy – Let’s Debug Together: CVE-2020-9992

Apple recently released the long awaited iOS/iPadOS 14.0 update alongside an updated Xcode 12.0. As part of this update, Apple fixed a vulnerability in the Development Tools, that was reported earlier this year as a joint effort by our Zimperium zLabs researcher and VP of Product Security Nikias Bassen, and an independent security researcher, Dany Lisiansky
Publish At:2020-09-30 10:41 | Read:473 | Comments:0 | Tags:iOS Apple CVE

The History of Common Vulnerabilities and Exposures (CVE)

During the late 1990s, security professionals were using information assurance tools in concert with vulnerability scanners to detect and remove vulnerabilities from the systems for which they are responsible.There’s just one problem – each security vendor has its own database with little to no crossover. Each vendor’s tool generates its own alert for detect
Publish At:2020-09-17 01:02 | Read:506 | Comments:0 | Tags:Featured Articles Vulnerability Management CVE Patch Managem

Cookie-nabbing app could have served users side helping of XSS

byDanny BradburyA popular GDPR compliance WordPress plugin vendor has patched a flaw that rendered both site visitors and admins vulnerable to cookie-stealing cross-site scripting (XSS) attacks.The GDPR Cookie Consent plugin, created by WebToffee, claims over 700,000 users. The plug-in is a notification app that begs you to accept cookies when you first visi
Publish At:2020-02-15 12:43 | Read:982 | Comments:0 | Tags:Security threats Cookie consent cookies cross-site scripting

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could lead to a directory traversal, allowing a malicious container to replace or create files on a user’s workstation. This vulnerability stemmed from an incomplete fix of a previously disclose
Publish At:2019-10-18 04:35 | Read:1656 | Comments:0 | Tags:Falco cve Detection Vulnerability

How to detect CVE-2019-14287 using Falco

A recent flaw, CVE-2019-14287, has been found in sudo. In this blogpost, we are going to show you how to use Falco or Sysdig Secure, to detect any exploit attempts against this vulnerability. sudo allows users to run commands with other user privileges. It is typically used to allow unprivileged users to execute commands as root. The issue exists in t
Publish At:2019-10-18 04:35 | Read:1247 | Comments:0 | Tags:Falco cve

No, CVE Details Did Not Just Prove Android Security Stinks!

It’s January again, and as usual, various media outlets are busy reporting on vulnerability statistics from the previous year. As usual, the CVE Details folks have worked up a lot of hype based on CVE counts, and once again, the media has taken the bait with sensational headlines about Google’s Android being the most vulnerable product of 2016. For context,
Publish At:2017-01-18 11:45 | Read:4809 | Comments:0 | Tags:Featured Articles Vulnerability Management CVE security vuln

CWEs vs CVEs – Identifying vs Responding to the Right Security Issues

For the third time in under a year, I’ve had to analyze a CVE against a third-party library I use that is related to CWE-502 De-serializing of Untrusted Data. In each case, the library maintainers have pushed back, correctly in my opinion, that the problem is not in the library itself but in the hosting application.Fortunately for me, my application is
Publish At:2016-11-29 03:20 | Read:5234 | Comments:0 | Tags:Featured Articles Security Awareness CVE CWE Exploit securit

CVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas Campaign

Microsoft’s Patch Tuesday for October fixed another previous zero-day vulnerability in Internet Explorer (IE) via MS16-118 and MS16-126: CVE-2016-3298. Before the lid was put on it, the security flaw was employed alongside CVE-2016-3351 by operators of the AdGholas malvertising campaign, analysis and disclosure of which were made with our collaboration with
Publish At:2016-11-19 12:05 | Read:5057 | Comments:0 | Tags:Exploits Vulnerabilities AdGholas CVE Internet Explorer malv

The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm Recorded Future have conducted an interesting study on the proof-of-concept exploits shared online (e.g. On Twitter, on forum linking to personal blogs, GitHub, or Pas
Publish At:2016-05-09 13:50 | Read:4528 | Comments:0 | Tags:Breaking News Hacking Security CVE PoC exploits threat intel

Mac OS X is the software with most vulnerabilities in 2015

According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of vulnerabilities in 2015. Which is the software with the greatest number of publicly disclosed vulnerabilities in 2015? You will be surprised to know that the software with the major number of vulnerabilities is the Apple Mac
Publish At:2016-01-04 15:50 | Read:4067 | Comments:0 | Tags:Hacking Security Breaking News Software vulnerabilities Mac

Red Hat CVE Database Revamp

Since 2009, Red Hat has provided details of vulnerabilities with CVE names as part of our mission to provide as much information around vulnerabilities that affect Red Hat products as possible.  These CVE pages distill information from a variety of sources to provide an overview of each flaw, including information like a description of the flaw, CVSSv2 score
Publish At:2015-10-22 13:25 | Read:4158 | Comments:0 | Tags:Red Hat Security CVE

VENOM, don’t get bitten.

CC BY-SA CrowdStrike QEMU is a generic and open source machine emulator and virtualizer and is incorporated in some Red Hat products as a foundation and hardware emulation layer for running virtual machines under the Xen and KVM hypervisors. CVE-2015-3456 (aka VENOM) is a security flaw in the QEMU’s Floppy Disk Controller (FDC) emulation. It can be exp
Publish At:2015-05-13 12:30 | Read:4281 | Comments:0 | Tags:Fedora Red Hat Enterprise Linux Vulnerabilities CVE CVE-2015

DBIR 2015: What Do Prince and Vulnerabilities Have In Common?

The Verizon 2015 Data Breach Investigations Report has always had a conversational, quirky style to share some pretty technical information about the security breach data it analyzes. So, if you’re wondering what Prince has to do with vulnerability management, just know that when you read the full report, you’ll understand – a lot of song titles are used to
Publish At:2015-04-17 01:05 | Read:6803 | Comments:0 | Tags:Featured Articles Security Awareness CVE DBIR Prince securit

Tools

Tag Cloud