unix
-
This week the “Old Vintage Computing Research” blog published a 21,000-word exploration of the DEC PDP-11, the 16-bit minicomputer sold by Digital Equipment Corporation. Slashdot reader AndrewZX calls the blog post “an excellent deep dive” into the machine’s history and capabilities “and the classic Venix UNIX that it ran.” The blogger still owns a working…
-
A vulnerability has been found in PHP up to 4.3.10/5.0.3 on Unix and classified as critical. Affected by this vulnerability is the function safe_mode_exec_dir. The manipulation leads to memory corruption. This vulnerability is known as CVE-2004-1018. The attack can be launched remotely. Furthermore, there is an exploit available. It is recommended to upgrade the affected…
-
A vulnerability has been found in Mozilla Firefox up to 115.5 on Unix and classified as critical. This vulnerability affects unknown code. The manipulation leads to symlink following. This vulnerability was named CVE-2023-6857. An attack has to be approached locally. There is no exploit available. It is recommended to upgrade the affected component.
-
IBM has recently disclosed a security vulnerability (CVE-2024-37071) affecting its Db2 database software for Linux and UNIX platforms.
-
An automated scanner has been released to help security professionals scan environments for devices vulnerable to the Common Unix Printing System (CUPS) RCE flaw tracked as CVE-2024-47176.
-
It turns out that remote code execution is not the only way attackers can leverage a critical set of four vulnerabilities that a researcher recently disclosed in the Common Unix Printing System (CUPS) for managing printers and print jobs.
-
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.
-
Please fill out the form to read this article *** This is a Security Bloggers Network syndicated blog from ARMO authored by Amit Schendel. Read the original post at: https://www.armosec.io/blog/critical-vulnerabilities-common-unix-printing-system-cups/
-
Overview Recently, NSFOCUS CERT monitored the disclosure of the details of remote code execution vulnerabilities for Unix CUPS printing service on the Internet. When the system enables cups-browsed process listening (default port 631) to receive UDP packets, unauthenticated attackers induce victims to configure by constructing a malicious IPP server. When using the printing service, they…
-
Background Yesterday, September 26, after significant anticipation and dramatic drum rolling on social media, a series of vulnerabilities were disclosed in the Common Unix Printing Service (CUPS), a widely used printing utility found on many Linux distributions (specifically these ones, according to the original researcher’s writeup).
-
After much hyping and following prematurely leaked information by a third party, security researcher Simone Margaritelli has released details about four zero-day vulnerabilities in the Common UNIX Printing System (CUPS) that can be abused by remote, unauthenticated attackers to achieve code execution on vulnerable Linux and Unix-like sistems.
-
Last updated at Thu, 26 Sep 2024 22:48:34 GMT
-
Published in · 4 min read · Jan 27, 2024 Free version here In the realm of cybersecurity, tools like GTFOBins and LOLBAS have become indispensable for ethical hackers. This guide delves into the capabilities of these tools, emphasizing their role in Unix and Windows environments, respectively, and their synergy with multifunctional tools like Cyber…
-
Primarily found on Unix-like operating systems, the `cpio` command-line utility weaves a fundamental thread, enabling users to package and unpackage files within archive files. Esteemed for its versatility and support for multiple archive formats, `cpio` stands as a stalwart tool in the arsenal of system administrators and users alike. However, a recent discovery has pulled…
-
LinikatzV2 LinikatzV2 is a bash script based on the Linikatz tool developed by a time machine. It allows post-exploitation tasks on UNIX computers joined to Active Directory, using various methods for credential mining.
-
The Sleuth Kit is an open-source forensic toolkit for analyzing Microsoft and UNIX file systems and disks. The Sleuth Kit enables investigators to identify and recover evidence from images acquired during incident response or from live systems. The Sleuth Kit is an open source, which allows investigators to verify the actions of the tool or…
-
CVE-2023-39107 | NoMachine Free Edition Client/Enterprise Client up to 8.8.0 on macOS unix hard link
·
CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system. Current Exploit Price (≈) Our analysts are monitoring exploit markets and are…