With the rise of AI assistance features in an increasing number of products, we have begun to focus some of our research efforts on refining our internal detection and testing guidelines for LLMs by taking a brief look at the new AI integrations we discover. Alongside the rise of applications with LLM integrations, an increasing […]| Insinuator.net
X41 D-Sec GmbH Security Advisory: x41-2024-004-Medico Missing Transport Security for Medico Classic Application Server Connections Severity Rating: High Vector: MitM on local network CVE: Requested by vendor CWE: 319 CVSS Score: 7.1 CVSS Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N Affected Version: CGM Medico below 29.01.02.01 Patched Versions: CGM Medico 29.01.02.01 and above (according to vendor) Vendor: CGM Clinical Europe GmbH Vendor URL:https://www.cgm.com/deu...|
Niklas Abel and Luc Gommans of X41 discovered a Vulnerability in Medico| X41 D-Sec - Penetration Tests and Source Code Audits
SALT LAKE CITY, UT—The Utah Department of Commerce’s Division of Securities (Division) announced a modification to its guidance for registered ... Read More| blog.commerce.utah.gov
Institute for Digital Transformation Unveils Advisory✚ by the Institute| Institute for Digital Transformation
When President Trump came into office, one of his first actions was to sign an Executive Order seeking to end birthright citizenship (called Protecting the Meaning and Value of American Citizenship).| FordMurray Law
Want to review decks like you do Word documents? Discover how to review, accept or reject edits with UpSlide Track Changes in PowerPoint.| UpSlide
Fodor's provides expert travel content worth exploring so you can dream up your next trip. The world is a weird and wonderful place—we want to show you around.| Fodors Travel Guide
The X11 Window System has been used since September 1987 for Unix desktop systems, allowing applications to display their windows. Today, one of the server implementations of the protocol is the X.Org X server and XWayland, which both use the same codebase. While reviewing the X server, several legacy security issues were identified. These appear […]| Insinuator.net
X41 D-Sec GmbH Security Advisory: X41-2025-001 Multiple Vulnerabilities in OpenSlides Highest Severity Rating: Medium Confirmed Affected Versions: 4.2.4 Confirmed Patched Versions: 4.2.5 Vendor: Intevation GmbH Vendor URL:https://openslides.com/ Credit: X41 D-Sec GmbH, Eric Sesterhenn Status: Public Advisory-URL:https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides/ Summary and Impact X41 identified multiple bugs in OpenSlides, the most severe one being a XSS. Product Description The...|
The Public Company Accounting Oversight Board (PCAOB) plays a pivotal role in ensuring the integrity of financial reporting.| HRSS CPA
U.S. inflation showed signs of slowing, gold hits record high on Monday, fueling speculation that the Federal Reserve might reduce interest rates.| HRSS CPA
Discover the biggest Accounting and Advisory challenges this year - from incoherent branding to unused software investments.| UpSlide
“So we wait, this is our […]| hn security
Nonprofit Finance management brings stability to such organizations and ensures that they are serving their mission well.| HRSS CPA
Real estate accounting goes beyond basic bookkeeping, requiring specialized strategies to manage financial documents accurately and efficiently.| HRSS CPA
Accounting for startups is crucial because it gives entrepreneurs a clear view of their organization’s financial stats.| HRSS CPA
Healthcare finance management ensures efficient resource use to meet health demands, involving budgeting, risk, and financial reporting.| HRSS CPA
The latest edition of the Budget By Paycheck Workbook features new designs and updated worksheets, enhancing its usability and effectiveness.| HRSS CPA
USCIS is set to adjust its fee structure starting April 1, 2024, with exception to the Premium Processing Fee which is set to adjust slightly sooner on February 26, 2024| FordMurray Law
The Department of State announced that, beginning on January 29, 2024, and ending on April 1, 2024, certain...| FordMurray Law
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting
Arbitrary file creation| offsec.almond.consulting
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting
There are a myriad of reasons why institutions of education need to start thinking about these issues now but amongst the primary ones are| FordMurray Law
There are a myriad of reasons why institutions of education need to start thinking about these issues now but amongst the primary ones are| FordMurray Law
Description When Samsung Shannon baseband receives message IMMEDIATE ASSIGNMENT (9.1.18 in GSM/04.08) from network, the length of the Mobile Allocation IE (GSM/04.08 10.5.2.21) is not properly checked. Mobile allocation data is directly copied to a buffer on the stack without checking …| fred's notes
Description When Samsung Shannon baseband receives message GMM ATTACH ACCEPT (9.4.2 in TS 24.008) from network, the minimum length for MS Identity IE (10.5.1.4) is not properly checked. MS Identity (IEI 0x23) length is decremented without prior check. If this value is zero, a …| fred's notes
Description When Samsung Shannon baseband receives message P-TMSI REALLOCATION COMMAND (9.4.7 in TS 24.008) from network, the length of the Mobile Identity IE (10.5.1.4) is not properly checked. Mobile identity data is directly copied to a stack buffer without prior size check. This stack …| fred's notes
Prequel On October 21st 2015, mobile forensics company Cellebrite published a video that demonstrates how their solution can dump eMMC of Samsung Galaxy devices : This video strongly suggests that Samsung Galaxy bootloader can be exploited to execute arbitrary code. Summary Several bugs in Samsung Galaxy bootloader allow an attacker with …| fred's notes
Summary Qualcomm TrustZone is prone to an integer signedness bug that may allow to write NULL words to barely controllable locations in memory. The vulnerability can be triggered from Non-Secure World through the TrustZone call "tzbsp_smmu_fault_regs_dump". This issue has been discovered in Samsung Galaxy S5 firmware, but other devices can …| fred's notes
Summary DirectFB is prone to an out-of-bound write vulnerability since version 1.4.4. The vulnerability can be triggered remotely without authentication through Voodoo interface (network layer of DirectFB). Details An attacker can choose to overflow in the heap or the stack. CVSS Version 2 Metrics Access Vector: Network exploitable …| fred's notes
Summary DirectFB is prone to an integer signedness vulnerability since version 1.4.13. The vulnerability can be triggered remotely without authentication through Voodoo interface (network layer of DirectFB). Details This integer coercion error may lead to a stack overflow. CVSS Version 2 Metrics Access Vector: Network exploitable Access Complexity …| fred's notes
In January 2013, Rapid7 published a great paper describing several vulnerabilities in the most common UPnP libraries. Six months later, many devices based on these libraries have not been updated and are still exposed. For example, the Axis M1011 camera contains a vulnerable version of libupnp, which can lead to …| fred's notes
Huawei E587 3G Mobile Hotspot, version 11.203.27, is prone to two vulnerabilities in WebUI; an XSS and a command injection. The combination of both allows an attacker (with a little help from the victim) to remotely execute code on the device with root privileges, by sending a specifically …| fred's notes
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [CVE-2013-2612] Huawei E587 3G Mobile Hotspot Command Injection ________________________________________________________________________ Summary: Huawei E587 3G Mobile Hotspot, version 11.203.27, is prone to a command injection vulnerability in the Web UI. Successful exploitation allows unauthenticated attackers to execute arbitrary commands with root privileges. ________________________________________________________________________ Details …| fred's notes
Summary Foscam firmware <= 11.37.2.48 is prone to a path traversal vulnerability in the embedded web interface. The unauthenticated attacker can access to the entire filesystem and steal web & wifi credentials. Details GET //../proc/kcore HTTP/1.0 CVSS Version 2 Metrics Access Vector: Network exploitable Access Complexity …| fred's notes
Summary LemonLDAP-NG <=1.2.2 is prone to a security vulnerability involving XML signature wrapping in authentication process. Successful exploits may allow unauthenticated attackers to construct specially crafted messages that can be successfully verified and contain arbitrary content. This may lead to authentication bypass. Details Due to a bad use …| fred's notes
Black Bear Sighting in BRP| Black Run Preserve - Evesham Township, New Jersey