Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • Blog
  • Vulnerability
  • Page 2

Category: Vulnerability

Veeam Backup & Replication – CVE-2023-27532

Posted on March 23, 2023May 24, 2023 By topbento No Comments on Veeam Backup & Replication – CVE-2023-27532
News, Vulnerability

Veeam has recently disclosed a vulnerability which allows unauthenticated access to cleartext credentials. A bad actor would only require network access to exploit this vulnerability and it has been assigned a CVSS score of 7.5 HIGH. Versions before 12.0.0.1420 P20230223 and 11.0.1.1261 P20230227 are vulnerable. Leaked credentials are especially concerning in this case because they … Read More “Veeam Backup & Replication – CVE-2023-27532” »

KERNEL STACK BUFFER OVERFLOW in Linux – CVE-2023-0179

Posted on January 16, 2023May 28, 2023 By topbento No Comments on KERNEL STACK BUFFER OVERFLOW in Linux – CVE-2023-0179
News, Vulnerability

A buffer overflow vulnerability has been disclosed that could allow for local privilege escalation to root and leakage of stack and heap addresses. The CVSS score is 7.8 HIGH. A patch has been proposed and mitigation is available by disabling unprivileged user namespaces. This is another buffer overflow in nf_tables similar to the one we … Read More “KERNEL STACK BUFFER OVERFLOW in Linux – CVE-2023-0179” »

LINUX FIREWALL VULNERABILITY – CVE-2022-34918

Posted on July 20, 2022May 28, 2023 By topbento No Comments on LINUX FIREWALL VULNERABILITY – CVE-2022-34918
News, Vulnerability

A vulnerability in the Linux kernel was recently disclosed that could allow a bad actor with local access to escalate to root privileges. A bug in nft_elem_init leads to a buffer overflow and allows for access as root. The vulnerability has a CVSS score of 7.8 HIGH. A patch has been released by the Linux … Read More “LINUX FIREWALL VULNERABILITY – CVE-2022-34918” »

CERTIFRIED Active Directory DOMAIN PRIVILEGE ESCALATION – CVE-2022-26923

Posted on May 10, 2022May 28, 2023 By topbento No Comments on CERTIFRIED Active Directory DOMAIN PRIVILEGE ESCALATION – CVE-2022-26923
News, Vulnerability

A new privilege escalation vulnerability has been released for Active Directory. The vulnerability allows a low privileged user to escalate their privileges to Domain Administrator by abusing certificate based authentication. This vulnerability was patched as part of the May 2022 Microsoft Security Updates, so ensure you are up to date. Great writeup on the vulnerability … Read More “CERTIFRIED Active Directory DOMAIN PRIVILEGE ESCALATION – CVE-2022-26923” »

AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION

Posted on April 19, 2022May 26, 2023 By topbento No Comments on AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION
Cloud, News, Vulnerability

AWS released several hot patches to mitigate vulnerability to log4shell. Unfortunately Unit 42 at Palo Alto identified several severe vulnerabilities with their fixes, including container escape which is pretty much the holy grail of a cloud vulnerability. If you are not familiar, cloud infrastructure works by having a lot of hardware that is effectively “shared” … Read More “AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION” »

Google ISSUES SECOND UPDATE TO ADDRESS A ZERO-DAY VULNERABILITY in Google Chrome THIS YEAR – CVE-2022-1096

Posted on March 28, 2022May 24, 2023 By topbento No Comments on Google ISSUES SECOND UPDATE TO ADDRESS A ZERO-DAY VULNERABILITY in Google Chrome THIS YEAR – CVE-2022-1096
News, Vulnerability

Google is again issuing an update to address a zero-day vulnerability in Google Chrome since the beginning of this year. Type confusion could allow a bad actor to exploit heap corruption via a specially crafted HTML page. Currently this CVE is CVSS scored 8.8 HIGH. Google is acknowledging there is already an exploit in the … Read More “Google ISSUES SECOND UPDATE TO ADDRESS A ZERO-DAY VULNERABILITY in Google Chrome THIS YEAR – CVE-2022-1096” »

SEVERITY UPGRADE for Log4Shell CVE-2021-45046

Posted on December 17, 2021May 24, 2023 By topbento No Comments on SEVERITY UPGRADE for Log4Shell CVE-2021-45046
News, Vulnerability

Log4j appears to be the gift that keeps on giving. The severity score for the second Log4j vulnerability, CVE-2021-45046, has been upgraded from a CVSS score of 3.7 to 9.0. The fix for the original CVE-2021-44228 in Apache Log4j has been found to be incomplete allowing for Remote Code Execution in certain configurations. LunaSec blog … Read More “SEVERITY UPGRADE for Log4Shell CVE-2021-45046” »

REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749

Posted on September 21, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749
News, Vulnerability

fail2ban is very useful piece of software that stops brute forcing attacks on a variety of services. Knowing that fail2ban exists is serious source of frustration for me personally when I am completing a vulnerable machine or an exercise and the solution is “just brute force credentials using hydra and X wordlist.” In the back … Read More “REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749” »

REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021

Posted on August 23, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021
News, Vulnerability

As more and more people are working remotely virtual meeting apps like Zoom are becoming an essential part of many organizations. Although Zoom is no stranger to security issues, see CVE-2021-28133 and CVE-2021-30480, it is still widely in use. Personally I would recommend using an alternative like Teams or Webex, but to each their own. … Read More “REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021” »

PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675

Posted on July 1, 2021May 24, 2023 By topbento No Comments on PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675
News, Vulnerability

Exploit code is now available for CVE-2021-1675 allowing for Remote Code Execution. This vulnerability allows an unauthenticated bad actor to execute code as SYSTEM on vulnerable systems. Microsoft has released an advisory and patches are available here. There are reports that the patches alone are not sufficient at this time so you may want to … Read More “PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675” »

Posts navigation

Previous 1 2 3 Next

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown