-
SecPod Cyber Bulletin 33rd Issue
1. Trellix Enterprise Security Manager Flaw
A security flaw (CVE-2023-38545) in Trellix Enterprise Security Manager has been discovered, potentially exposing sensitive enterprise data.
CVSS Score: 9.8
2. IBM Security Verify Vulnerabilities
IBM’s Security Verify platform has been found with vario...1. Trellix Enterprise Security Manager Flaw
A security flaw (CVE-2023-38545) in Trellix Enterprise Security Manager has been discovered, potentially exposing sensitive enterprise data.
CVSS Score: 9.8
2. IBM Security Verify Vulnerabilities
IBM’s Security Verify platform has been found with vario...
Started by: saanidhyadwivedi
in: Cyber Bulletin
- 1
- 1
-
saanidhyadwivedi
-
Easily Exploitable
Hi,
I need your help because, i not idea from Easily Exploitable and the porcent.
The calculation at the moment is not very good vrs my higieneHi,
I need your help because, i not idea from Easily Exploitable and the porcent.
The calculation at the moment is not very good vrs my higiene
Started by: yoyi24
in: General Discussions
- 2
- 2
-
Shreya
-
Integration with ticket systems
Does the service have any integration with some ticket systems?Does the service have any integration with some ticket systems?
Started by: Samhith
in: Ask an Expert
- 3
- 4
-
Shreya
-
Mac Updates
Having issues with Mac updates, OS and Adobe in general. Anyone else having issues? Adobe updates keep failing, Mac OS updates seem like they never update until I get on a computer and manually tell it to update or restart. Adobe just keep failing, I then have to manually open adobe go to Help, then...Having issues with Mac updates, OS and Adobe in general. Anyone else having issues? Adobe updates keep failing, Mac OS updates seem like they never update until I get on a computer and manually tell it to update or restart. Adobe just keep failing, I then have to manually open adobe go to Help, then...
Started by: SixAxis
in: Ask an Expert
- 2
- 2
-
Shreya
-
Macbook HostName
Best practice for Macbook hosts:
Scenarios: If your MacBook hostname is represented as an IP number other than a name, please ensure that you have set the Hostname, local Host Name, and ComputerName correctly.
You can use the below commands: You can run all three at a time
Note: Here I have taken ...Best practice for Macbook hosts:
Scenarios: If your MacBook hostname is represented as an IP number other than a name, please ensure that you have set the Hostname, local Host Name, and ComputerName correctly.
You can use the below commands: You can run all three at a time
Note: Here I have taken ...
Started by: lingaraj
in: Ask an Expert
- 2
- 2
-
Shreya
-
Patch repository creation for ubuntu 18,20,22 LTS
Ubuntu ClientSide
#!/bin/sh
log_file="/var/log/create_sources_list.log"
ip_address="192.168.2.50" # Replace with your desired IP address
protocol="https" # Replace with your desired protocol (http/https)
# Create a backup of the existing sources.list
mv /etc/apt/sources.list /etc/apt/sources.list...Ubuntu ClientSide
#!/bin/sh
log_file="/var/log/create_sources_list.log"
ip_address="192.168.2.50" # Replace with your desired IP address
protocol="https" # Replace with your desired protocol (http/https)
# Create a backup of the existing sources.list
mv /etc/apt/sources.list /etc/apt/sources.list...
Started by: Shreya
in: SanerScript
- 1
- 2
-
Shreya
-
Patch repository creation for RHEL 8 and 9
RHEL 8 and 9 ClientSide
#!/bin/bash
# Specify the values
ip_address="192.168.2.50"
protocol="https"
rhel_version="8"
# Generate the repository configuration dynamically
repo_filename="/etc/yum.repos.d/rhel${rhel_version}.repo"
cat <<EOL > "$repo_filename"
[RepoBaseOS]
name = rhel-${rhel_...RHEL 8 and 9 ClientSide
#!/bin/bash
# Specify the values
ip_address="192.168.2.50"
protocol="https"
rhel_version="8"
# Generate the repository configuration dynamically
repo_filename="/etc/yum.repos.d/rhel${rhel_version}.repo"
cat <<EOL > "$repo_filename"
[RepoBaseOS]
name = rhel-${rhel_...
Started by: Shreya
in: SanerScript
- 1
- 3
-
Shreya
-
SecPod Cyber Bulletin 32nd Issue
1. Windows Zero-Days and Firefox Issues
The RomCom group has been exploiting zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Windows and Firefox, emphasizing the need for continuous monitoring and timely updates.
CVSS Score: 9.8,8.8
2. Critical Flaw Detected in ProjectSend
A criti...1. Windows Zero-Days and Firefox Issues
The RomCom group has been exploiting zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Windows and Firefox, emphasizing the need for continuous monitoring and timely updates.
CVSS Score: 9.8,8.8
2. Critical Flaw Detected in ProjectSend
A criti...
Started by: saanidhyadwivedi
in: Cyber Bulletin
- 1
- 1
-
saanidhyadwivedi
-
CVE-2024-45710 : SolarWinds Uncontrolled Path Element Escalation Vulnerability
SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low-privilege account and local access to the affected node machine.
CVSS SCORE: 7.8 (HIGH)SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low-privilege account and local access to the affected node machine.
CVSS SCORE: 7.8 (HIGH)
Started by: saanidhyadwivedi
in: Critical Vulnerability and Exploit Exchange
- 1
- 1
-
saanidhyadwivedi
-
CVE-2024-9486 : Kubernetes Image Builder Security Vulnerability
Some Kubernetes Image Builder versions have a security vulnerability where default credentials remain active, potentially allowing root access in clusters using VM images from the Proxmox provider.
CVSS SCORE : 9.8 (Critical)Some Kubernetes Image Builder versions have a security vulnerability where default credentials remain active, potentially allowing root access in clusters using VM images from the Proxmox provider.
CVSS SCORE : 9.8 (Critical)
Started by: saanidhyadwivedi
in: Critical Vulnerability and Exploit Exchange
- 1
- 1
-
saanidhyadwivedi
-
Patch repository creation for RHEL 7
RHEL_7 ClientSide
#!/bin/bash
# Specify the values
ip_address="192.168.2.60"
protocol="https"
rhel_version="7"
# Generate the repository configuration dynamically
repo_filename="/etc/yum.repos.d/rhel${rhel_version}_custom.repo"
cat <<EOL > "$repo_filename"
[RepoMainrepo]
name = rhel-${rh...RHEL_7 ClientSide
#!/bin/bash
# Specify the values
ip_address="192.168.2.60"
protocol="https"
rhel_version="7"
# Generate the repository configuration dynamically
repo_filename="/etc/yum.repos.d/rhel${rhel_version}_custom.repo"
cat <<EOL > "$repo_filename"
[RepoMainrepo]
name = rhel-${rh...
Started by: Shreya
in: SanerScript
- 1
- 2
-
Shreya
-
CVE-2024-52799 : Argo Workflow Charts Vulnerability
Prior to Argo Workflows 0.44.0, the workflow-role granted excessive privileges, including pod/exec creation, enabling arbitrary code execution. This vulnerability was fixed in version 0.44.0, affecting Helm Chart users.
CVSS SCORE: 8.3Prior to Argo Workflows 0.44.0, the workflow-role granted excessive privileges, including pod/exec creation, enabling arbitrary code execution. This vulnerability was fixed in version 0.44.0, affecting Helm Chart users.
CVSS SCORE: 8.3
Started by: saanidhyadwivedi
in: Critical Vulnerability and Exploit Exchange
- 1
- 1
-
saanidhyadwivedi
-
CVE-2024-53912 : Veritas Enterprise Vault Vulnerability
A #vulnerability in Veritas Enterprise Vault (before 15.2), ZDI-CAN-24341, allows remote attackers to execute arbitrary code via deserialization of untrusted data on a .NET Remoting TCP port.
CVSS SCORE: 9.8(CRITICAL)A #vulnerability in Veritas Enterprise Vault (before 15.2), ZDI-CAN-24341, allows remote attackers to execute arbitrary code via deserialization of untrusted data on a .NET Remoting TCP port.
CVSS SCORE: 9.8(CRITICAL)
Started by: saanidhyadwivedi
in: Critical Vulnerability and Exploit Exchange
- 1
- 1
-
saanidhyadwivedi
-
CVE-2024-53674 : HPE Insight Remote Support Vulnerability
An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases.
CVSS SCORE: 7.3 (HIGH)An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases.
CVSS SCORE: 7.3 (HIGH)
Started by: saanidhyadwivedi
in: Critical Vulnerability and Exploit Exchange
- 1
- 1
-
saanidhyadwivedi
-
CVE-2024-11789 : Fuji Electric Vulnerability
The Fuji Electric Monitouch V-SFT V10 contains a stack-based buffer overflow #vulnerability (ZDI-CAN-24448) in the parsing of V10 files, allowing remote code execution.
CVSS SCORE: 7.8 (HIGH)The Fuji Electric Monitouch V-SFT V10 contains a stack-based buffer overflow #vulnerability (ZDI-CAN-24448) in the parsing of V10 files, allowing remote code execution.
CVSS SCORE: 7.8 (HIGH)
Started by: saanidhyadwivedi
in: Critical Vulnerability and Exploit Exchange
- 1
- 1
-
saanidhyadwivedi