![]() |
Description: miyako Claims to be Selling Access to an Unidentified SCADA Engineering & Design Firm in the USA
February 28th, 2025 (4 months ago)
|
![]() |
Description: Two denial of service vulnerabilities were found in ntpd-rs related to the handling of NTS cookies in our client functionality. Whenever an NTS source is configured and the server behind that source is sending zero-sized cookies or cookies larger than what would fit in our buffer size, ntpd-rs would crash. Only configured NTS sources can abuse these vulnerabilities. NTP sources or third parties that are not configured cannot make use of these vulnerabilities.
For zero-sized cookies: a division by zero would force an exit when the number of new cookies that would need to be requested is calculated. In ntpd-rs 1.5.0 a check was added to prevent the division by zero.
For large cookies: while trying to send a NTP request with the cookie included, the buffer is too small to handle the cookie and an exit of ntpd-rs is forced once a write to the buffer is attempted. The memory outside the buffer would not be written to in this case. In ntpd-rs 1.5.0 a check was added that prevents accepting cookies larger than 350 bytes.
Users of older versions of ntpd-rs are recommended to update to the latest version. If an update is impossible, it is recommended to only add NTS sources to ntpd-rs that are trusted to not abuse this bug.
References
https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-v83q-83hj-rw38
https://github.com/pendulum-project/ntpd-rs/commit/10a103b471dae25ac598140df0c195b6531bf716
https://github.com/pendulum-project/ntpd-rs/commit/37dd8d9a0faa03e7dfe3a4b...
February 28th, 2025 (4 months ago)
|
![]() |
Description: Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual abuse material (CSAM) generated using artificial intelligence (AI). [...]
February 28th, 2025 (4 months ago)
|
![]() |
Description: Security researchers have identified five vulnerabilities in the BioNTdrv.sys driver of Paragon Partition Manager, allowing attackers to escalate privileges or cause denial-of-service (DoS) attacks. Paragon Partition Manager, developed by Paragon Software, is a widely used disk partitioning tool available in Community and Commercial editions. It provides users with capabilities such as resizing, copying, and managing …
The post Paragon Partition Manager Flaws Leveraged in Ransomware Attacks appeared first on CyberInsider.
February 28th, 2025 (4 months ago)
|
CVE-2025-24843 |
Description: Insecure file retrieval process that facilitates potential for file manipulation to affect product stability and confidentiality, integrity, authenticity, and attestation of stored data.
CVSS: MEDIUM (5.1) EPSS Score: 0.02%
February 28th, 2025 (4 months ago)
|
CVE-2025-23405 |
Description: Unauthenticated log effects metrics gathering incident response efforts and potentially exposes risk of injection attacks (ex log injection).
CVSS: MEDIUM (5.3) EPSS Score: 0.04%
February 28th, 2025 (4 months ago)
|
CVE-2025-20060 |
Description: An attacker could expose cross-user personal identifiable information (PII) and personal health information transmitted to the Android device via the Dario Health application database.
CVSS: HIGH (7.5) EPSS Score: 0.09%
February 28th, 2025 (4 months ago)
|
CVE-2025-0985 |
Description: IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD
stores potentially sensitive information in environment variables that could be obtained by a local user.
CVSS: MEDIUM (5.5) EPSS Score: 0.02% SSVC Exploitation: none
February 28th, 2025 (4 months ago)
|
CVE-2024-54175 |
Description: IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD
could allow a local user to cause a denial of service due to an improper check for unusual or exceptional conditions.
CVSS: MEDIUM (5.5) EPSS Score: 0.01% SSVC Exploitation: none
February 28th, 2025 (4 months ago)
|
![]() |
Description: A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International.
"The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite," the international non-governmental
February 28th, 2025 (4 months ago)
|