This channel posts IT security related topics and especially alerts. Submissions over at @itsectalk welcome!
⚠️ httpoxy - a set of vulnerabilities that affect application code running in CGI, or CGI-like environments. (Severity: 🔸high) Further information: https://httpoxy.org/
#alert #vulnerability #severityhigh #httpproxy #cgi #web
Thanks Rel for reporting through https://infected.io/telegram-submission
⚠️ Microsoft Windows Printer/Print server 🖨 wateringhole vuln! Fix is available. (Severity: 🔸high) Further information: http://blog.vectranetworks.com/blog/microsoft-windows-printer-wateringhole-attack
#alert #vulnerability #severityhigh #microsoft #windows #printserver
Thanks to Rel who keeps reporting this good stuff via our submission form at https://infected.io/telegram-submission
PS. Forward this to your fellow windows sysadmin friends ✌️🏼
⚠️ Critical Adobe Flash vulnerability. Remote code execution possible, exploit kits can already abuse this according to Adobe. Adobe has just released the adobe security bulletin. Update is NOT out yet and estimated for 16 June. Advisory APSA16-03 & CVE CVE-2016-4171. CVSSv3 8.2. (severity: 🔸high) Further Information: http://yt.gl/apsa1603
#alert #vulnerability #severityhigh #adobe #flash
Came accross a new vulnerability? Just read about one? Submit it to https://infected.io/telegram-submission please.
⚠️ ImageMagick und GraphicsMagick strike AGAIN. Code execution through manipulated filenames. CVE-2016-5118 has been fixed already CVSSv2: 6.2. (severity: 🔸high) Further Information: http://yt.gl/imgmgck
#alert #severityhigh #vulnerability #php #imagemagick #graphicsmagick
If you want submit the next alert you come accross at https://infected.io/telegram-submission - we'll then let the other readers know!
⚠️ Cisco ASA (Software V 9+) is vulnerable to DOS when using IPsec VPN with certain parameters. CVSS 6.3. (severity: 🔸high) Further information: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-vpn
#alert #vulnerability #severityhigh #cisco #asa #vpn #idsearch
Forward to your sysadmin friends and colleagues 😬
⚠️ ImageMagick contains a serious Remote Code Execution Exploit! Please ensure to check CVE-2016–3714. Yes, that is that uploading a picture could lead to malicious code being executed! (severity: 🔸high) (I'm out of office, so no URL today guys, sorry!) #alert #vulnerability #severityhigh #imagemagick #php
Читать полностью…⚠️ Java 7 and Java 8 vulnerability opens your computer to attackers. Remote code execution. (severity: 🔸high) Please see http://yt.gl/java78v for further Information.
#alert #vulnerability #severityhigh #oracle #java #java7 #java8
⚠️ nss-utils contains a buffer overflow vulnerability. Rated CVSS 6.8. 💾 Updates are being released as we release these news. (severity: 🔸high) Further information: http://yt.gl/nssutilsheap
#alert #vulnerability #severityhigh #nssutils #linux
Thanks for the anonymous user reporting it via https://infected.io/telegram-submission - please also use this form if you have further information.
Your colleagues which don't have telegram can subscribe to our ✉️ E-Mail alerts: https://infected.io/e-mail-it-security-alerts
⚠️ OpenSSL "DROWN" Vulnerability (affecting SSLv2) released. (severity: 🔸high) Further Information: http://yt.gl/drownattack
#vulnerability #severityhigh #openssl
⏰ Release of OpenSSL patch 1.0.2g and 1.0.1s fixing several security defects with maximum severity is announced. (severity: 🔸high) Further Information: http://yt.gl/openssl16
#vulnerability #severityhigh #openssl
Thanks to reader patschi for the submission through https://infected.io/telegram-submission
⚠️ (Local/Physical access required) CVE-2016-2384: arbitrary code execution due to a double-free in the usb-midi linux kernel driver (severity: 🔹medium) Further information: http://yt.gl/usblinmid
#vulnerability #severitymedium #linux
Thanks to Andrey Konovalov @andreyknvl for the submission through https://infected.io/telegram-submission
🔕😭 If you got a Mvpower DVR... throw it in the trashcan right now! Usually this wouldn't get an announcement here - but this is just hilarious. Further Information: http://yt.gl/wum0y
#mvpower #dvr #rootshell
Thanks for your submission, anonymous reporter! (via https://infected.io/telegram-submission)
⚠️ All UBNT devices (except EdgeRouter) have the same key/cert for HTTPS (severity: 🔹medium) Further Information: https://www.shodan.io/report/MXTZWxf0
#severitymedium #ubiquiti #ubnt
Thanks to reddit user /u/mikermol for submitting this through https://infected.io/telegram-submission
⚠️ New critical security patch for Adobe Flash has been released. (severity: 🔸high) Further Information: Adobe Security Bulletin APSB16-04 -> http://yt.gl/rtz5t
#alert #vulnerability #update #severityhigh #adobe #adobeflash
⚠️ WordPress 4.4.2 has been released, containing 2 security fixes. (Further information at https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/) (severity: 🔸high) #wordpress #severityhigh #update
Читать полностью…⚠️ Cisco IOS and IOS XE Software Border Gateway Protocol Message Processing Denial of Service Vulnerability 🤔 Workarounds exist. (Severity: 🔹medium) Further Information: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160715-bgp
#alert #vulnerability #severitymedium #cisco #ios #bgp #router
📲 Forward this to your fellow network admins! 😜
⚠️ GoToMyPC got hacked and passwords compromised. Reset your passwords asap! Further information: http://status.gotomypc.com/incidents/s2k8h1xhzn4k
#alert #breach #gotomypc
Thanks to Rel for reporting through https://infected.io/telegram-submission - please forward this alert to your sysadmin buddies!
⚠️❓ Some time ago I reported that teamviewer accounts are being accessed. More and more users now report this throughout various platforms. ✉️ I suggest not using the permanent access features for now and making users aware that they should always close teamviewer when not using it. No breach has been confirmed by teamviewer yet.
Further information: http://arstechnica.com/security/2016/06/teamviewer-users-are-being-hacked-in-bulk-and-we-still-dont-know-how/
#alert #breach #teamviewer #unconfirmed
Thanks to WALK3R for sending it in as an alert. I wasn't sure if it's time for an alert yet, but you should be warned.
⚠️ Magento has a vulnerability allowing attackers to run php code via the SOAP and REST api 💣😱 CVSSv3 of 9.8! (Severity: 🔸high) more information: https://magento.com/security/patches/magento-206-security-update
#alert #severityhigh #vulnerability #magento
Remember you can report new vulnerabilities at https://infected.io/telegram-submission just like Jonas did with this one!
Know of anyone using magento? Better forward him this alert!
❓unconfirmed: you should keep an eye on teamviewer. There may have been an account compromise. Thread is at http://teamviewerforums.com/index.php?topic=3483.0 and if you search reddit and the Internet there is a high number of threads in the last month. Thanks to reader rel who reported to https://infected.io/telegram-submission
Читать полностью…⏰ BadLock - a new vulnerability in samba/windows(?) will be released tomorrow! (severity: 🔸high) Please check the official vulnerability homepage at http://badlock.org/ for pre-information.
#alert #vulnerability #severityhigh #badlock #samba #windows
⚠️ Adobe Flash Player update released fixing a critical vulnerability which could allow the attacker to take control of the system. (severity: 🔸high) Further Information: Adobe Security Bulletin - http://yt.gl/adsecb116
#alert #vulnerability #severityhigh #adobe #adobeflash #flash
⚠️ Mac OS X apps... "Transmission" contained a keylogger and popular apps (such as VLC, Coda, Sequel Pro, iTerm etc) are vulnerable to a remote code execution via MITM attack thanks to the third-party updating framework they are using. (severity: 🔸high) Further Information: http://yt.gl/macapps1
#vulnerability #severityhigh #macosx #apps #transmission #coda #iterm #vlc
Thanks to Rel for reporting these via https://infected.io/telegram-submission - remember that you can now tell your colleagues to subscribe to ✉️ E-Mail alerts: https://infected.io/e-mail-it-security-alerts - no spam, 100% alerts.
⚠️ Tricky spam – real message forward with passworded mail attachment. You probably want to warn your users of this new type of virus mails. Further Information: http://yt.gl/pwvirus
#virus #spam #mail
Also check our our new E-Mail alerting service (for colleagues which don't have Telegram!)
https://infected.io/e-mail-it-security-alerts
⚠️ PHP Crypto Trojan infects more and more servers. CTB-Locker crypts your webservers files. Watch out and update ✔️ your PHP applications/server software. Details are at http://yt.gl/cbtphp
#hacked #severityhigh #php #webserver #cbt #trojan
We also have a RSS feed at https://infected.io/feed
⚠️ Linux Mint ISOs from the 20th February 2016 were hacked and contain a backdoor. If you've downloaded ISOs on that date, please verify if you're affected or not. (severity: 🔸high) Further Information: http://yt.gl/mintha
#alert #hacked #severityhigh #linux #mint
⚠️ CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow vulnerability - potentially all linux OS affected. (severity: 🔸high) Further Information: http://yt.gl/20157547
#alert #vulnerability #severityhigh #linux #glibc
Thanks to the anonymous user reporting it via https://infected.io/telegram-submission
⚠️ Setting the date to 1 January 1970 will brick iPhone, iPad or iPod touch. **When connected to public Wi-Fi, iPhone calibrates its time settings with an NTP server.** Attackers can send malicious NTP requests to adjust every iPhone's time settings to January 1, 1970, hence brick every iPhone connected to the same network. Worldwide Apple Store are being made aware that disconnecting the battery and reconnecting fixes the issue. It should be common knowledge to all stores worldwide by tomorrow. (severity: 🔹medium) Further Information: http://yt.gl/bpoei
#alert #vulnerability #severitymedium #apple #iphone #ipad
Submitted through https://infected.io/telegram-submission
🔕 We're now tagging our messages so you can do active/passive alerting based on our channel. You can find more information about the tags on https://infected.io/it-security-alerts-telegram-channel
Help us grow and spread the word to your sysadmin/itsec friends - they'll for sure appreciate it!
#infectedio
⚠️ Chrome vulnerabilities allow for DOS attack. Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. (Further Info at https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1620) (severity: 🔸high) - This vulnerability was reported through https://infected.io/telegram-submission (Thanks for your submission!)
Читать полностью…