dice.camp is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon server for RPG folks to hang out and talk. Not owned by a billionaire.

Administered by:

Server stats:

1.5K
active users

#remotecodeexecution

0 posts0 participants0 posts today
OTX Bot<p>China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) Vulnerability</p><p>A critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM) is being actively exploited by a China-nexus threat actor, UNC5221. The exploitation targets internet-facing EPMM deployments across various sectors including healthcare, telecommunications, and government. The attackers utilize unauthenticated remote code execution to gain initial access, followed by the deployment of KrustyLoader malware for persistence. They leverage hardcoded MySQL credentials to exfiltrate sensitive data from the EPMM database. The threat actor also uses the Fast Reverse Proxy (FRP) tool for network reconnaissance and lateral movement. The compromised systems span multiple countries in Europe, North America, and Asia-Pacific, indicating a global espionage campaign likely aligned with Chinese state interests.</p><p>Pulse ID: 682e5bbc1075b03f94642762<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/682e5bbc1075b03f94642762" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/682e5</span><span class="invisible">bbc1075b03f94642762</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-05-21 23:03:24</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Asia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Asia</span></a> <a href="https://social.raytec.co/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://social.raytec.co/tags/Chinese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinese</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Endpoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Endpoint</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://social.raytec.co/tags/FastReverseProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FastReverseProxy</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/Healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Healthcare</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/MySQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MySQL</span></a> <a href="https://social.raytec.co/tags/NorthAmerica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthAmerica</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxy</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://social.raytec.co/tags/ReverseProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseProxy</span></a> <a href="https://social.raytec.co/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://social.raytec.co/tags/SQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQL</span></a> <a href="https://social.raytec.co/tags/Telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telecom</span></a> <a href="https://social.raytec.co/tags/Telecommunication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telecommunication</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
LavX News<p>Critical SonicWall VPN Vulnerabilities Demand Immediate Action from Admins</p><p>SonicWall has issued an urgent call for administrators to patch three significant vulnerabilities in its Secure Mobile Access (SMA) appliances. These flaws, which allow for remote code execution, have...</p><p><a href="https://news.lavx.hu/article/critical-sonicwall-vpn-vulnerabilities-demand-immediate-action-from-admins" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/critical-</span><span class="invisible">sonicwall-vpn-vulnerabilities-demand-immediate-action-from-admins</span></a></p><p><a href="https://ioc.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://ioc.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://ioc.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://ioc.exchange/tags/SonicWall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SonicWall</span></a> <a href="https://ioc.exchange/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a></p>
OTX Bot<p>Unmasking the new persistent attacks on Japan</p><p>An unknown attacker has been targeting organizations in Japan since January 2025, exploiting CVE-2024-4577, a remote code execution vulnerability in PHP-CGI on Windows. The attacker uses the Cobalt Strike kit 'TaoWu' for post-exploitation activities, including reconnaissance, privilege escalation, persistence establishment, and credential theft. Targeted sectors include technology, telecommunications, entertainment, education, and e-commerce. The attack involves exploiting the vulnerability, executing PowerShell scripts, and using various tools for system compromise. The attacker's techniques are similar to those of the 'Dark Cloud Shield' group, but attribution remains uncertain. A pre-configured installer script found on the C2 server deploys multiple adversarial tools and frameworks, indicating potential for future attacks.</p><p>Pulse ID: 67c9f6c4232a8b4665784c45<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67c9f6c4232a8b4665784c45" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67c9f</span><span class="invisible">6c4232a8b4665784c45</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-06 19:25:56</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a> <a href="https://social.raytec.co/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Education</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Japan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Japan</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://social.raytec.co/tags/Telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telecom</span></a> <a href="https://social.raytec.co/tags/Telecommunication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telecommunication</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Further insights into Ivanti CSA 4.6 vulnerabilities exploitation</p><p>This analysis examines the exploitation of critical vulnerabilities in Ivanti Cloud Service Appliance (CSA) 4.6 between October 2024 and January 2025. It confirms widespread exploitation leading to webshell deployments in September and October 2024. The report provides details on malicious activities conducted within a targeted organization in September 2024 after compromising an Ivanti CSA device. A cluster of associated implants and infrastructure is identified. A root cause analysis of CVE-2024-8963 reveals it stems from URL parsing issues in Ivanti's proprietary web server and PHP CGI configuration. The vulnerability allowed unauthenticated remote code execution. Various webshell variants deployed by attackers are described. Over 1,100 vulnerable Ivanti CSA devices were found online, with webshells on nearly half of them.</p><p>Pulse ID: 67aad6551764d380d0f060a8<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67aad6551764d380d0f060a8" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67aad</span><span class="invisible">6551764d380d0f060a8</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-02-11 04:47:17</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
Magda♪enaBerlin 💚 🦥 💚<p>Die Ergebnisse der nachtkritik.de-Umfrage zum Theatertreffen 2025 sind da... </p><p>Aus Berlin sind unter den ersten Zehn gelandet: </p><p>Ja nichts ist ok von René Pollesch und Fabian Hinrichs<br>Regie: René Pollesch und Fabian Hinrichs<br><a href="https://troet.cafe/tags/Volksb%C3%BChne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Volksbühne</span></a> Berlin</p><p>RCE <a href="https://troet.cafe/tags/Remotecodeexecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Remotecodeexecution</span></a> von <span class="h-card" translate="no"><a href="https://digitalcourage.social/@SibylleBerg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SibylleBerg</span></a></span><br>Regie: Kay Voges <br><span class="h-card" translate="no"><a href="https://mastodon.art/@blnensemble" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>blnensemble</span></a></span></p><p>Alle Ergebnisse gibt es hier:<br>👇 <br><a href="https://nachtkritik.de/interview2/nachtkritik-theatertreffen/nachtkritik-theatertreffen-2025#begruendung-der-nominierung-9" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nachtkritik.de/interview2/nach</span><span class="invisible">tkritik-theatertreffen/nachtkritik-theatertreffen-2025#begruendung-der-nominierung-9</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Apache" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apache</span></a> fixes <a href="https://hachyderm.io/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remotecodeexecution</span></a> bypass in <a href="https://hachyderm.io/tags/Tomcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tomcat</span></a> <a href="https://hachyderm.io/tags/webserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webserver</span></a><br>Apache Tomcat is an open-source web server and servlet container widely used to deploy and run Java-based web applications. It provides a runtime environment for Java Servlets, JavaServer Pages (JSP), and Java WebSocket technologies. <a href="https://www.bleepingcomputer.com/news/security/apache-fixes-remote-code-execution-bypass-in-tomcat-web-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/apache-fixes-remote-code-execution-bypass-in-tomcat-web-server/</span></a></p>
Ralf Stockmann<p>Solange es noch geht: Kultur in <a href="https://chaos.social/tags/Berlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Berlin</span></a> von der wunderbaren <span class="h-card" translate="no"><a href="https://digitalcourage.social/@SibylleBerg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SibylleBerg</span></a></span> <a href="https://chaos.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://chaos.social/tags/berlinistkultur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>berlinistkultur</span></a></p>
Katzenfritze (Weresnail)<p>82 Prozent der Menschen würden sich immer dafür entscheiden, einen Menschen zu töten, um viele zu retten. Sie gehen davon aus, dass sie nicht der eine Mensch sind.</p><p>Berg, Sibylle. RCE: <a href="https://troet.cafe/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a>. Roman (S.491). Kiepenheuer &amp; Witsch eBook. Kindle-Version.</p>
ITSEC News<p>Vulnerability in Tencent WeChat custom browser could lead to remote code execution - Certain versions of WeChat, a popular messaging app created by tech giant Tencent, contai... <a href="https://blog.talosintelligence.com/vulnerability-in-tencent-wechat-custom-browser-could-lead-to-remote-code-execution/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.talosintelligence.com/vul</span><span class="invisible">nerability-in-tencent-wechat-custom-browser-could-lead-to-remote-code-execution/</span></a> <a href="https://schleuss.online/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
IT News<p>Getting Root on Cheap WiFi Repeaters, the Long Way Around - What can you do with a cheap Linux machine with limited flash and only a single fr... - <a href="https://hackaday.com/2024/09/05/getting-root-on-cheap-wifi-repeaters-the-long-way-around/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2024/09/05/gettin</span><span class="invisible">g-root-on-cheap-wifi-repeaters-the-long-way-around/</span></a> <a href="https://schleuss.online/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/networkhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkhacks</span></a> <a href="https://schleuss.online/tags/wifirepeater" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wifirepeater</span></a> <a href="https://schleuss.online/tags/openwrt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openwrt</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://schleuss.online/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a> <a href="https://schleuss.online/tags/uart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uart</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://schleuss.online/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> <a href="https://schleuss.online/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a></p>
Stefan Müller :verified:<p><span class="h-card" translate="no"><a href="https://fedifreu.de/@chpietsch" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>chpietsch</span></a></span> Das ist mir sehr klar. Mein Tröt ist auch eher sarkastisch.</p><p>Mir ist auch sehr klar, was man mit großen Datenmengen anfangen kann. Es gruselt mich.</p><p><a href="https://climatejustice.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> ist für mich nicht so deprimierend wie für einige meiner Freunde und Bekannten, weil mir vieles schon klar war, aber es ist so schön und liebevoll ausgearbeitet. Alles sollten es lesen. Egal aus welcher Ecke sie kommen: digitale Rechte/Selbstbestimmung, Freiheit, Bürgerrechte, Ökos, Klimas. Was dort gezeigt wird, ist eine mögliche Welt. Es ist nicht ausgeschlossen, dass wir genau da landen werden.</p>
Stefan Müller :verified:<p>Na, lest Ihr auch gerade <a href="https://climatejustice.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a>? Habt Ihr auch den Lesefortschritt in der Cloud? Das ist so bequem, da kann man dann einfach auf eine anderes Gerät wechseln und weiß sofort, wo man gerade war.</p><p>Hattet Ihr auch der Reader-App alle Rechte eingeräumt, die sie gern haben wollte? Nutzung der Kamera? Wozu eigentlich? Egal.</p><p>So kann die App Eure Augenbewegungen tracken und Aufmerksamkeitslevel bestimmen. Ist ganz praktisch für die Einstufung der Persönlichkeit. Kann man sicher für irgendwas verwenden.</p><p>Ich bin da viel vorsichtiger: Kein Lesefortschritt auf Plattformen gespeichert. Möglichst wenig Rechte für Apps.</p><p>Dafür führe ich hier öffentlich Tagebuch. Tja.</p>
Stefan Müller :verified:<p>66/ Ich hatte ja behauptet, dass ich viel Phantasie habe und alles Schlimme immer kommen sehe, aber so könnte es natürlich auch kommen: Alle sind so verarmt, dass keiner mehr Urlaub machen kann. Das würde auch die Sache mit den <a href="https://climatejustice.social/tags/Flugreisen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flugreisen</span></a> lösen. Dass ich darauf nicht früher gekommen bin. 🤦🏻‍♂️ </p><p><a href="https://climatejustice.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> </p><p><a href="https://climatejustice.social/tags/CumExGesch%C3%A4fte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CumExGeschäfte</span></a> <a href="https://climatejustice.social/tags/CumExSkandal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CumExSkandal</span></a> </p><p><a href="https://climatejustice.social/tags/FliegenT%C3%B6tet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FliegenTötet</span></a> <a href="https://climatejustice.social/tags/Flugscham" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flugscham</span></a> <a href="https://climatejustice.social/tags/tazscham" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tazscham</span></a> <br><a href="https://climatejustice.social/tags/hunniesForFuture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hunniesForFuture</span></a> <br><a href="https://climatejustice.social/tags/tazReisen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tazReisen</span></a> <a href="https://climatejustice.social/tags/fliegenT%C3%B6tet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fliegenTötet</span></a> <a href="https://climatejustice.social/tags/stayGrounded" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stayGrounded</span></a> <a href="https://climatejustice.social/tags/amBodenBleiben" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amBodenBleiben</span></a><br><a href="https://climatejustice.social/tags/Heuchelei" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Heuchelei</span></a> <br><a href="https://climatejustice.social/tags/Presse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Presse</span></a> <a href="https://climatejustice.social/tags/Medien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Medien</span></a> <a href="https://climatejustice.social/tags/taz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>taz</span></a></p>
IT News<p>PHP vulnerability allows attackers to run malicious code on Windows servers - Enlarge </p><p>A critical vulnerability in the PHP programming langu... - <a href="https://arstechnica.com/?p=2029943" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2029943</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/php" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>php</span></a></p>
Magda♪enaBerlin 💚 🦥 💚<p>Heute war ich im Berliner Ensemble in dem Stück<br>RCE<br><a href="https://troet.cafe/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a><br>von <span class="h-card" translate="no"><a href="https://digitalcourage.social/@SibylleBerg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SibylleBerg</span></a></span></p><p>Eine Gruppe von Nerds plant einen Neustart der Gesellschaft, indem die bisherigen Strukturen zum Absturz gebracht werden ...<br>Ein kluges Stück, auf bildüberwältigende Weise mit viel Musik hinreißend erzählt.<br><a href="https://troet.cafe/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://troet.cafe/tags/BerlinerEnsemble" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BerlinerEnsemble</span></a> <a href="https://troet.cafe/tags/Berlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Berlin</span></a> <a href="https://troet.cafe/tags/Theater" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Theater</span></a> <a href="https://troet.cafe/tags/Schauspiel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schauspiel</span></a></p>
Bene<p>Edit: Danke an die boosts. Das Ticket hat jmd. gefunden 🤗</p><p>:BoostOK: Internet mach Dein Ding: 1 Ticket - Morgen Samstag, den 25.05.2024 zu "<a href="https://chaos.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://chaos.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a>" von Sibylle Berg <span class="h-card" translate="no"><a href="https://digitalcourage.social/@SibylleBerg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SibylleBerg</span></a></span> (Regie: Kay Voges) im Großen Haus des Berliner Ensembles in <a href="https://chaos.social/tags/Berlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Berlin</span></a> <span class="h-card" translate="no"><a href="https://mastodon.art/@blnensemble" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>blnensemble</span></a></span> </p><p>Details: 2. RANG LINKS, Reihe: 2, Platz: 1 —28,00 EUR ( Normalpreis )</p><p>Entweder für 💶 oder einfach so, wenn Du es Dir sonst nicht leisten könntest (ich will keine Erklärung o.ä.)</p>
Daniel Böhmer<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@fr0gger" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fr0gger</span></a></span> I think I understood the attack so far that the <a href="https://ieji.de/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> binary would later infect <a href="https://ieji.de/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSH</span></a> to make it vulnerable to <a href="https://ieji.de/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a>. Am I wrong or could you extend the chart with that mechanism? That'd be great!</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Critical Vulnerabilities Alert in ConnectWise Software 🚨"</p><p>Two vulnerabilities have been identified in ConnectWise's remote desktop software, ScreenConnect, affecting versions 23.9.7 and prior. The first vulnerability (CVE-2024-1708) is a path-traversal issue allowing potential remote code execution or access to sensitive data, rated with a high severity score of 8.4. </p><p>The second (CVE-2024-1709) is an authentication bypass, considered critical with a severity score of 10.0, and is easily exploitable with existing proof-of-concept exploits. ConnectWise has issued updates for cloud-hosted instances, but self-hosted deployments need immediate patching. The exposure is global, with significant concentrations in the United States, and it's expected that cybercriminals and nation-state actors will actively exploit these vulnerabilities.</p><p>| ---- | ---- | ---- |<br>| <strong>CVE Number</strong> | <strong>Description</strong> | *<strong><em>CVSS Severity</em></strong>* |<br>| <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708" rel="nofollow noopener" target="_blank">CVE-2024-1708</a> | ScreenConnect 23.9.7 and prior are affected by a path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. | <strong>8.4 High</strong> |<br>| <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709" rel="nofollow noopener" target="_blank">CVE-2024-1709</a> | ConnectWise ScreenConnect 23.9.7 and prior are affected by an authentication bypass using an alternate path or channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. | <strong>10.0 Critical</strong> |</p><p>Professionals using ConnectWise must urgently patch their systems to mitigate these vulnerabilities. The discovery underscores the importance of rigorous security practices in protecting IT infrastructures.</p><p>🛡️💻🔐</p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/VulnerabilityAlert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityAlert</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a> <a href="https://infosec.exchange/tags/CVE2024_1708" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2024_1708</span></a> <a href="https://infosec.exchange/tags/CVE2024_1709" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2024_1709</span></a> <a href="https://infosec.exchange/tags/PatchManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchManagement</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://infosec.exchange/tags/PrivilegeEscalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeEscalation</span></a></p><p>Source: <a href="https://unit42.paloaltonetworks.com/connectwise-threat-brief-cve-2024-1708-cve-2024-1709/" rel="nofollow noopener" target="_blank">Unit42 by Palo Alto Networks</a></p>
MasterEmit<p>Zeit für etwas aufbauende Lektüre zum Wochenende. 💖 <a href="https://chaos.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://chaos.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p><p><span class="h-card" translate="no"><a href="https://digitalcourage.social/@SibylleBerg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SibylleBerg</span></a></span></p>
Freemind<p>Meanwhile, CVE-2023-22524 could allow an attacker to achieve code execution by leveraging WebSockets to bypass Atlassian Companion’s blocklist and macOS Gatekeeper protections.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/Atlassian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atlassian</span></a> <a href="https://mastodon.online/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.online/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.online/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a></p><p><a href="https://cybersec84.wordpress.com/2023/12/07/atlassian-rolls-out-crucial-software-patches-to-thwart-remote-code-execution-vulnerabilities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2023/</span><span class="invisible">12/07/atlassian-rolls-out-crucial-software-patches-to-thwart-remote-code-execution-vulnerabilities/</span></a></p>