mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.1K
active users

#advisory

9 posts6 participants0 posts today
BeyondMachines :verified:<p>Multiple vulnerabilities in Netgear EX6200 Wi-Fi range extender</p><p>Security researchers have identified three buffer overflow vulnerabilities (all rated 8.8 CVSS) in the Netgear EX6200 Wi-Fi range extender that could allow attackers to remotely execute code without user interaction, leading to device compromise, data theft, or adding to botnet.</p><p>**If you own a Netgear EX6200 Wi-Fi range extender, immediately disable remote management and isolate the device from public networks. Check on Netgear regularly for an updated version. In the meantime, if possible turn it off and/or use a replacement.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/multiple-vulnerabilities-in-netgear-ex6200-wi-fi-range-extender-s-t-n-3-j/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/multiple-vulnerabilities-in-netgear-ex6200-wi-fi-range-extender-s-t-n-3-j/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Library hallucinations in AI generated code creates risk of loading malware in your programs</p><p>Code-generating Large Language Models (LLMs) create a cybersecurity threat through "package hallucinations" - recommending predictably hallucinated non-existent software packages that attackers can exploit by creating malicious versions or poisoning LLM training data. The risk is very high during rapid development cycles or during Vibe Coding.</p><p>**When installing new code libraries or packages, always verify their legitimacy by checking for active development, multiple contributors, and an active development history of at least 2-3 years. Organizations should maintain approved package lists and educate developers about security risks. Individual developers should research packages on trusted platforms like StackOverflow before implementation.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/library-hallucinations-in-ai-generated-code-creates-risk-of-loading-malware-in-your-programs-y-d-r-v-d/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/library-hallucinations-in-ai-generated-code-creates-risk-of-loading-malware-in-your-programs-y-d-r-v-d/gD2P6Ple2L</span></a></p>
CBC London<p>Boil water advisories in place for Ingersoll and Mount Elgin<br>Southwestern Public Health is advising residents in the towns of Ingersoll and Mount Elgin to boil their water as a precaution after possible contamination.<br><a href="https://mastodon.hongkongers.net/tags/water" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>water</span></a> <a href="https://mastodon.hongkongers.net/tags/health" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>health</span></a> <a href="https://mastodon.hongkongers.net/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://mastodon.hongkongers.net/tags/Ingersoll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ingersoll</span></a> <a href="https://mastodon.hongkongers.net/tags/MountElgin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MountElgin</span></a> <a href="https://mastodon.hongkongers.net/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a><br><a href="https://www.cbc.ca/news/canada/london/boil-water-advisories-in-place-for-ingersoll-and-mount-elgin-1.7523524?cmp=rss" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbc.ca/news/canada/london/boil</span><span class="invisible">-water-advisories-in-place-for-ingersoll-and-mount-elgin-1.7523524?cmp=rss</span></a></p>
BeyondMachines :verified:<p>Mozilla addresses multiple High-Severity flaws with Firefox 138 release</p><p>Firefox 138 addresses several high severity security flaws, including a privilege escalation vulnerability in the updater (CVE-2025-2817), a macOS-specific WebGL memory corruption issue (CVE-2025-4082), a process isolation bypass using JavaScript URI links (CVE-2025-4083), and memory safety bugs that could potentially enable arbitrary code execution.</p><p>**Nothing to panic patch but there is one critical CVSS flaw and several almost critical. It's best to practicei regular discipline update. Just update your Firefox, Thunderbird and Firefox based browsers (Waterfox and similar). The update is trivial and all your tabs reopen.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/mozilla-addresses-multiple-high-severity-flaws-with-firefox-138-release-8-z-m-3-b/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/mozilla-addresses-multiple-high-severity-flaws-with-firefox-138-release-8-z-m-3-b/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Flaws in Apple's AirPlay protocol puts millions of devices at risk</p><p>The "AirBorne" vulnerabilities in Apple's AirPlay Protocol and SDK enable multiple methods of remote code execution attacks that could automatically spread between devices, potentially affecting billions of Apple products and third-party devices with AirPlay functionality (speakers, headphones, cars, TVs).</p><p>**If you needed a great reason to update all your Apple devices (including AirPods, Apple Vision Pro, Apple TVs), how about all those being hacked and used to spread malware? Also, make sure to update all your third-party smart speakers (Sonos, Bose), home theater systems, wireless speakers, smart TVs, and your car that uses Apple CarPlay. If you can't update, disable AirPlay when not in use and set AirPlay settings to "Current User" to reduce the attack surface.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/airborne-flaws-in-apple-s-airplay-protocol-puts-millions-of-devices-at-risk-7-8-0-r-7/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/airborne-flaws-in-apple-s-airplay-protocol-puts-millions-of-devices-at-risk-7-8-0-r-7/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Remote Code Execution flaw reported in Viasat Satellite Modems</p><p>A stack buffer overflow vulnerability (CVE-2024-6198) in Viasat satellite modems' "SNORE" web interface allows attackers to send specially crafted HTTP requests that can lead to arbitrary code execution through return-oriented programming techniques, affecting multiple modem models. Bug is patched by firmware updates 3.8.0.4+ or 4.3.0.2+ depending on the device model.</p><p>**If you are using Viasat sattelite modems, check if they are auto-updated. If not, update them ASAP. Should be fairly easy fix.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-viasat-satellite-modems-9-c-l-d-p/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-remote-code-execution-flaw-reported-in-viasat-satellite-modems-9-c-l-d-p/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical FastCGI flaw exposes embedded devices to remote code execution</p><p>A critical integer overflow vulnerability (CVE-2025-23016, CVSS 9.3) has been discovered in the FastCGI library that affects 32-bit systems like many embedded and IoT devices, enabling attackers to create buffer overflows that could lead to remote code execution.</p><p>**Check if you are running FastCGI in your embedded and IoT systems. As a first step, isolate all such devices from the internet and make them accessible only from trusted networks. Then reach out to vendors to check for FastCGI and get a possible vendor issued patch/fix. Finally, where possible, update to FastCGI library version 2.4.5 or later, or reconfigure the system to mitigate exposure.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-fastcgi-flaw-exposes-embedded-devices-to-remote-code-execution-x-c-a-v-0/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-fastcgi-flaw-exposes-embedded-devices-to-remote-code-execution-x-c-a-v-0/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Azure SQL server vulnerability allowed creation of malicious destructive Firewall rules</p><p>Varonis Threat Labs discovered a critical "Destructive Stored URL Parameter Injection" vulnerability in Azure SQL Server where attackers with privileged access or scammed victim users could create malicious firewall rules containing directory traversal sequences (like "../"). When such a rule is deleted by administrators through the Azure Portal, it would append the traversal path sequence, causing deletion of arbitrary Azure resources.</p><p>**You can't do much about this flaw, it's fixed by Microsoft. But take into account for your evaluation of the vendor.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/azure-sql-server-vulnerability-allowed-creation-of-malicious-destructive-firewall-rules-q-1-p-b-h/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/azure-sql-server-vulnerability-allowed-creation-of-malicious-destructive-firewall-rules-q-1-p-b-h/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Windows "security related inetpub" creates a vulnerability blocking future security updates</p><p>Microsoft's April 2025 security patch for CVE-2025-21204 inadvertently created a new vulnerability by establishing an 'inetpub' folder in the system drive root that can be exploited through a simple junction attack technique. This vulnerability allows malicious actor without administrative privileges to block further security updates by creatinga symlink that redirects the inetpub folder to a Windows file.</p><p>**It seems that Microsoft has decided to make a dumb workaround in a security patch with the inetpub folder and then to assume only a "happy path" for users - that the inetpub folder "does not require any action from IT admins and end users". But they seem to forget that attackers will use this very same method to block compromised computers from getting new patches.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a><br><a href="https://beyondmachines.net/event_details/windows-security-related-inetpub-creates-a-vulnerability-blocking-future-security-updates-e-y-z-c-4/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/windows-security-related-inetpub-creates-a-vulnerability-blocking-future-security-updates-e-y-z-c-4/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Multiple vulnerabilities reported in Rack Ruby Framework</p><p>Security researchers have identified three vulnerabilities in the Rack Ruby framework, with the most critical being CVE-2025-27610 (CVSS 7.5), a path traversal flaw in Rack::Static middleware that allows attackers to access sensitive files outside intended directories by exploiting improper path handling when the `:root` option isn't defined.</p><p>**Check your Ruby code for the Rack Ruby framework. If you are using it and you are using Rack::Static your site is at risk. Update the Rack Ruby framework or stop using Rack::Static in your code.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-rack-ruby-framework-0-6-p-2-4/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/multiple-vulnerabilities-reported-in-rack-ruby-framework-0-6-p-2-4/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical path traversal vulnerability reported in Infodraw's surveillance software</p><p>Security researchers have discovered a critical path traversal vulnerability (CVE-2025-43928, CVSS 9.8) in Infodraw's Media Relay Service software used in law enforcement surveillance equipment worldwide. The flaw allows attackers to access sensitive system files by using specially crafted usernames containing path traversal sequences.</p><p>**If you are using Infodraw MRS systems, take them offline and request an official patch from the vendor. If taking MRA is not possible, isolate the vulnerable port from the internet via VPNs or IP restrictions to limit access. The hack is fairly easy and can be automated, so don't ignore this one.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-path-traversal-vulnerability-reported-in-infodraw-s-surveillance-software-5-z-y-x-d/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-path-traversal-vulnerability-reported-in-infodraw-s-surveillance-software-5-z-y-x-d/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>AMD releases patches for critical Zen 5 microcode flaw</p><p>AMD has released patches for the EntrySign vulnerability (CVE-2024-36347, CVSS 6.4-9.8) affecting Zen 5 processors, which allows attackers with kernel-level privileges to execute unsigned microcode by exploiting weaknesses in AMD's signature verification process.</p><p>**If you are running Zen 5-based microprocessors in your systems, check for firmware update from your vendor, and apply it. It's not a panic mode patch since exploit requires physical access to the system, but it's still smart to patch it. Because everyone leaves their equipment somewhere.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/amd-releases-patches-for-critical-zen-5-microcode-flaw-j-r-n-g-f/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/amd-releases-patches-for-critical-zen-5-microcode-flaw-j-r-n-g-f/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Multiple critical security vulnerabilities in Schneider Electric Modicon Controllers</p><p>Multiple critical security vulnerabilities have been identified in Schneider Electric's Modicon PLC series allowing remote code execution, denial-of-service, or complete system compromise through various attack vectors including uncaught exceptions and improper access controls. While Schneider has released patches for some product lines, many vulnerabilities affecting end-of-life Modicon Quantum and Premium controllers have no fixes available.</p><p>**This advisory impacts a lot of products. If you are using Schneider Electric Modicon controllers, review the advisory in detail. As usual, your first action is to make sure the devices are isolated from the internet and accessible only from trusted networks. Then, if patches are available, plan a patch cycle. Otherwise if no patches are available, do a proper risk assessment whether you'll keep the devices with incurred risk or will you phase them out and replace them.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/multiple-critical-security-vulnerabilities-in-schneider-electric-modicon-controllers-l-m-i-u-q/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/multiple-critical-security-vulnerabilities-in-schneider-electric-modicon-controllers-l-m-i-u-q/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Johnson Controls reports critical vulnerability in ICU tool</p><p>A critical stack-based buffer overflow vulnerability (CVE-2025-26382, CVSS 9.8) in Johnson Controls' ICU tool affects versions prior to 6.9.5, allowing unauthenticated remote attackers to execute arbitrary code and potentially gain complete system control.</p><p>**If you are using Johnson Controls' ICU tool, the usual rules apply - Make sure it's isolated from the internet and accessible only from trusted networks. Then plan a patch, because every isolation can be breached given enough time.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/johnson-controls-reports-critical-vulnerability-in-icu-tool-g-p-n-0-s/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/johnson-controls-reports-critical-vulnerability-in-icu-tool-g-p-n-0-s/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Nice reports critical flaw in Linear eMerge E3</p><p>Critical vulnerability CVE-2024-9441 (CVSS 9.8) in Nice's Linear eMerge E3 access control system allows unauthenticated remote attackers to execute arbitrary OS commands through the login_id parameter in the forgot_password functionality. All versions through 1.00-07 affected and no patch is currently available.</p><p>**If you are using Nice Linear eMerge E3 access control system, be aware that it's vulnerable. Make sure it's isolated from the internet and accessible only from trusted networks, and reach out to the vendor for patch timing.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/nice-reports-critical-flaw-in-linear-emerge-e3-8-q-a-y-1/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/nice-reports-critical-flaw-in-linear-emerge-e3-8-q-a-y-1/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Planet Technology reports security flaws in their network products</p><p>Multiple critical security vulnerabilities (with CVSS scores of 9.3) have been identified in Planet Technology's network products, including OS command injection flaws and hard-coded credentials that allow unauthenticated attackers to gain administrative access, manipulate data, and execute commands on affected systems.</p><p>**If you are using Planet Technology products, review the advisory in detail for affected models. Make sure the devices are isolated from the internet and accessible only from trusted networks. Then plan a patch cycle, some of the flaws are quite embarrassing and easy to exploit - like the hard-coded credentials.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/planet-technology-reports-security-flaws-in-their-network-products-l-p-1-g-q/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/planet-technology-reports-security-flaws-in-their-network-products-l-p-1-g-q/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>GitLab releases security patches for multiple Vulnerabilities</p><p>GitLab has released security updates addressing five vulnerabilities in its Community and Enterprise Editions, including three high-severity cross-site scripting and header injection flaws in the Maven Dependency Proxy (CVE-2025-1763, CVE-2025-2443, CVE-2025-1908), a denial of service vulnerability in issue preview functionality (CVE-2025-0639), and an information disclosure issue allowing unauthorized access to branch names (CVE-2024-12244). Patched versions are 17.11.1, 17.10.5, and 17.9.7.</p><p>**If you are running self-hosted GitLab Community Edition (CE) or Enterprise Edition (EE) plan a quick patch cycle. While none of the flaws are scored as critical, the nature of GitLab server is to be visible to many users, probably on the internet. So someone will probably find an exploit scenario given enough time and an unpatched server.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/gitlab-releases-security-patches-for-multiple-vulnerabilities-9-a-u-d-v/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/gitlab-releases-security-patches-for-multiple-vulnerabilities-9-a-u-d-v/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical vulnerability reported in Commvault Command Center</p><p>A critical unauthenticated remote code execution vulnerability (CVE-2025-34028) in Commvault's Command Center allows attackers to force vulnerable systems to download, unzip, and execute malicious code, leading to complete system compromise. The flaw affects Commvault Command Center Innovation Release versions 11.38.0-11.38.19 on both Windows and Linux.</p><p>**If you are using Commvault Command Center Innovation Release versions 11.38.0 to 11.38.19, patch IMMEDIATELY. Naturally, make sure the system is isolated from the internet and accessible only from trusted networks. But even with isolation, someone will find your Commvault eventually - through phishing or malware. So don't delay - patch.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-vulnerability-reported-in-commvault-command-center-5-w-t-6-u/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-vulnerability-reported-in-commvault-command-center-5-w-t-6-u/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Massive number of SQL Injection Vulnerabilities reported Siemens TeleControl Server Basic</p><p>Siemens has disclosed 67 SQL injection vulnerabilities in their TeleControl Server Basic product affecting critical infrastructure sectors including Energy, Water, and Transportation Systems. Three of the flaws are critical and allowi unauthenticated attackers to bypass authorization controls and 64 high-severity issues that could enable database manipulation, denial-of-service conditions, and code execution with system permissions.</p><p>**If you are using TeleControl Server Basic, make sure it's isolated from the internet and accessible only from trusted networks. Restrict access to port 8000 only to trusted IP addresses, and plan a quick patch cycle. The list of vulnerabilities is huge, and any isolation will eventually be compromised through phishing, malware or a disgruntled employee. So patch your TeleControl.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/massive-number-of-sql-injection-vulnerabilities-reported-siemens-telecontrol-server-basic-h-1-y-e-y/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/massive-number-of-sql-injection-vulnerabilities-reported-siemens-telecontrol-server-basic-h-1-y-e-y/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Multiple vulnerabilities reported in IBM Hardware Management Console</p><p>IBM has patched multiple security vulnerabilities in its Power Hardware Management Console (HMC), including a critical flaw (CVE-2025-1950, CVSS 9.3) that allows local users to execute commands with elevated privileges due to improper validation.</p><p>**First, make sure your IBM Hardware Management Console (HMC) is isolated and accessible only from trusted networks and trusted personnel. Also check whether you are running vulnerable versions (V10.2.1030.0 and V10.3.1050.0). If you are, plan a patch cycle, because any isolation will eventually be breached.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-ibm-hardware-management-console-n-n-l-r-j/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/multiple-vulnerabilities-reported-in-ibm-hardware-management-console-n-n-l-r-j/gD2P6Ple2L</span></a></p>