#PatchUpdate

Mathrubhumi EnglishMathrubhumi_English
2025-09-17

Valorant Patch 1.11.06 introduces the Replay System for PC and bans 40,000 bots, improving gameplay and competitive analysis english.mathrubhumi.com/techno

2025-09-16

Microsoft has lifted the safeguard hold on Windows 11 24H2 after fixing the notorious audio bug tied to Dirac software.

๐ŸŽง Integrated speakers & Bluetooth devices should now work normally.

๐Ÿ’ฌ Did this issue hold you back from upgrading? Boost + follow us for more cybersecurity and system update news.

#Windows11 #Microsoft #PatchUpdate #SystemUpgrade #Cybersecurity #AudioBugFix #TechCommunity

Microsoft
SpazioGames.itspaziogames
2025-08-01

๐Ÿ› ๏ธ Finalmente! La nuova patch di Baldur's Gate 3 ha risolto un bug storico. Un piccolo passo per i giocatori, un grande salto per il gioco!

๐Ÿ”— spaziogames.it/notizie/baldurs

Tom's Hardware Italiatomshw
2025-07-25

๐ŸŽฎ Appassionati di Final Fantasy 14, segnatevi la data! Al calar dell'arco di Dawntrail, una nuova patch รจ all'orizzonte! ๐ŸŒ…

๐Ÿ”— tomshw.it/videogioco/final-fan

SpazioGames.itspaziogames
2025-07-17

๐Ÿ˜ฑ Patch 2.3 di Cyberpunk 2077 arriva senza la feature piรน desiderata! Speriamo nelle prossime attualizzazioni...๐ŸŽฎ

๐Ÿ”— spaziogames.it/notizie/cyberpu

Tom's Hardware Italiatomshw
2025-05-09

โš”๏ธ Entra nel buio dell'espansione 33 di Clair Obscur: cambia tutto con l'obliterazione della spada piรน rotta di sempre! Preparati per la rivoluzione.

๐Ÿ”— tomshw.it/videogioco/clair-obs

EIP Gamingeipgaming
2025-04-10
Tom's Hardware Italiatomshw
2025-03-10

๐Ÿ‘พ Monster Hunter Wilds si aggiorna con una nuova patch, un piccolo passo avanti ma non il salto di qualitร  sperato.

๐Ÿ”— tomshw.it/videogioco/monster-h

SpazioGames.itspaziogames
2024-09-11

๐Ÿ‰ Dragon's Dogma 2 svela nuova patch con sorprese epiche! Scopri tutte le novitร !

๐Ÿ”— spaziogames.it/notizie/dragons

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2024-05-22

Critical GitHub Enterprise Server Flaw Allows Authentication Bypass

Date: May 21, 2024

CVE: [[CVE-2024-4985]]

Vulnerability Type: Improper Authentication

CWE: [[CWE-287]]

Sources: Cyber Security News, SecurityWeek, The Hacker News

Issue Summary

A critical vulnerability in GitHub Enterprise Server, identified as CVE-2024-4985, was discovered that allows attackers to bypass authentication. This flaw, found in versions 3.9.14, 3.10.11, 3.11.9, and 3.12.3, permits unauthorized access to repositories and sensitive data by exploiting a weakness in the SAML SSO authentication process.

Technical Key Findings

The vulnerability arises from a logic error in the SAML SSO authentication process, where the server fails to verify the validity of digital signatures on SAML responses properly. Attackers can craft SAML assertions with any certificate, which the server incorrectly accepts, allowing the spoofing of user identities, including admin accounts.

Vulnerable Products

  • GitHub Enterprise Server versions 3.9.14
  • GitHub Enterprise Server versions 3.10.11
  • GitHub Enterprise Server versions 3.11.9
  • GitHub Enterprise Server versions 3.12.3

Impact Assessment

Exploitation of this vulnerability could lead to unauthorized access to private repositories, sensitive data, and administrative controls. This can result in data breaches, code tampering, and potential intellectual property theft.

Patches or Workaround

GitHub has released patched versions (3.9.15, 3.10.12, 3.11.10, and 3.12.4) to address this issue. As an interim measure, enabling SAML certificate pinning can mitigate the risk. Additionally, auditing access logs for suspicious activity and rotating credentials is advised.

Tags

#GitHub #CVE20244985 #SAML #AuthenticationBypass #SecurityFlaw #EnterpriseSecurity #DataBreach #PatchUpdate #CyberSecurity

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2024-04-03

VMware SD-WAN Multiple Security Vulnerabilities Addressed

Date: 2024-04-02
CVE: CVE-2024-22246, CVE-2024-22247, CVE-2024-22248
Vulnerability Type: [[Command Injection]], [[CWE-306|Missing Authentication]], [[CWE-601|Open Redirect]]
CWE: [[CWE-77]], [[CWE-306]], [[CWE-601]]
Sources: VMware Security Advisories

Issue Summary

VMware has issued an advisory for multiple vulnerabilities affecting its SD-WAN Edge and Orchestrator products. The issues were reported privately and concern unauthenticated command injection, missing authentication, and open redirect vulnerabilities, with patches now available.

Technical Key findings

The command injection vulnerability (CVE-2024-22246) allows for remote code execution without authentication, particularly dangerous during the router's activation. CVSSv3 base score of 7.4.

CVE-2024-22247 involves missing authentication mechanisms, potentially enabling unauthorized BIOS configuration access.  CVSSv3 base score of 4.8.

CVE-2024-22248 is an open redirect vulnerability in the SD-WAN Orchestrator, leading to possible sensitive information disclosure. CVSSv3 base score of 7.1.

Vulnerable products

  • VMware SD-WAN Edge versions prior to 5.0.1 and 4.5.1
  • VMware SD-WAN Orchestrator version prior to 5.0.1

Response Matrix

| | | | | | | | | |
|---|---|---|---|---|---|---|---|---|
|Product|Version|Running On|CVE Identifier|CVSSv3|Severity|Fixed Version|Workarounds|Additional Documentation|
|VMware SD-WAN (Edge)|5.x|Any|CVE-2024-22246|7.4|Important|5.0.1+|N/A|N/A|
|VMware SD-WAN (Edge)|4.5.x|Any|CVE-2024-22246|7.4|Important|4.5.1+|N/A|N/A|
|VMware SD-WAN (Edge)|4.5.x/5.x|Any|CVE-2024-22247|4.8|Moderate|KB97391|N/A|N/A|
|VMware SD-WAN (Edge)|Any|Any|CVE-2024-22248|N/A|N/A|Unaffected|N/A|N/A|
|VMware SD-WAN (Orchestrator)|Any|Any|CVE-2024-22246, CVE-2024-22247|N/A|N/A|Unaffected|N/A|N/A|
|VMware SD-WAN (Orchestrator)|5.x|Any|CVE-2024-22248|7.1|Important|5.0.1+|N/A|N/A|

Impact assessment

Exploitation of these vulnerabilities can lead to unauthorized command execution, BIOS configuration access without authentication, and redirection of users to attacker-controlled domains, potentially resulting in significant security breaches.

Patches or workaround

VMware has released patches for the affected versions. No workarounds available.

Tags

#VMware #SD-WAN #SecurityVulnerability #CVE-2024-22246 #CVE-2024-22247 #CVE-2024-22248 #PatchUpdate

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2024-03-21

20240321 - Atlassian Confluence Security Bulletin Analysis March 2024 Vulnerability with a focus on CVE-2024-1597

Date: March 19, 2024
CVE: CVE-2024-1597
Sources: Atlassian Documentation, SecurityWeek, CISA

Issue Summary

A recent security bulletin released by Atlassian on March 19, 2024, addresses a significant vulnerability in Confluence, a widely used collaboration tool. This issue poses a potential risk for unauthorized access and control by attackers, leading to data breaches and system compromise.

Most notable is CVE-2024-1597, a critical vulnerability in a non-Atlassian Bamboo dependency. Here the PostgreSQL JDBC Driver, also known as PgJDBC, faces a critical SQL Injection vulnerability, particularly when configured in PreferQueryMode=SIMPLE. This configuration is not the default setting, but if used, it opens up potential for SQL injection attacks. This vulnerability exists due to the manipulation of numeric and string placeholders in SQL queries, allowing attackers to modify the SQL execution logic and inject malicious SQL code.

|Product & Release Notes|Affected Versions|Fixed Versions|Vulnerability Summary|CVE ID|CVSS Severity|
|---|---|---|---|---|---|
|Bamboo Data Center and Server|- 9.5.0 to 9.5.1
- 9.4.0 to 9.4.3
- 9.3.0 to 9.3.6
- 9.2.0 to 9.2.11 (LTS)
- 9.1.0 to 9.1.3

- 9.0.0 to 9.0.4

- 8.2.0 to 8.2.9

- Any earlier versions|- 9.6.0 (LTS) or 9.5.2 recommended Data Center Only
- 9.4.4
- 9.2.12 (LTS)|SQLi (SQL Injection) org.postgresql:postgresql Dependency in Bamboo Data Center and Server


NOTE: CVE-2024-1597 is a critical vulnerability in a non-Atlassian Bamboo dependency. However, Atlassianโ€™s application of the dependency presents a lower assessed risk, which is why we are disclosing this vulnerability in our monthly Security Bulletin instead of a Critical Security Advisory.|CVE-2024-1597|10.0 Critical|

Technical Key findings

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.

Vulnerable products

All versions of PgJDBC before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.8 are vulnerable to this SQL injection attack. For Bamboo Data Center and Server this dependicy is used in;

  • 9.5.0 to 9.5.1
  • 9.4.0 to 9.4.3
  • 9.3.0 to 9.3.6
  • 9.2.0 to 9.2.11 (LTS)
  • 9.1.0 to 9.1.3
  • 9.0.0 to 9.0.4
  • 8.2.0 to 8.2.9
  • Any earlier versions

However, Bamboo & Other Atlassian Data Center products are unaffected by this vulnerability as they do not use the PreferQueryMode=SIMPLE in their SQL database connection settings.

Impact assessment

The impact of exploiting CVE-2024-1597 is severe and includes:

  • Unauthorized data exposure, including sensitive customer information and business secrets.
  • Data manipulation, potentially leading to disrupted operations and diminished trust.
  • In extreme cases, attackers could gain complete control over the affected database.

Patches or workaround

Atlassian has released updates for Confluence Server and Data Center that address this vulnerability. Users are advised to update their installations to the fixed version (9.6.0 (LTS) or 9.5.2 recommended Data Center Only 9.4.4 9.2.12 (LTS)) as soon as possible.

Tags

#Atlassian #Confluence #Cybersecurity #Vulnerability #PatchUpdate #CVE-2024-1597 #pgjdbc #SQLInjection #PostgreSQL #SecurityVulnerability

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2024-02-15

๐Ÿšจ Mastodon Vulnerability Patched! CVE-2024-25618 ๐Ÿ›ก๏ธ

A security flaw - CVE-2024-25618 - was fixed, in Mastodon's software to prevent potential account takeovers. This vulnerability allowed attackers to bypass authentication mechanisms via a crafted request, posing a significant risk to the platform's integrity.

It enabled new logins from certain authentication providers (like CAS, SAML, OIDC) to merge with existing local accounts sharing the same email. This could lead to someone taking over your account if the provider allows changing emails or if there are multiple providers set up.

Here's how it works: When someone logs in using an external provider for the first time, Mastodon checks for an existing account with the same email. However, relying only on the email could result in hijacking your Mastodon account if the provider allows changing it. The Mastodon team swiftly deployed a patch, reinforcing the security of user accounts and the broader ecosystem. Remember, keeping software up-to-date is crucial for safeguarding against such vulnerabilities. ๐Ÿ”„๐Ÿ”

The commit "b31af34c9716338e4a32a62cc812d1ca59e88d15" signifies this update. For further details, check out their advisory.

A big thanks to the discoverers Dominik George and Pingu from Teckids, and the Mastodon team for their rapid response in improving our digital defenses. Stay secure, everyone! โœจ๐Ÿ˜

Tags: #CVE2024_25618 #Mastodon #Cybersecurity #PatchUpdate #AccountSecurity #AuthenticationBypass #DigitalDefense #CommunityVigilance ๐ŸŒ๐Ÿ”’

MITRE CVE-2024-25618 Summary

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2024-01-12

"๐Ÿ” #GitLabSecurityAlert - Multiple Critical Vulnerabilities Patched in GitLab ๐Ÿšจ"

๐Ÿ“ฐ GitLab has released critical updates (16.7.2, 16.6.4, 16.5.6) addressing several security vulnerabilities, including a critical account takeover flaw and a Slack/Mattermost integration exploit. Users are urged to update immediately.

1๏ธโƒฃ The most severe, CVE-2023-7028, allowed password reset emails to be sent to unverified addresses (CVSS 10.0).
2๏ธโƒฃ CVE-2023-5356 permitted unauthorized execution of slash commands in Slack/Mattermost integrations (CVSS 9.6).
3๏ธโƒฃ CVE-2023-4812 involved bypassing CODEOWNERS approval in merge requests (CVSS 7.6).
4๏ธโƒฃ CVE-2023-6955, a medium severity issue, related to improper access control in GitLab Remote Development (CVSS 6.6).
5๏ธโƒฃ The least critical, CVE-2023-2030, allowed alteration of metadata in signed commits (CVSS 3.5).

Kudos to the security researchers (@asterion04, @yvvdwf, @ali_shehab, @lotsofloops on HackerOne) and GitLab's @j.seto for identifying these issues. Stay secure, folks!

Source: GitLab Release Notes
Author: Greg Myers

Tags: #Cybersecurity #Vulnerability #GitLab #CVE2023 #PatchUpdate #InfoSec #HackerOne #DevSecOps ๐Ÿ›ก๏ธ๐Ÿ’ป๐Ÿ”ง

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2023-10-03

"๐Ÿšจ Multiple Vulnerabilities Unveiled in SAPยฎ Enable Now Manager ๐Ÿšจ"

SEC Consult has disclosed multiple vulnerabilities in SAPยฎ Enable Now Manager, which could potentially allow a remote, unauthenticated attacker to create new administrative user accounts by exploiting a chain of vulnerabilities. The vulnerabilities include Open Redirect, Reflected Cross Site Scripting (XSS), and Insufficient Cross-Site Request Forgery (CSRF) Protection. The vendor has pushed a fix in the May 2023 Release for the Cloud Edition.

๐Ÿ”— Source: Full Disclosure Mailing List

๐Ÿ”— Advisory URL: SEC Consult

Tags: #SAP #Vulnerability #CyberSecurity #InfoSec #XSS #CSRF #OpenRedirect #SECConsult #CyberAttack #PatchUpdate ๐ŸŒ๐Ÿ”๐Ÿ”

๐Ÿ‘ฅ Researchers: Paul Serban, Fabian Hagg from SEC Consult Vulnerability Lab (SEC Consult)

The WorldstoneTheWorldstone
2023-09-01

๐Ÿ”ฅ Patch 1.1.3 is here! From gameplay tweaks to critical bug fixes, get a quick overview of the latest changes. Read more in our detailed article!
worldstone.io/d4/news/patch-1-

Mustafa Kaan Demirhanmstfknn
2023-05-19

๐Ÿšจ users, attention! Three zero-day vulnerabilities have been patched that could expose your devices to serious threats. Update your devices ASAP to stay secure. ๐Ÿ”’ More details: darkreading.com/application-se

Mustafa Kaan Demirhanmstfknn
2023-05-10

Heads up, users! The company has released 18 new security notes, patching critical vulnerabilities in the 3D Visual Enterprise License Manager and BusinessObjects. Remember: timely updates are crucial for system security. Read more: securityweek.com/sap-patches-c

GamerScoreBrasilgamerscorebr
2023-03-29

Halo Infinite recebe pequeno patch de update
343 lanรงou uma pequena atualizaรงรฃo de patch para o Halo Infinite, abordando o feedback da comunidade e corrigindo problemas de estabilidade.

gamerscore.com.br/halo-infinit

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst