Tag: man-in-the-middle attacks

  • Cisco Talos Blog: Slew of WavLink vulnerabilities

    Source URL: https://blog.talosintelligence.com/slew-of-wavlink-vulnerabilities/ Source: Cisco Talos Blog Title: Slew of WavLink vulnerabilities Feedly Summary: Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is…

  • Hacker News: RCE Vulnerability in QBittorrent

    Source URL: https://sharpsec.run/rce-vulnerability-in-qbittorrent/ Source: Hacker News Title: RCE Vulnerability in QBittorrent Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text details significant security vulnerabilities present in the qBittorrent application, particularly involving SSL certificate validation and potential for remote code execution (RCE) through intentionally manipulated update processes. This information is highly relevant for professionals…

  • Hacker News: Just want simple TLS for your .internal network?

    Source URL: https://github.com/nh2/internal-contstrained-pki Source: Hacker News Title: Just want simple TLS for your .internal network? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides instructions for creating a simplified Transport Layer Security (TLS) setup using a constrained public key infrastructure (PKI) within an internal network. It briefly discusses the generation of certificates…