bug Jaeden Martell & Rachel Zegler in Y2K Bug Comedy 'Y2K' Trailer #2 By www.firstshowing.net Published On :: Wed, 13 Nov 2024 15:49:13 +0000 "Think they'll still do graduation?" A24 has revealed a second trailer for Y2K, a 1999 party comedy marking the feature directorial debut of comedian Kyle Mooney. Set to debug theaters starting in early December just before New Years coming up. It first premiered at the 2024 SXSW Film Festival to good reviews along with some negative ones, too. Two high school nobodies make the decision to crash the last major celebration before the new millennium on New Year's Eve 1999. The night gets even crazier than they could have ever dreamed when the clock strikes midnight. The hilarious NYE horror comedy stars Rachel Zegler, Jaeden Martell, Julian Dennison, and Alicia Silverstone, also featuring The Kid Laroi, Tim Heidecker, and Fred Durst. Still reminds me a bit of Bodies Bodies Bodies, though it also seems like it's inspired by the antics of This is The End. This looks totally wild and crazy and exactly my kind of ridiculous 90s humor! Tons of fun especially with all tech turning into literal monsters coming after them. Can't wait to watch this. Here's the second official trailer for Kyle Mooney's film Y2K, direct from A24's YouTube: You can rewatch the first trailer for Kyle […] Full Article Comedy Horror Sci-Fi To Watch Trailer
bug Democratic stronghold state votes to protect natural gas and gas stoves, a Biden administration bugaboo By www.foxnews.com Published On :: Wed, 13 Nov 2024 18:19:35 -0500 Voters in Washington state appeared to have approved a ballot measure that would restrict future regulations on natural gas and gas stoves. Full Article 7643407d-9945-5dd2-88c7-c1cee715ecf7 fnc Fox News fox-news/politics fox-news/us/environment fox-news/us/us-regions/west/washington fox-news/topic/green-new-deal fox-news/science/planet-earth/green fox-news/politics/elections fox-news/politics/voting fox-news/politics article
bug The U.S. Must Lead the Global Fight against Superbugs By www.scientificamerican.com Published On :: Wed, 13 Nov 2024 11:00:00 +0000 Antimicrobial resistance could claim 39 million lives by 2050, yet the pipeline for new antibiotics is drying up. U.S. policy makers can help fix it Full Article
bug The Ultimate in Debugging By developers.slashdot.org Published On :: 2024-11-13T16:41:00+00:00 Mark Rainey: Engineers are currently debugging why the Voyager 1 spacecraft, which is 15 billions miles away, turned off its main radio and switched to a backup radio that hasn't been used in over forty years! I've had some tricky debugging issues in the past, including finding compiler bugs and debugging code with no debugger that had been burnt into prom packs for terminals, however I have huge admiration for the engineers maintaining the operation of Voyager 1. Recently they sent a command to the craft that caused it to shut off its main radio transmitter, seemingly in an effort to preserve power and protect from faults. This prompted it to switch over to the backup radio transmitter, that is lower power. Now they have regained communication they are trying to determine the cause on hardware that is nearly 50 years old. Any communication takes days. When you think you have a difficult issue to debug, spare a thought for this team. Read more of this story at Slashdot. Full Article
bug SplineTech JavaScript Debugger PRO update boosts unique new features By www.RemoteDebugger.com Published On :: Sun, 10 Jul 2012 20:23:43 -0700 Spline Technologies Corporation announces a major update to SplineTech JavaScript Debugger PRO, an independent standalone Web development tool that enables Web developers to easily edit and debug JavaScript and VBScript inside HTML and AJAX pages, without the need for any add-ons, plugins or changes of their code to handle the debugging process. Client-side JavaScript, JScript and client-side VBScript debugging languages are fully supported for simple and complex HTML, DHTML and AJAX debugging scenarios. SplineTech JavaScript Debugger PRO offers following main features to address the most common Web development issues: - Advanced form debugging for JavaScript form validation - Programmers to cause order forms to validate in clients' browser windows before they are submitted. - JavaScript pop-up debugging - Debug DHTML menus and JavaScript menus - Debug JavaScript and VBScript events: Debug JavaScript Pop-ups, onclick, onmouseover, onfocus and any other event. - Debug DHTML behavior - Debug client-side JavaScript controls: Debug calendars and any other control - Multi-Functional VBScript and JavaScript script editor for HTML and AJAX - Full Support for native VBScript and JavaScript syntax (color-coded) - Explicit JavaScript runtime error information - Execution line highlighting: Display the current line of the code to be executed Aside from a vast array of main features, this major update of SplineTech JavaScript Debugger PRO includes these new and unique features: - Pause code execution in 3, 5 or more seconds (user adjustable) - Reformat unreadable JavaScript and AJAX scripts (turns large one-line AJAX scripts into properly formatted readable multi-line code) - Step Through multiple lines of code at once (user adjustable) - Go back (and forth) to any step within your code - Call Stack enables developers to view all function names taken from function lists (since IE reports most of them as anonymous) - View all current variables in a dedicated Current Variables panel Without requiring any manual configuration or network configuration, SplineTech JavaScript Debugger PRO runs on the Windows 7/2008/2000/2003/XP and Windows Server 2008 platforms (both x86 and x64) with Microsoft Internet Explorer 6.0 or better. SplineTech JavaScript Debugger PRO is priced at $90 per single-user license, and is available for purchase at http://www.RemoteDebugger.com/javascript_debugger/javascript_debugger.asp Immediate online product delivery and full support is included with all Spline Technologies products. ABOUT: Spline Technologies Corporation is a growing dynamic international software development company, specializing in web development tools, with headquarters in beautiful downtown Montreal, Canada, since 1999. Full Article Web Development Tools Software
bug A Cisco Router Bug Has Massive Implications for Small Businesses By www.small-business-software.net Published On :: Wed, 24 Jul 2019 14:03:06 -0400 Secure-computing engineers generally view these schemes as sound in theory and productive to deploy. But in practice, it can be dangerous to rely on a sole element to act as the check on the whole system. Undermining that safeguard—which has proven possible in many companies implementations—strips a device of critical protections. Worse still, manipulating the enclave can make it appear that everything is fine, even when it's very much not. complete article Full Article
bug EBSQ Art of the Day - July 23, 2018: Sunflower Ladybug Vignette by Pamela K Wilhelm By www.ebsqart.com Published On :: Mon, 23 Jul 2018 00:00:01 GMT EBSQ Art of the Day July 23, 2018 Sunflower Ladybug Vignette © by: Pamela K Wilhelm View today's art on EBSQ Search for EBSQ: eBay ImageKind Etsy ArtByUs.com Full Article
bug CARD SME opens its 40th branch in Zamboanga Sibugay By samarnews.com Published On :: Wed, 23 Oct 2024 10:26:00 +0800 CARD SME Bank, a thrift bank under the CARD Mutually Reinforcing Institution (CARD MRI), opens its 40th branch on June 10, 2024, in Ipil, Zamboanga Sibugay. Full Article
bug LXer: LibreOffice 24.8.2 Office Suite Is Now Available for Download with 85 Bug Fixes By www.linuxquestions.org Published On :: Sat, 28 Sep 2024 08:40:38 GMT Published at LXer: The Document Foundation announced today the general availability of LibreOffice 24.8.2 as the second maintenance update to the latest LibreOffice 24.8 office suite series fixing... Full Article Syndicated Linux News
bug LXer: PipeWire 1.2.5 Fixes Memory Leak and Audio Bugs By www.linuxquestions.org Published On :: Sat, 28 Sep 2024 12:22:07 GMT Published at LXer: PipeWire 1.2.5 multimedia framework is out now, fixing critical bugs, enhances FreeBSD support, and improves JACK API memory management. Read More...... Full Article Syndicated Linux News
bug LXer: Upstream Linux 6.12 Makes It Easier To Build A Debug Kernel For Arch Linux By www.linuxquestions.org Published On :: Sat, 28 Sep 2024 14:50:30 GMT Published at LXer: The upstream Linux 6.11 kernel introduced the ability to easily produce a Pacman kernel package for Arch Linux with the new "make pacman-pkg" target. With Linux 6.12 new... Full Article Syndicated Linux News
bug Buggered And Severely Spanked By www.spankingblog.com Published On :: Mon, 11 Nov 2024 03:50:16 +0000 In the faux-Victorian and badly over-written erotica novel The Blue Train by Richard Manton, there’s a totally noncon account of an afternoon’s cruel enjoyment of a young woman on her way to a old-fashioned penal institution. Under the most amazingly-contrived circumstances, our viewpoint villain arranges to impersonate a guard and isolate his helpless victim in […] Full Article Bondage Kinky Sex Spanking Whipping anal sex Blue Train bondage spanking buggery Richard Manton severe spanking
bug How to Take Care of a Ladybug By www.wikihow.com Published On :: Sun, 10 Nov 2024 00:00:00 GMT If you've caught an adorable ladybug and you want to keep it for a while as a pet, they're easy to care for! In this article, we'll tell you how to set up a ladybug habitat and feed it so your ladybug is happy and healthy. Just remember to release your ladybug after a few days since they tend to thrive best in their natural habitat. Full Article
bug I Prefer Dark Mode Because Light Attracts Bugs By wpmudev.com Published On :: Thu, 05 Sep 2024 03:55:26 +0000 Read to the end for a tiny yet extremely majestic lion. In today’s edition: The truth behind the classic “average person eats 3 spiders per year” factoid. Tips that’ll make organizing your taxonomies a little less, uh… taxing. America’s finest news source, The Onion, is now powered by our old friend WP. Hot Off The […] Full Article DEV
bug Where food inspectors in Topeka found bed bugs, moldy icing and plumbing issues By www.yahoo.com Published On :: 2024-11-12T10:02:49Z Full Article
bug 6 Things To Know Before Buying a Jitterbug Phone on Lively By clark.com Published On :: Fri, 25 May 2018 10:00:17 +0000 Jitterbug makes both flip phones and smartphones for seniors. Take a look at the product line, monthly costs, device activation and actual customer reviews. The post 6 Things To Know Before Buying a Jitterbug Phone on Lively appeared first on Clark Howard. Full Article Mobile & Electronics newsletter partner_rss_exclude
bug Bug off! By www.safetyandhealthmagazine.com Published On :: Tue, 09 Jul 2024 00:00:00 -0400 The most common summer pest? The mosquito. A dozen of the more than 200 types found in the United States and its territories can spread viruses such as West Nile, Zika and chikungunya to people, according to the Centers for Disease Control and Prevention. Full Article
bug Battling Bad Bugs with Botanicals By www.preparedfoods.com Published On :: Wed, 24 Apr 2024 07:30:00 -0400 While natural and botanical methods of preservation have been in use for centuries, the modern food processing system has relied heavily on synthetic food preservatives, such as nitrates, benzoates, sulfites, sorbates, and others. Full Article
bug Software Engineer - Debug and Performance Analysis Tools, Experienced Professionals, Cambridge, UK, Software Engineering By careers.peopleclick.com Published On :: Wednesday, October 21, 2020 8:24:08 AM EDT We are looking for an enthusiastic software developer with understanding of Java or modern C++, to join the Arm Mobile Studio team.The role involves collaborating with highly motivated developers from different backgrounds, and customers throughout the world, to craft the next generation of our performance analysis tools for Arm CPUs and Mali GPUs. As part of this team, you would help create new features, maintain existing ones, and support the engineering infrastructure for build, test, and continuous integration. We also help to support both internal and external customers, and contribute to our developer documentation, developer website, and community forums.We are growing the team to help deliver features that support the full breadth of Arm's product portfolio. Our tools are used to optimize the latest smart cars, drones, mobile games, and machine learning applications, your ideas will make a difference and help to bring world-beating products to market. Full Article
bug Senior Software Engineer – HPC debug and analysis tools (Fixed Term Contract), Experienced Professionals, Warwick, UK, Software Engineering By careers.peopleclick.com Published On :: Tuesday, November 24, 2020 1:21:43 PM EST Please note this is a Fixed Term Contract ending Sept 2021 We are looking for a highly skilled, technically capable senior software engineer to join the team of Arm Forge at Warwick. You will be passionate about making a difference through building great quality products.As an experienced developer, you’ll have a methodical approach to debugging and performance analysis and understand how developers will use our tools to achieve their objectives. Working as part of a team of C++ software engineers based in Warwick you will help to develop the Arm Forge Debug and Profiling tools.Arm Forge is used by developers to increase software performance or fix software bugs from single Linux servers right up to the largest supercomputer on the planet. Our tools span a wide range of use cases; from C/C++/Python developers writing multithreaded server applications or ML and data analysis applications, to C/C++/Fortran/Python HPC developers scaling to millions of cores.To learn more about our group and the products please check https://developer.arm.com/hpc.Main DutiesWe are looking for a highly skilled and motivated senior software engineer who is passionate about producing quality valuable software to join our elite team based in Warwick.Responsible for developing quality functionality on schedule, including specification, design, development, documentation and test.Drive forward major features or improvements and increase quality into the product.Expected to integrate with existing ARM process and infrastructure where possible and use your experience to introduce new processes where required. Full Article
bug How I Learned to Stop Worrying and Love the Bug By beta.prx.org Published On :: Thu, 24 Oct 2019 19:09:56 -0000 When most of us heard about the "insect apocalypse" we were worried. When producer Jimmy Gutierrez heard it, he thought "this is great." Today he takes a journey in which he tries to learn to appreciate our many-legged companions. Want to read a transcript or support the podcast? Check out our website. Full Article
bug Ask Sam: What Are All These Ladybugs Doing In My House? By www.nhpr.org Published On :: Fri, 19 Feb 2021 12:05:00 +0000 Every other Friday on Morning Edition, Outside/In host Sam Evans-Brown tackles a question from a listener. Suzanne from Concord asks: “I’m trying to find out why ladybugs are in my house in the spring, and did they all live together in my house over the winter? And if they did that, what did they eat? Or do they eat? Do they hibernate? And now they’re dropping dead, I mean out of six ladybugs, there are two alive.” Note: This eidition of Ask Sam originally aired in March of 2020. What you are most likely seeing is called (among many other things) the Harlequin Ladybeetle . It gets that name (as well as all its others) because it has a lot of different presentations — many different numbers and arrangements of spots — and it's an invasive species from Asia. “It’s basically been released as a biological control agent, in multiple places,” says William Fincham, who researches ladybugs with the UK Centre for Ecology and Hydrology, “In the U.S, in multiple places in Europe as well.” Even Full Article
bug CERT-In finds multiple bugs in Microsoft Edge, advises users to update By cio.economictimes.indiatimes.com Published On :: Thu, 25 Apr 2024 12:25:00 +0530 "Multiple vulnerabilities have been reported in Microsoft Edge (chromium-based) which could allow the remote attacker to cause a denial of service condition, remote code execution, sensitive information disclosure and security restriction bypass on the targeted system," said the CERT-In advisory. Full Article
bug Crazy Texan Catches the Acting Bug and Starts Producing Her Own Weekly Web-TV Show! By www.24-7pressrelease.com Published On :: Wed, 13 Mar 2013 08:00:00 GMT After years of booking her clients for television, one call changed the way this public relations professional felt about being in front of the camera instead of behind the scenes. Full Article
bug BUGAK KIM Supplies Traditional Korean Finger Food to Stayfolio By www.24-7pressrelease.com Published On :: Fri, 27 Sep 2024 08:00:00 GMT Supplying welcome food to luxurious traditional Korean-style accommodations in South Korea Full Article
bug Curator Karla Ferguson's Work Shines in Tim Okamura's Onna-Bugeisha: Warriors of Light on Display Now at Pittsburgh's August Wilson African American Cultural Center By www.24-7pressrelease.com Published On :: Fri, 26 Jan 2024 08:00:00 GMT Closing Reception with Ferguson and Okamura Set for February 15, 7:30 – 9:00 pm Full Article
bug Debug Pest Control Appoints Justin Rechter as Director of People Operations and Culture By www.24-7pressrelease.com Published On :: Tue, 21 May 2024 08:00:00 GMT Talent Acquisition Expert Joins Leadership Team to Drive Strategic Recruitment Initiatives Full Article
bug From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25 By www.tenable.com Published On :: Tue, 22 Oct 2024 11:11:11 -0400 Twenty five years after the launch of CVE, the Tenable Security Response Team has handpicked 25 vulnerabilities that stand out for their significance.BackgroundIn January 1999, David E. Mann and Steven M. Christey published the paper “Towards a Common Enumeration of Vulnerabilities” describing an effort to create interoperability between multiple vulnerability databases. To achieve a common taxonomy for vulnerabilities and exposures, they proposed Common Vulnerabilities and Exposures (CVE). In September 1999, the MITRE Corporation finalized the first CVE list, which included 321 records. CVE was revealed to the world the following month.As of October 2024, there are over 240,000 CVEs. including many that have significantly impacted consumers, businesses and governments. The Tenable Security Response Team has chosen to highlight the following 25 significant vulnerabilities, followed by links to product coverage for Tenable customers to utilize.25 Significant CVEsCVE-1999-0211: SunOS Arbitrary Read/Write VulnerabilityArbitrary ReadArbitrary WriteLocalCritical1999Why it’s significant: To our knowledge, there is no formally recognized “first CVE.” However, the GitHub repository for CVE.org shows that the first CVE submitted was CVE-1999-0211 on September 29, 1999 at 12:00AM. Because it was the first one, we’ve chosen to highlight it. The vulnerability was first identified in 1991 and a revised patch was issued in 1994.CVE-2010-2568: Windows Shell Remote Code Execution VulnerabilityRemote Code ExecutionExploitedZero-DayLocalStuxnetHigh2010Why it’s significant: Regarded as one of the most sophisticated cyberespionage tools ever created, Stuxnet was designed to target SCADA systems in industrial environments to reportedly sabotage Iran's nuclear program. Stuxnet exploited CVE-2010-2568 as one of its initial infection vectors, spreading via removable drives. Once a compromised USB drive was inserted into a system, Stuxnet was executed automatically via the vulnerability, infecting the host machine, propagating to other systems through network shares and additional USB drives.CVE-2014-0160: OpenSSL Information Disclosure VulnerabilityHeartbleedInformation DisclosureExploitedZero-DayNetworkCybercriminalsHigh2014Why it’s significant: Dubbed “Heartbleed” because it was found in the Heartbeat extension of OpenSSL, this vulnerability allows an attacker, without prior authentication, to send a malicious heartbeat request with a false length field, claiming the packet contains more data than it does. The receiving system would then return data from its memory extending beyond the legitimate request, which may include sensitive private data, such as server keys and user credentials. OpenSSL is used by millions of websites, cloud services, and even VPN software, for encryption, making Heartbleed one of the most widespread vulnerabilities at the time.CVE-2014-6271: GNU Bash Shellshock Remote Code Execution VulnerabilityShellshock Bash Bug Remote Code ExecutionExploitedZero-DayNetworkCybercriminalsCritical2014Why it’s significant: An attacker could craft an environment variable that contained both a function definition and additional malicious code. When Bash, a command interpreter used by Unix-based systems including Linux and macOS, processed this variable, it would execute the function, but also run the arbitrary commands appended after the function definition. “Shellshock” quickly became one of the most severe vulnerabilities discovered, comparable to Heartbleed’s potential impact. Attackers could exploit Shellshock to gain full control of vulnerable systems, leading to data breaches, service interruptions and malware deployment. The impact extended far beyond local systems. Bash is used by numerous services, particularly web servers, via CGI scripts to handle HTTP requests.CVE-2015-5119: Adobe Flash Player Use After FreeRemote Code Execution Denial-of-ServiceExploitedZero-DayCybercriminalsAPT GroupsCritical2015Why it’s significant: Discovered during the Hacking Team data breach, it was quickly weaponized, appearing in multiple exploit kits. CVE-2015-5119 is a use-after-free flaw in Flash’s ActionScript ByteArray class, allowing attackers to execute arbitrary code by tricking users into visiting a compromised website. It was quickly integrated into attack frameworks used by Advanced Persistent Threat (APT) groups like APT3, APT18, and Fancy Bear (APT28). These groups, with ties to China and Russia, used the vulnerability to spy on and steal data from governments and corporations. Fancy Bear has been associated with nation-state cyber warfare, exploiting Flash vulnerabilities for political and military intelligence information gathering. This flaw, along with several other Flash vulnerabilities, highlighted Flash’s risks, accelerating its eventual phase-out.CVE-2017-11882: Microsoft Office Equation Editor Remote Code Execution VulnerabilityRemote Code ExecutionExploitedNetworkCybercriminalsAPT GroupsHigh2017Why it’s significant: The vulnerability existed for 17 years in Equation Editor (EQNEDT32.EXE), a Microsoft Office legacy component used to insert and edit complex mathematical equations within documents. Once CVE-2017-11882 became public, cybercriminals and APT groups included it in maliciously crafted Office files. It became one of 2018’s most exploited vulnerabilities and continues to be utilized by various threat actors including SideWinder.CVE-2017-0144: Windows SMB Remote Code Execution VulnerabilityEternalBlueRemote Code ExecutionExploitedNetworkWannaCry NotPetyaHigh2017Why it’s significant: CVE-2017-0144 was discovered by the National Security Agency (NSA) and leaked by a hacker group known as Shadow Brokers, making it widely accessible. Dubbed “EternalBlue,” its capacity to propagate laterally through networks, often infecting unpatched machines without human interaction, made it highly dangerous. It was weaponized in the WannaCry ransomware attack in May 2017 and spread globally. It was reused by NotPetya, a data-destroying wiper originally disguised as ransomware. NotPetya targeted companies in Ukraine before spreading worldwide. This made it one of history’s costliest cyberattacks.CVE-2017-5638: Apache Struts 2 Jakarta Multipart Parser Remote Code Execution VulnerabilityRemote Code ExecutionExploitedNetworkEquifax BreachCritical2017Why it’s significant: This vulnerability affects the Jakarta Multipart Parser in Apache Struts 2, a popular framework for building Java web applications. An attacker can exploit it by injecting malicious code into HTTP headers during file uploads, resulting in remote code execution (RCE), giving attackers control of the web server. CVE-2017-5638 was used in the Equifax breach, where personal and financial data of 147 million people was stolen, emphasizing the importance of patching widely-used frameworks, particularly in enterprise environments, to prevent catastrophic data breaches.CVE-2019-0708: Remote Desktop Services Remote Code Execution VulnerabilityBlueKeep DejaBlue Remote Code ExecutionExploitedNetworkRansomware GroupsCybercriminalsCritical2019Why it’s significant: Dubbed "BlueKeep," this vulnerability in Windows Remote Desktop Services (RDS) was significant for its potential for widespread, self-propagating attacks, similar to the infamous WannaCry ransomware. An attacker could exploit this flaw to execute arbitrary code and take full control of a machine through Remote Desktop Protocol (RDP), a common method for remote administration. BlueKeep was featured in the Top Routinely Exploited Vulnerabilities list in 2022 and was exploited by affiliates of the LockBit ransomware group.CVE-2020-0796: Windows SMBv3 Client/Server Remote Code Execution VulnerabilitySMBGhost EternalDarknessRemote Code ExecutionExploited NetworkCybercriminalsRansomware GroupsCritical2020Why it’s significant: Its discovery evoked memories of EternalBlue because of the potential for it to be wormable, which is what led to it becoming a named vulnerability. Researchers found it trivial to identify the flaw and develop proof-of-concept (PoC) exploits for it. It was exploited in the wild by cybercriminals, including the Conti ransomware group and its affiliates.CVE-2019-19781: Citrix ADC and Gateway Remote Code Execution VulnerabilityPath TraversalExploitedNetworkAPT GroupsRansomware GroupsCybercriminalsCritical2019Why it’s significant: This vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway is significant due to its rapid exploitation by multiple threat actors, including state-sponsored groups and ransomware affiliates. By sending crafted HTTP requests, attackers could gain RCE and take full control of affected devices to install malware or steal data. The vulnerability remained unpatched for a month after its disclosure, leading to widespread exploitation. Unpatched systems are still being targeted today, highlighting the risk of ignoring known vulnerabilities.CVE-2019-10149: Exim Remote Command Execution VulnerabilityRemote Command ExecutionExploitedNetworkAPT GroupsCybercriminalsCritical2019Why it’s significant: This vulnerability in Exim, a popular Mail Transfer Agent, allows attackers to execute arbitrary commands with root privileges simply by sending a specially crafted email. The availability of public exploits led to widespread scanning and exploitation of vulnerable Exim servers, with attackers using compromised systems to install cryptocurrency miners (cryptominers), launch internal attacks or establish persistent backdoors. The NSA warned that state-sponsored actors were actively exploiting this flaw to compromise email servers and gather sensitive information.CVE-2020-1472: Netlogon Elevation of Privilege VulnerabilityZerologonElevation of PrivilegeExploitedLocalRansomware GroupsAPT GroupsCybercriminalsCritical2020Why it’s significant: This vulnerability in the Netlogon Remote Protocol (MS-NRPC) allows attackers with network access to a Windows domain controller to reset its password, enabling them to impersonate the domain controller and potentially take over the entire domain. Its severity was underscored when Microsoft reported active exploitation less than two months after disclosure and the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to patch the flaw. Despite available patches, it continues to be exploited by ransomware groups, APT groups, and others, highlighting its broad and ongoing impact on network security.CVE-2017-5753: CPU Speculative Execution Bounds Check Bypass VulnerabilitySpectreSpeculative Execution Bounds Check BypassLocalMedium2018Why it’s significant: In a speculative execution process, an idle microprocessor waiting to receive data speculates what the next instruction might be. Although meant to enhance performance, this process became a fundamental design flaw affecting the security of numerous modern processors. In Spectre’s case, an attacker-controlled process could read arbitrary memory belonging to another process. Since its discovery in January 2018, Spectre has affected nearly all modern processors from Intel, AMD and ARM. While it’s difficult to execute a successful Spectre attack, fully remediating the root cause is hard and requires microcode as well as operating system updates to mitigate the risk.CVE-2017-5754: CPU Speculative Execution Rogue Data Cache Load VulnerabilityMeltdownSpeculative Execution Rogue Data Cache LoadLocalHigh2018Why it’s significant: Meltdown, another speculative execution vulnerability released alongside Spectre, can allow a userspace program to read privileged kernel memory. It exploits a race condition between the memory access and privilege checking while speculatively executing instructions. Meltdown impacts desktop, laptop and cloud systems and, according to researchers, may affect nearly every Intel processor released since 1995. With a wide reaching impact, both Spectre and Meltdown sparked major interest in a largely unexplored security area. The result: a slew of research and vulnerability discoveries, many of which were also given names and logos. While there’s no evidence of a successful Meltdown exploit, the discovery showcased the risk of security boundaries enforced by hardware.CVE-2021-36942: Windows LSA Spoofing VulnerabilityPetitPotamSpoofingExploitedZero-DayNetworkRansomware GroupsHigh2021Why it’s significant: This vulnerability can force domain controllers to authenticate to an attacker-controlled destination. Shortly after a PoC was disclosed, it was adopted by ransomware groups like LockFile, which have chained Microsoft Exchange vulnerabilities with PetitPotam to take over domain controllers. Patched in the August 2021 Patch Tuesday release, the initial patch for CVE-2021-36942 only partially mitigated the issue, with Microsoft pushing general mitigation guidance for defending against NTLM Relay Attacks.CVE-2022-30190: Microsoft Windows Support Diagnostic Tool Remote Code ExecutionFollinaRemote Code ExecutionExploitedZero-DayLocalQakbot RemcosHigh2022Why it’s significant: Follina, a zero-day RCE vulnerability in MSDT impacting several versions of Microsoft Office, was later designated CVE-2022-30190. After public disclosure in May 2022, Microsoft patched Follina in the June 2022 Patch Tuesday. After disclosure, reports suggested that Microsoft dismissed the flaw’s initial disclosure as early as April 2022. Follina has been widely adopted by threat actors and was associated with some of 2021’s top malware strains in a joint cybersecurity advisory from CISA and the Australian Cyber Security Centre (ACSC), operating under the Australian Signals Directorate (ASD).CVE-2021-44228: Apache Log4j Remote Code Execution VulnerabilityLog4ShellRemote Code ExecutionExploitedNetworkCybercriminalsAPT GroupsCritical2021Why it’s significant: Log4j, a Java logging library widely used across many products and services, created a large attack surface. The discovery of CVE-2021-44228, dubbed “Log4Shell,” caused great concern, as exploitation simply requires sending a specially crafted request to a server running a vulnerable version of Log4j. After its disclosure, Log4Shell was exploited in attacks by cryptominers, DDoS botnets, ransomware groups and APT groups including those affiliated with the Iranian Islamic Revolutionary Guard Corps (IRGC).CVE-2021-26855: Microsoft Exchange Server Server-Side Request Forgery VulnerabilityProxyLogonServer-Side Request Forgery (SSRF)ExploitedZero-DayNetworkAPT Groups Ransomware GroupsCybercriminalsCritical2021Why it’s significant: CVE-2021-26855 was discovered as a zero-day along with four other vulnerabilities in Microsoft Exchange Server. It was exploited by a nation-state threat actor dubbed HAFNIUM. By sending a specially crafted HTTP request to a vulnerable Exchange Server, an attacker could steal the contents of user mailboxes using ProxyLogon. Outside of HAFNIUM, ProxyLogon has been used by ransomware groups and other cybercriminals. Its discovery created a domino effect, as other Exchange Server flaws, including ProxyShell and ProxyNotShell, were discovered, disclosed and subsequently exploited by attackers.CVE-2021-34527: Microsoft Windows Print Spooler Remote Code Execution VulnerabilityPrintNightmareRemote Code ExecutionExploitedLocalAPT GroupsRansomware GroupsCybercriminalsHigh2021Why it’s significant: This RCE in the ubiquitous Windows Print Spooler could grant authenticated attackers arbitrary code execution privileges as SYSTEM. There was confusion surrounding the disclosure of this flaw, identified as CVE-2021-34527 and dubbed “PrintNightmare.” Originally, CVE-2021-1675, disclosed in June 2021, was believed to be the real PrintNightmare. However, Microsoft noted CVE-2021-1675 is “similar but distinct” from PrintNightmare. Since its disclosure, several Print Spooler vulnerabilities were disclosed, while a variety of attackers, including the Magniber and Vice Society ransomware groups exploited PrintNightmare.CVE-2021-27101: Accellion File Transfer Appliance (FTA) SQL Injection VulnerabilitySQL InjectionExploitedZero-DayNetworkRansomware GroupCritical2021Why it’s significant: The file transfer appliance from Accellion (now known as Kiteworks) was exploited as a zero-day by the CLOP ransomware group between December 2020 and early 2021. Mandiant, hired by Kiteworks to investigate, determined that CLOP (aka UNC2546) exploited several flaws in FTA including CVE-2021-27101. This was CLOP’s first foray into targeting file transfer solutions, as they provide an easy avenue for the exfiltration of sensitive data that can be used to facilitate extortion.CVE-2023-34362: Progress Software MOVEit Transfer SQL Injection VulnerabilitySQL InjectionExploitedZero-DayNetworkRansomware GroupCritical2023Why it’s significant: CLOP’s targeting of file transfer solutions culminated in the discovery of CVE-2023-34362, a zero-day in Progress Software’s MOVEit Transfer, a secure managed file transfer software. CLOP targeted MOVEit in May 2023 and the ramifications are still felt today. According to research conducted by Emsisoft, 2,773 organizations have been impacted and information on over 95 million individuals has been exposed as of October 2024. This attack underscored the value in targeting file transfer solutions.CVE-2023-4966: Citrix NetScaler and ADC Gateway Sensitive Information Disclosure VulnerabilityCitrixBleedInformation DisclosureExploitedZero-DayNetworkRansomware GroupsAPT GroupsCritical2023Why it’s significant: CVE-2023-4966, also known as “CitrixBleed,” is very simple to exploit. An unauthenticated attacker could send a specially crafted request to a vulnerable NetScaler ADC or Gateway endpoint and obtain valid session tokens from the device’s memory. These session tokens could be replayed back to bypass authentication, and would persist even after the available patches had been applied. CitrixBleed saw mass exploitation after its disclosure, and ransomware groups like LockBit 3.0 and Medusa adopted it.CVE-2023-2868: Barracuda Email Security Gateway (ESG) Remote Command Injection VulnerabilityRemote Command InjectionExploitedZero-DayNetworkAPT GroupsCritical2023Why it’s significant: Researchers found evidence of zero-day exploitation of CVE-2023-2868 in October 2022 by the APT group UNC4841. While Barracuda released patches in May 2023, the FBI issued a flash alert in August 2023 declaring them “ineffective,” stating that “active intrusions” were being observed on patched systems. This led to Barracuda making an unprecedented recommendation for the “immediate replacement of compromised ESG appliances, regardless of patch level.”CVE-2024-3094: XZ Utils Embedded Malicious Code VulnerabilityEmbedded Malicious CodeZero-DayUnknown Threat Actor (Jia Tan)Critical2024Why it’s significant: CVE-2024-3094 is not a traditional vulnerability. It is a CVE assigned for a supply-chain backdoor discovered in XZ Utils, a compression library found in various Linux distributions. Developer Andres Freund discovered the backdoor while investigating SSH performance issues. CVE-2024-3094 highlighted a coordinated supply chain attack by an unknown individual that contributed to the XZ GitHub project for two and a half years, gaining the trust of the developer before introducing the backdoor. The outcome of this supply chain attack could have been worse were it not for Freund’s discovery.Identifying affected systemsA list of Tenable plugins for these vulnerabilities can be found on the individual CVE pages:CVE-1999-0211CVE-2010-2568CVE-2014-0160CVE-2014-6271CVE-2015-5119CVE-2017-11882CVE-2017-0144CVE-2017-5638CVE-2019-0708CVE-2020-0796CVE-2019-19781CVE-2019-10149CVE-2020-1472CVE-2017-5753CVE-2017-5754CVE-2021-36942CVE-2022-30190CVE-2021-44228CVE-2021-26855CVE-2021-34527CVE-2021-27101CVE-2023-34362CVE-2023-4966CVE-2023-2868CVE-2024-3094 Full Article
bug pacman-debug 7.0.0.r3.g7736133-1.parabola1 armv7h By parabolagnulinux.org Published On :: Fri, 18 Oct 2024 12:37:30 +0000 Detached debugging symbols for pacman Full Article Libre-Testing armv7h
bug qtcreator-debug 6.0.0-1.parabola1 i686 By parabolagnulinux.org Published On :: Sun, 05 Dec 2021 15:23:14 +0000 Detached debugging symbols for qtcreator Full Article Libre-Testing i686
bug pacman-debug 7.0.0.r3.g7736133-1.parabola1 i686 By parabolagnulinux.org Published On :: Fri, 18 Oct 2024 12:37:29 +0000 Detached debugging symbols for pacman Full Article Libre-Testing i686
bug file-debug 5.38-1 x86_64 By parabolagnulinux.org Published On :: Wed, 26 Feb 2020 17:20:46 +0000 Detached debugging symbols for file Full Article Libre-Testing x86_64
bug blender-debug 17:4.1.1-8.parabola2 x86_64 By parabolagnulinux.org Published On :: Thu, 30 May 2024 22:04:00 +0000 Detached debugging symbols for blender Full Article Libre-Testing x86_64
bug pacman-debug 7.0.0.r3.g7736133-1.parabola1 x86_64 By parabolagnulinux.org Published On :: Fri, 18 Oct 2024 12:37:29 +0000 Detached debugging symbols for pacman Full Article Libre-Testing x86_64
bug Don’t Let the Massive Emergence of Cicadas Bug Your Cooling Tower Performance By www.achrnews.com Published On :: Wed, 08 May 2024 14:00:00 -0400 With a double brood of cicadas forecasted to awaken, now is the time to prepare for how to deal with the mess they will leave behind and the potential damage they can do to equipment. Full Article
bug Re: 4 recent security bugs in GNOME's libsoup By seclists.org Published On :: Tue, 12 Nov 2024 17:52:14 GMT Posted by Alan Coopersmith on Nov 12It appears that Mitre issued CVE id's for the first 3 of these yesterday: https://www.cve.org/CVERecord?id=CVE-2024-52530 https://www.cve.org/CVERecord?id=CVE-2024-52531 https://www.cve.org/CVERecord?id=CVE-2024-52532 Full Article
bug Episode 101: Andreas Zeller on Debugging By feedproxy.google.com Published On :: Fri, 20 Jun 2008 09:18:24 +0000 In this episode we're talking to Andreas Zeller. about debugging. We started the discussion with an explanation of what debugging and how it works in principle. We then briefly discussed the relationship between debugging and testing. Next was the importance of the scientific method for debugging. We then looked as debugging as a search problem, leading to a discussion about delta debugging, the main topic of this discussion. We concluded the discussion by looking at the practical usability of delta debugging and the relationship to other means of automatically finding problems in software. Full Article
bug SE-Radio-Episode-280-Gerald-Weinberg-on-Bugs-Errors-and-Software-Quality By traffic.libsyn.com Published On :: Tue, 24 Jan 2017 20:34:27 +0000 Host Marcus Blankenship talks with Gerald Weinberg about his new book, Errors: Bugs, Boo-boos, and Blunders, focusing on why programmers make errors, how teams can improve their software, and how management should think of and discuss errors. Full Article
bug SE-Radio-Episode-282-Donny-Nadolny-on-Debugging-Distributed-Systems By traffic.libsyn.com Published On :: Tue, 14 Feb 2017 21:03:32 +0000 Donny Nadolny of PagerDuty joins Robert Blumen to tell the story of debugging an issue that PagerDuty encountered when they set up a Zookeeper cluster that spanned across two geographically separated datacenters in different regions. Full Article
bug Episode 367: Diomidis Spinellis on Debugging By traffic.libsyn.com Published On :: Tue, 21 May 2019 19:46:56 +0000 Felienne talks to Diomidis Spinellis about different forms of debugging. From using print-statements to version-control systems and operating system tools. We also discuss debugging strategies for different types of programming systems. Full Article
bug Episode 441 Shipping Software - With Bugs By traffic.libsyn.com Published On :: Tue, 05 Jan 2021 21:11:22 +0000 James Smith, CEO and co-founder of Bugsnag discusses “Why it is ok to ship your software with Bugs.” Full Article
bug Episode 512: Tim Post on Rubber Duck Debugging By se-radio.net Published On :: Tue, 17 May 2022 21:19:35 +0000 Tim Post of echoreply.io discusses Rubber Duck Debugging, a way to wrap your head about problems and solutions. Host Felienne spoke with Post about Rubber Duck debugging, and how it can help you to find answers to complex problems. Full Article
bug SE Radio 634: Jim Bugwadia on Kubernetes Policy as Code By se-radio.net Published On :: Wed, 25 Sep 2024 23:57:00 +0000 Jim Bugwadia, CEO of Nirmata and a committer to the Kyverno projects, joins host Robert Blumen for a discussion of policy-as-code and the open source Kyverno project. The discussion covers the nature of policies; policies and security; policies and compliance to standards; security scans that generate reports compared to tools that allow or deny operations at run time; Kyverno as a kubernetes service; the Kyverno helm charts; the components of Kyverno; bootstrapping a kubernetes cluster with Kyverno; installing policies; implementing policies; customizing policies; packaging and installing policies; kubernetes dynamic admission controllers; the Kyverno admission controller; securing Kyverno itself; observability of Kyverno; types of reports and messages available to cluster users. This episode is sponsored by QA Wolf. Full Article
bug FROM THE ARCHIVES: John Spurling at UnVoxxed Hawaii 2020 on Debugging By traffic.libsyn.com Published On :: Fri, 31 Dec 2021 08:52:26 +0000 Jim Grisanzio talks with John Spurling, a JVM engineer at Twitter, at UnVoxxed Hawaii 2020 about debugging and the mental process of solving difficult technical issues. John Spurling, Twitter https://twitter.com/synecdotal Jim Grisanzio, Java Developer Relations https://twitter.com/jimgris Video on YouTube https://youtu.be/6dwOPQSJwaI UnVoxxed Hawaii https://flic.kr/s/aHsmLF23KD https://twitter.com/UnVoxxedHawaii https://www.youtube.com/playlist?list=PLX8CzqL3ArzU0APb6QgpMMTMPEz1jok5Q Seymour Cray https://en.wikipedia.org/wiki/Seymour_Cray Make It Stick: The Science of Successful Learning https://www.amazon.com/Make-Stick-Science-Successful-Learning/dp/0674729013 Full Article
bug The Lost Art of Debugging with Mark Heckler By dukescorner.libsyn.com Published On :: Mon, 22 Aug 2022 07:39:25 +0000 JavaOne 2022 Speaker Preview In this conversation Oracle's Jim Grisanzio talks with Java developer and JavaOne 2022 speaker Mark Heckler from St. Louis. Missouri in the United States. Mark is a software developer and developer advocate at Microsoft, a Java Champion, a conference speaker, and an author. Check out his book Spring Boot: Up and Running. In this conversation Mark previews his session at JavaOne — Das Boot: Diving into Debugging Spring Boot Applications. Mark also talks about the value of technical conferences and the community. JavaOne 2022 from October 17-20 in Las Vegas JavaOne 2022: Registration and Sessions JavaOne Update 1 JavaOne Update 2 Mark Heckler, Principal Cloud Developer Advocate for Java/JVM Languages at Microsoft @mkheck Java Development and Community OpenJDK Inside Java Dev.Java @java on Twitter Java on YouTube Duke's Corner Podcast Host Jim Grisanzio, Oracle Java Developer Relations, @jimgris Full Article
bug xlibre Xnest security advisory & bugfix releases By seclists.org Published On :: Thu, 31 Oct 2024 17:02:37 GMT Posted by Enrico Weigelt, metux IT consult on Oct 31XLibre project security advisory --------------------------------- As Xlibre Xnest is based on Xorg, it is affected by some security issues which recently became known in Xorg: CVE-2024-9632: can be triggered by providing a modified bitmap to the X.Org server. CVE-2024-9632: Heap-based buffer overflow privilege escalation in _XkbSetCompatMap See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632 Affected versions: * 24.1.0... Full Article
bug An unusual Google Keyboard bug By weiyen.net Published On :: Fri, 08 Nov 2024 07:47:07 +0000 Comments Full Article
bug We Built a Self-Healing System to Survive a Concurrency Bug at Netflix By pushtoprod.substack.com Published On :: Fri, 08 Nov 2024 14:52:48 +0000 Comments Full Article