Two critical security vulnerabilities emerged in the Traccar GPS tracking system, allowing unauthenticated attackers to obtain remote code execution Routing unrestricted file upload errors among the vulnerabilities identified as CVE-2024-24809 (CVSS score). : 8.5) and CVE-2024-31214 (CVSS score : 9.7). And there is, especially on systems where guest registration in Traccar has been enabled by default 5, as confirmed by Horizon3.ai analyst Navin Sunakavalli. CVE-2024-24809 allows attackers to change file paths, while CVE-2024-31214 allows unrestricted uploading of machine image files, and allows attackers to upload arbitrary files to the file system by overwriting a specific file, such as a crontab or kernel module, . depending on the operating system used That could be the kill. Naming restrictions on Debian/Ubuntu-based systems can prevent some exploits, but on Windows an attacker can achieve remote code execution by placing a malicious shortcut file in the startup folder These vulnerabilities affect Traccar versions 5.1 through 5.12. The issues were fixed in the April 2024 release of Traccar 6 which enables default registration to reduce the attack surface. Users are advised to update to the latest version to mitigate these risks.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...