βΌ CVE-2023-25136 βΌ
π Read
via "National Vulnerability Database".
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."π Read
via "National Vulnerability Database".
π΄ MITRE Releases Tool to Design Cyber Resilient Systems π΄
π Read
via "Dark Reading".
Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber resiliency capabilities.π Read
via "Dark Reading".
Dark Reading
MITRE Releases Tool to Design Cyber-Resilient Systems
Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber-resiliency capabilities.
π΄ How the Cloud Is Shifting CISO Priorities π΄
π Read
via "Dark Reading".
The greatly expanding attack surface created by the cloud needs to be protected.π Read
via "Dark Reading".
Dark Reading
How the Cloud Is Shifting CISO Priorities
The greatly expanding attack surface created by the cloud needs to be protected.
ποΈ Serious security hole plugged in infosec tool binwalk ποΈ
π Read
via "The Daily Swig".
Path traversals could βvoid reverse engineering efforts and tamper with evidence collectedβπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Serious security hole plugged in infosec tool binwalk
Path traversals could βvoid reverse engineering efforts and tamper with evidence collectedβ
βΌ CVE-2023-24142 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingSize parameter in the setNetworkDiag function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24139 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagHost parameter in the setNetworkDiag function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24138 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the host_time parameter in the NTPSyncWithHost function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24153 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in the version parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24141 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingTimeOut parameter in the setNetworkDiag function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24152 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in the serverIp parameter in the function meshSlaveUpdate of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24149 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for root which is stored in the component /etc/shadow.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24151 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in the ip parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24150 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in the serverIp parameter in the function meshSlaveDlfw of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24144 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the hour parameter in the setRebootScheCfg function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24140 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingNum parameter in the setNetworkDiag function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24143 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagTracertHop parameter in the setNetworkDiag function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24147 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for the telnet service which is stored in the component /etc/config/product.ini.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24148 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the FileName parameter in the setUploadUserData function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34138 βΌ
π Read
via "National Vulnerability Database".
Insecure direct object references (IDOR) in the web server of Biltema IP and Baby Camera Software v124 allows attackers to access sensitive information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24155 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK T8 V4.1.5cu was discovered to contain a hard code password for the telnet service which is stored in the component /web_cste/cgi-bin/product.ini.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24154 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK T8 V4.1.5cu was discovered to contain a command injection vulnerability via the slaveIpList parameter in the function setUpgradeFW.π Read
via "National Vulnerability Database".