‼ CVE-2023-0677 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1.📖 Read
via "National Vulnerability Database".
👎1🔥1
♟️ Finland’s Most-Wanted Hacker Nabbed in France ♟️
📖 Read
via "Krebs on Security".
Julius "Zeekill" Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week in France. A notorious hacker convicted of perpetrating tens of thousands of cybercrimes, Kivimäki had been in hiding since October 2022, when he failed to show up in court and Finland issued an international warrant for his arrest.📖 Read
via "Krebs on Security".
Krebs on Security
Finland’s Most-Wanted Hacker Nabbed in France
Julius "Zeekill" Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week in France. A notorious hacker convicted of perpetrating…
‼ CVE-2017-20175 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125085 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in Gimmie Plugin 1.2.2. Affected is an unknown function of the file trigger_ratethread.php. The manipulation of the argument t/postusername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is f11a136e9cbd24997354965178728dc22a2aa2ed. It is recommended to upgrade the affected component. VDB-220206 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125084 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in Gimmie Plugin 1.2.2. This issue affects some unknown processing of the file trigger_referral.php. The manipulation of the argument referrername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is 7194a09353dd24a274678383a4418f2fd3fce6f7. It is recommended to upgrade the affected component. The identifier VDB-220205 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
📢 Windows 10 users locked out of devices by unskippable Microsoft 365 advert 📢
📖 Read
via "ITPro".
Entering payment information was the only way for some to enter their own PCs📖 Read
via "ITPro".
ITPro
Windows 10 users locked out of devices by unskippable Microsoft 365 advert
Entering payment information was the only way for some to enter their own PCs
📢 What is Apple's T2 security chip? 📢
📖 Read
via "ITPro".
Apple’s T2 security chip powers an array of security features in Macs including biometric login and data encryption📖 Read
via "ITPro".
channelpro
What is Apple's T2 security chip?
Apple’s T2 security chip powers an array of security features in Macs including biometric login and data encryption
📢 10 million customers exposed in JD Sports cyber attack 📢
📖 Read
via "ITPro".
The sports fashion retailer has urged customers to be “on the look-out" for scam emails in the wake of the incident📖 Read
via "ITPro".
ITPro
10 million customers exposed in JD Sports cyber attack
The sports fashion retailer has urged customers to be “on the look-out" for scam emails in the wake of the incident
📢 Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout 📢
📖 Read
via "ITPro".
For years the UK government has longed for a fully functional digital identity system, but it isn't helping those who are crying out to build it📖 Read
via "ITPro".
ITPro
Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout
For years the UK government has longed for a fully functional digital identity system, but it isn't helping those who are crying out to build it
📢 Cyber criminal groups wooing hackers with seven-figure salaries and holiday pay 📢
📖 Read
via "ITPro".
Paid leave, competitive salaries, and ‘friendly team’ environments were among the benefits highlighted by dark web job ads📖 Read
via "ITPro".
ITPro
Cyber criminal groups wooing hackers with seven-figure salaries and holiday pay
Paid leave, competitive salaries, and ‘friendly team’ environments were among the benefits highlighted by dark web job ads
📢 Hackers target business cloud environments by abusing Microsoft’s ‘verified publisher’ status 📢
📖 Read
via "ITPro".
Proofpoint research found that hackers deliberately abused verification procedures to dupe firms with malicious apps📖 Read
via "ITPro".
Cloud Pro
Hackers target business cloud environments by abusing Microsoft’s ‘verified publisher’ status
Proofpoint research found that hackers deliberately abused verification procedures to dupe firms with malicious apps
📢 Yandex data breach reveals source code littered with racist language 📢
📖 Read
via "ITPro".
Yandex source code for a range of key services was leaked to a popular hacker forum last week📖 Read
via "ITPro".
ITPro
Yandex data breach reveals source code littered with racist language
Yandex source code for a range of key services was leaked to a popular hacker forum last week
👍2
‼ CVE-2017-20176 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in ciubotaru share-on-diaspora 0.7.9. This vulnerability affects unknown code of the file new_window.php. The manipulation of the argument title/url leads to cross site scripting. The attack can be initiated remotely. The name of the patch is fb6fae2f8a9b146471450b5b0281046a17d1ac8d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-220204.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25853 ‼
📖 Read
via "National Vulnerability Database".
All versions of the package semver-tags are vulnerable to Command Injection via the getGitTagsRemote function due to improper input sanitization.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125086 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been found in Gimmie Plugin 1.2.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the file trigger_login.php. The manipulation of the argument userid leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is fe851002d20a8d6196a5abb68bafec4102964d5b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220207.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25855 ‼
📖 Read
via "National Vulnerability Database".
All versions of the package create-choo-app3 are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.📖 Read
via "National Vulnerability Database".
🕴 How Cybercriminals Are Operationalizing Money Laundering and What to Do About It 🕴
📖 Read
via "Dark Reading".
It's time to share threat intelligence, prioritize digital literacy and cyber hygiene, and use digital risk-protection services to stem the rising money laundering tide.📖 Read
via "Dark Reading".
Dark Reading
How Cybercriminals Are Operationalizing Money Laundering and What to Do About It
It's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem the rising money laundering tide.
❤1👍1
⚠ OpenSSH fixes double-free memory bug that’s pokable over the network ⚠
📖 Read
via "Naked Security".
It's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...📖 Read
via "Naked Security".
Naked Security
OpenSSH fixes double-free memory bug that’s pokable over the network
It’s a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code…
‼ CVE-2021-36226 ‼
📖 Read
via "National Vulnerability Database".
Western Digital My Cloud devices before OS5 do not use cryptographically signed Firmware upgrade files.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36225 ‼
📖 Read
via "National Vulnerability Database".
Western Digital My Cloud devices before OS5 allow REST API access by low-privileged accounts, as demonstrated by API commands for firmware uploads and installation.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44343 ‼
📖 Read
via "National Vulnerability Database".
CRMEB 4.4.4 is vulnerable to Any File download.📖 Read
via "National Vulnerability Database".