‼ CVE-2023-0760 ‼
📖 Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0759 ‼
📖 Read
via "National Vulnerability Database".
Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8.📖 Read
via "National Vulnerability Database".
⚠ OpenSSL fixes High Severity data-stealing bug – patch now! ⚠
📖 Read
via "Naked Security".
7 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English...📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
😱1
‼ CVE-2023-22953 ‼
📖 Read
via "National Vulnerability Database".
In ExpressionEngine before 7.2.6, remote code execution can be achieved by an authenticated Control Panel user.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0624 ‼
📖 Read
via "National Vulnerability Database".
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0574 ‼
📖 Read
via "National Vulnerability Database".
Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0 through 2.13.📖 Read
via "National Vulnerability Database".
🕴 Twitter Implements API Paywall; But Will That Solve Its Enormous Bot Crisis? 🕴
📖 Read
via "Dark Reading".
Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play?📖 Read
via "Dark Reading".
Dark Reading
Twitter Implements API Paywall, but Will That Solve Its Enormous Bot Crisis?
Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play?
🗓️ New XSS Hunter host Truffle Security faces privacy backlash 🗓️
📖 Read
via "The Daily Swig".
Anonymized numbers of bug discoveries swiftly deleted after pushback📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
New XSS Hunter host Truffle Security faces privacy backlash
Anonymized numbers of bug discoveries swiftly deleted after pushback
⚠ S3 Ep121: Can you get hacked and then prosecuted for it? [Audio + Text] ⚠
📖 Read
via "Naked Security".
Latest epsiode. Listen now!📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
🕴 In Perfect Harmony: Cybersecurity Regulation Harmonization 🕴
📖 Read
via "Dark Reading".
By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats.📖 Read
via "Dark Reading".
Dark Reading
In Perfect Harmony: Cybersecurity Regulation Harmonization
By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats.
👍1
🕴 NIST Picks IoT Standard for Small Electronics Cybersecurity 🕴
📖 Read
via "Dark Reading".
NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection.📖 Read
via "Dark Reading".
Dark Reading
NIST Picks IoT Standard for Small Electronics Cybersecurity
NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection.
‼ CVE-2022-48293 ‼
📖 Read
via "National Vulnerability Database".
The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48301 ‼
📖 Read
via "National Vulnerability Database".
The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48295 ‼
📖 Read
via "National Vulnerability Database".
The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22605 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48292 ‼
📖 Read
via "National Vulnerability Database".
The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22604 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48300 ‼
📖 Read
via "National Vulnerability Database".
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48296 ‼
📖 Read
via "National Vulnerability Database".
The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48294 ‼
📖 Read
via "National Vulnerability Database".
The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22603 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.📖 Read
via "National Vulnerability Database".