‼ CVE-2023-25692 ‼
📖 Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0595 ‼
📖 Read
via "National Vulnerability Database".
A CWE-117: Improper Output Neutralization for Logs vulnerability exists that could cause the misinterpretation of log files when malicious packets are sent to the Geo SCADA server's database web port (default 443). Affected products: EcoStruxure Geo SCADA Expert 2019, EcoStruxure Geo SCADA Expert 2020, EcoStruxure Geo SCADA Expert 2021(All Versions prior to October 2022), ClearSCADA (All Versions)📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1007 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Twister Antivirus 8.17. It has been declared as critical. This vulnerability affects unknown code in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221740.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1008 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Twister Antivirus 8.17. It has been rated as problematic. This issue affects some unknown processing in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-221741 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-25696 ‼
📖 Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in the Apache Airflow Hive Provider. This issue affects Apache Airflow Hive Provider versions before 5.1.3.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1010 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-25693 ‼
📖 Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in the Apache Airflow Sqoop Provider. This issue affects Apache Airflow Sqoop Provider versions before 3.1.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-25956 ‼
📖 Read
via "National Vulnerability Database".
Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider. This issue affects Apache Airflow AWS Provider versions before 7.2.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4105 ‼
📖 Read
via "National Vulnerability Database".
Improper Handling of Parameters vulnerability in BG-TEK COSLAT Firewall allows Remote Code Inclusion.This issue affects COSLAT Firewall: from 5.24.0.R.20180630 before 5.24.0.R.20210727.📖 Read
via "National Vulnerability Database".
🕴 To Safeguard Critical Infrastructure, Go Back to Basics 🕴
📖 Read
via "Dark Reading".
CISA's recently released cybersecurity performance goals can help lower risk and thwart the impact of cyberattacks.📖 Read
via "Dark Reading".
Dark Reading
To Safeguard Critical Infrastructure, Go Back to Basics
CISA's recently released cybersecurity performance goals can help lower risk and thwart the impact of cyberattacks.
🕴 TikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount 🕴
📖 Read
via "Dark Reading".
Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security.📖 Read
via "Dark Reading".
Dark Reading
TikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount
Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security.
‼ CVE-2021-35369 ‼
📖 Read
via "National Vulnerability Database".
Arbitrary File Read vulnerability found in Peacexie ImCat v.5.2 fixed in v.5.4 allows attackers to obtain sensitive information via the filtering_get_contents function.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33387 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows attacker to execute arbitrary code via a crafted get request.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33224 ‼
📖 Read
via "National Vulnerability Database".
File upload vulnerability in Umbraco Forms v.8.7.0 allows unauthenticated attackers to execute arbitrary code via a crafted web.config and asp file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4203 ‼
📖 Read
via "National Vulnerability Database".
A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34064 ‼
📖 Read
via "National Vulnerability Database".
An issue found in Koel v.5.1.4 and before allows remote attackers to gain access to sensitive information via the login form parameters.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35370 ‼
📖 Read
via "National Vulnerability Database".
An issue found in Peacexie Imcat v5.4 allows attackers to execute arbitrary code via the incomplete filtering function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-23205 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in lib60870 v2.3.2. There is a memory leak in lib60870/lib60870-C/examples/multi_client_server/multi_client_server.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0585 ‼
📖 Read
via "National Vulnerability Database".
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43923 ‼
📖 Read
via "National Vulnerability Database".
IBM Maximo Application Suite 8.8.0 and 8.9.0 stores potentially sensitive information that could be read by a local user. IBM X-Force ID: 241584.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0586 ‼
📖 Read
via "National Vulnerability Database".
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor+ role to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".