‼ CVE-2023-22997 ‼
📖 Read
via "National Vulnerability Database".
In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22998 ‼
📖 Read
via "National Vulnerability Database".
In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22999 ‼
📖 Read
via "National Vulnerability Database".
In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1100 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in SourceCodester Online Catering Reservation System 1.0. This affects an unknown part of the file /reservation/add_message.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222003.📖 Read
via "National Vulnerability Database".
📢 Paying ransomware gangs could fund up to ten additional attacks 📢
📖 Read
via "ITPro".
The research from Trend Micro highlights the potential domino effect of paying ransoms📖 Read
via "ITPro".
ITPro
Paying ransomware gangs could fund up to ten additional attacks
The research from Trend Micro highlights the potential domino effect of paying ransoms
📢 How to build a cyber-resilient business read to innovate and thrive 📢
📖 Read
via "ITPro".
Outperform your peers in your successful business outcomes📖 Read
via "ITPro".
ITPro
How to build a cyber-resilient business ready to innovate and thrive
Outperform your peers in your successful business outcomes
📢 MWC 2023: Huawei launches 'world's best' ransomware detection system 📢
📖 Read
via "ITPro".
Huawei claims its Cyber Engine database security system has a 99.9% detection rate, but experts have been quick to weaken the sentiment📖 Read
via "ITPro".
Cloud Pro
MWC 2023: Huawei launches 'world's best' ransomware detection system
Huawei claims its Cyber Engine database security system has a 99.9% detection rate, but experts have been quick to weaken the sentiment
📢 State-sponsored hackers are diversifying tactics, targeting small businesses 📢
📖 Read
via "ITPro".
Research has warned that state-sponsored threat actors will increasingly target smaller enterprises in 2023📖 Read
via "ITPro".
ITPro
State-sponsored hackers are diversifying tactics, targeting small businesses
Research has warned that state-sponsored threat actors will increasingly target smaller enterprises in 2023
📢 What you need to know about Gmail's new client-side encryption feature 📢
📖 Read
via "ITPro".
The new encryption feature will bolster security and give businesses greater control over access to data📖 Read
via "ITPro".
ITPro
What you need to know about Gmail's new client-side encryption feature
The new encryption feature will bolster security and give businesses greater control over access to data
👏1
📢 Australia commits to establishing second national cyber security agency 📢
📖 Read
via "ITPro".
The country is still aiming to be the most cyber-secure country in the world by 2030📖 Read
via "ITPro".
ITPro
Australia commits to establishing second national cyber security agency
The country is still aiming to be the most cyber-secure country in the world by 2030
📢 How to turn on Windows Defender 📢
📖 Read
via "ITPro".
Find out how to switch on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary📖 Read
via "ITPro".
ITPro
How to turn on Windows Defender
A simple guide on how to turn on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary
📢 News Corp admits China-linked hackers breached company for two years 📢
📖 Read
via "ITPro".
The News Corp breach follows recent news that threat actors had access to GoDaddy systems for three years📖 Read
via "ITPro".
ITPro
News Corp admits China-linked hackers breached company for two years
The News Corp breach follows recent news that threat actors had access to GoDaddy systems for three years
👏1
‼ CVE-2023-24045 ‼
📖 Read
via "National Vulnerability Database".
In Dataiku DSS 11.2.1, an attacker can download other Dataiku files that were uploaded to the myfiles section by specifying the target username in a download request.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1104 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-26608 ‼
📖 Read
via "National Vulnerability Database".
SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1103 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1105 ‼
📖 Read
via "National Vulnerability Database".
External Control of File Name or Path in GitHub repository flatpressblog/flatpress prior to 1.3.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22773 ‼
📖 Read
via "National Vulnerability Database".
Authenticated path traversal vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files in the underlying operating system.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0952 ‼
📖 Read
via "National Vulnerability Database".
Improper access controls on entries in Devolutions Server 2022.3.12 and earlier could allow an authenticated user to access sensitive data without proper authorization.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20952 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked. This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38736 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.📖 Read
via "National Vulnerability Database".