βΌ CVE-2023-1630 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, has been found in Jianming Antivirus 16.2.2022.418. Affected by this issue is some unknown functionality in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1632 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in Ellucian Banner Web Tailor 8.6 and classified as critical. This vulnerability affects unknown code of the file /PROD_ar/twbkwbis.P_FirstMenu of the component Login Page. The manipulation of the argument PIDM/WEBID leads to improper authorization. The attack can be initiated remotely. After submitting proper login credentials it becomes possible to generate new valid session identifiers on the OTP page. VDB-224014 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2015-10097 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in grinnellplans-php up to 3.0. It has been declared as critical. Affected by this vulnerability is the function interface_disp_page/interface_disp_page of the file read.php. The manipulation leads to sql injection. The attack can be launched remotely. The name of the patch is 57e4409e19203a94495140ff1b5a697734d17cfb. It is recommended to apply a patch to fix this issue. The identifier VDB-223801 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1635 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in OTCMS 6.72. It has been declared as problematic. Affected by this vulnerability is the function AutoRun of the file apiRun.php. The manipulation of the argument mode leads to cross site scripting. The attack can be launched remotely. The identifier VDB-224017 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1634 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in OTCMS 6.72. It has been classified as critical. Affected is the function UseCurl of the file /admin/info_deal.php of the component URL Parameter Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224016.π Read
via "National Vulnerability Database".
βΌ CVE-2016-15030 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in Arno0x TwoFactorAuth. This affects an unknown part of the file login/login.php. The manipulation of the argument from leads to open redirect. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The name of the patch is 8549ad3cf197095f783643e41333586d6a4d0e54. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223803.π Read
via "National Vulnerability Database".
π’ Can generative AI change security? π’
π Read
via "ITPro".
The latest developments in artificial intelligence could empower threat actors, but firms should carefully consider whether it fits their stack before diving in themselvesπ Read
via "ITPro".
ITPro
Can generative AI change security?
The latest developments in artificial intelligence could empower threat actors, but firms should carefully consider whether it fits their stack before diving in themselves
π’ Surge in compromised credentials highlights rampant cyber hygiene failings π’
π Read
via "ITPro".
Authlogicsβ password breach database reaches landmark total of 5 billion recordsπ Read
via "ITPro".
ITPro
Surge in compromised credentials highlights rampant cyber hygiene failings
Authlogicsβ password breach database reaches landmark total of 5 billion records
π’ Podcast transcript: Can generative AI change security? π’
π Read
via "ITPro".
Read the full transcript for this episode of the ITPro Podcastπ Read
via "ITPro".
ITPro
Podcast transcript: Can generative AI change security?
Read the full transcript for this episode of the ITPro Podcast
π’ Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking contest π’
π Read
via "ITPro".
Researchers took home more than $375,000 in winnings on the first day of the competitionπ Read
via "ITPro".
ITPro
Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking contest
Researchers took home more than $375,000 in winnings on the first day of the competition
π’ North Korean hackers plot Gmail theft attacks via Chrome extension π’
π Read
via "ITPro".
Targeting expert researchers on the Korean Peninsula, the hacking group is also known for deploying malware that can track victim locations, keystrokes, and phone callsπ Read
via "ITPro".
ITPro
North Korean hackers plot Gmail theft attacks via Chrome extension
Targeting expert researchers on the Korean Peninsula, the hacking group is also known for deploying malware that can track victim locations, keystrokes, and phone calls
π’ Pension Protection Fund confirms employee data exposed in GoAnywhere breach π’
π Read
via "ITPro".
The fund is the latest in a growing list of organisations affected by the breachπ Read
via "ITPro".
ITPro
Pension Protection Fund confirms employee data exposed in GoAnywhere breach
The fund is the latest in a growing list of organisations affected by the breach
π’ Online Safety Bill: Why is Ofcom being thrown under the bus? π’
π Read
via "ITPro".
The UK government has handed Ofcom an impossible mission, with the thinly spread regulator being set up to failπ Read
via "ITPro".
ITPro
Online Safety Bill: Why is Ofcom being thrown under the bus?
The UK government has handed Ofcom an impossible mission, with the thinly spread regulator being set up to fail
π’ Some GitHub users must take action after RSA SSH host key exposed π’
π Read
via "ITPro".
One cloud security expert likened the incident to the infamous HeartBleed bug from 2014π Read
via "ITPro".
ITPro
Some GitHub users must take action after RSA SSH host key exposed
One cloud security expert likened the incident to the infamous HeartBleed bug from 2014
π’ Can we ever achieve cyber security buy-in? π’
π Read
via "ITPro".
Members of the IT Pro Network share their experiences of trying to encourage good cyber hygiene in the workplaceπ Read
via "ITPro".
ITPro
Can we ever achieve cyber security buy-in?
Members of the IT Pro Network share their experiences of trying to encourage good cyber hygiene in the workplace
βΌ CVE-2023-1639 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in IObit Malware Fighter 9.4.0.776. This affects the function 0x8001E04C in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224019.π Read
via "National Vulnerability Database".
π2
βΌ CVE-2023-26800 βΌ
π Read
via "National Vulnerability Database".
Ruijie Networks RG-EW1200 Wireless Routers EW_3.0(1)B11P204 was discovered to contain a command injetion vulnerability via the params.path parameter in the upgradeConfirm function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26802 βΌ
π Read
via "National Vulnerability Database".
An issue in the component /network_config/nsg_masq.cgi of DCN (Digital China Networks) DCBI-Netlog-LAB v1.0 allows attackers to bypass authentication and execute arbitrary commands via a crafted request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26801 βΌ
π Read
via "National Vulnerability Database".
LB-LINK BL-AC1900_2.0 v1.0.1, LB-LINK BL-WR9000 v2.4.9, LB-LINK BL-X26 v1.2.5, and LB-LINK BL-LTE300 v1.0.8 were discovered to contain a command injection vulnerability via the mac, time1, and time2 parameters at /goform/set_LimitClient_cfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27796 βΌ
π Read
via "National Vulnerability Database".
RG-EW1200G PRO Wireless Routers EW_3.0(1)B11P204, RG-EW1800GX PRO Wireless Routers EW_3.0(1)B11P204, and RG-EW3200GX PRO Wireless Routers EW_3.0(1)B11P204 were discovered to contain multiple command injection vulnerabilities via the data.ip, data.protocal, data.iface and data.package parameters in the runPackDiagnose function of diagnose.lua.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1638 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been rated as problematic. Affected by this issue is the function 0x8001E024/0x8001E040 in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-224018 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".