βΌ CVE-2022-47466 βΌ
π Read
via "National Vulnerability Database".
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-47463 βΌ
π Read
via "National Vulnerability Database".
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-47336 βΌ
π Read
via "National Vulnerability Database".
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-47335 βΌ
π Read
via "National Vulnerability Database".
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27179 βΌ
π Read
via "National Vulnerability Database".
GDidees CMS v3.9.1 and lower was discovered to contain an arbitrary file download vulenrability via the filename parameter at /_admin/imgdownload.php.π Read
via "National Vulnerability Database".
π΄ Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads π΄
π Read
via "Dark Reading".
The campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.π Read
via "Dark Reading".
Dark Reading
Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads
The campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.
βΌ CVE-2023-0645 βΌ
π Read
via "National Vulnerability Database".
An out of bounds read exists in libjxl. An attacker using a specifically crafted file could cause an out of bounds read in the exif handler. We recommend upgrading to version 0.8.1 or past commitΓ https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159π Read
via "National Vulnerability Database".
βΌ CVE-2023-23277 βΌ
π Read
via "National Vulnerability Database".
Snippet-box 1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote attackers can render arbitrary web script or HTML from the "Snippet code" form field.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28062 βΌ
π Read
via "National Vulnerability Database".
Dell PPDM versions 19.12, 19.11 and 19.10, contain an improper access control vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability to bypass intended access restrictions and perform unauthorized actions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27192 βΌ
π Read
via "National Vulnerability Database".
An issue found in DUALSPACE Super Secuirty v.2.3.7 allows an attacker to cause a denial of service via the key_wifi_safe_net_check_url, KEY_Cirus_scan_whitelist and KEY_AD_NEW_USER_AVOID_TIME parameters.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30465 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.5.0.Γ By manipulating the "orderType" parameter and the ordering of the returned content using an SQL injection attack, an attacker can extract the username of theΓ Γ user with ID 1 from the "user" table, one character at a time.Γ Users are advised to upgrade to Apache InLong's 1.6.0 or cherry-pick [1] to solve it. https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html [1] https://github.com/apache/inlong/issues/7529 https://github.com/apache/inlong/issues/7529π Read
via "National Vulnerability Database".
βΌ CVE-2023-26846 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in OpenCATS v0.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the city parameter at opencats/index.php?m=candidates.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26847 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in OpenCATS v0.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the state parameter at opencats/index.php?m=candidates.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1552 βΌ
π Read
via "National Vulnerability Database".
ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file.Γ Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.Γ Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user.Γ π Read
via "National Vulnerability Database".
βΌ CVE-2023-26845 βΌ
π Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in OpenCATS 0.9.7 allows attackers to force users into submitting web requests via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26964 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).π Read
via "National Vulnerability Database".
π΄ Where Are the Women? Making Cybersecurity More Inclusive π΄
π Read
via "Dark Reading".
Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.π Read
via "Dark Reading".
Dark Reading
Where Are the Women? Making Cybersecurity More Inclusive
Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.
π1
π΄ 7 Things Your Ransomware Response Playbook Is Likely Missing π΄
π Read
via "Dark Reading".
Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?π Read
via "Dark Reading".
Darkreading
7 Things Your Ransomware Response Playbook Is Likely Missing
Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?
β Attention gamers! Motherboard maker MSI admits to breach, issues βrogue firmwareβ alert β
π Read
via "Naked Security".
Stealing private keys is like getting hold of a medieval monarch's personal signet ring... you get to put an official seal on treasonous material.π Read
via "Naked Security".
Naked Security
Attention gamers! Motherboard maker MSI admits to breach, issues βrogue firmwareβ alert
Stealing private keys is like getting hold of a medieval monarchβs personal signet ringβ¦ you get to put an official seal on treasonous material.
π΄ 'Blatantly Obvious': Spyware Offered to Cyberattackers via PyPI Python Repository π΄
π Read
via "Dark Reading".
Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their wares.π Read
via "Dark Reading".
Dark Reading
'Blatantly Obvious': Spyware Offered to Cyberattackers via PyPI Python Repository
Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their wares.
βΌ CVE-2022-27487 βΌ
π Read
via "National Vulnerability Database".
A improper privilege management in Fortinet FortiSandbox version 4.2.0 through 4.2.2, 4.0.0 through 4.0.2 and before 3.2.3 and FortiDeceptor version 4.1.0, 4.0.0 through 4.0.2 and before 3.3.3 allows a remote authenticated attacker to perform unauthorized API calls via crafted HTTP or HTTPS requests.π Read
via "National Vulnerability Database".