π΄ Cyber Certainty: Investing in Resilience During a Post Correction Market π΄
π Read
via "Dark Reading".
In 2023, there is massive innovation being developed in all sectors, from cybersecurity to AI and quantum computing to IT management and information security, and in all the ways they intersect.π Read
via "Dark Reading".
Dark Reading
Cyber Certainty: Investing in Resilience During a Post-Correction Market
While difficult, these time periods are a return to the reality of where the market truly is or should be. And all the while, the innovation economy continues to boom.
βΌ CVE-2023-30466 βΌ
π Read
via "National Vulnerability Database".
This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2363 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in SourceCodester Resort Reservation System 1.0. This issue affects some unknown processing of the file view_room.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227639.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2364 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30467 βΌ
π Read
via "National Vulnerability Database".
This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to improper authorization at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.Successful exploitation of this vulnerability could allow remote attacker to perform unauthorized activities on the targeted device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-48481 βΌ
π Read
via "National Vulnerability Database".
In JetBrains Toolbox App before 1.28 a DYLIB injection on macOS was possibleπ Read
via "National Vulnerability Database".
π΄ SOSSA and CRA Spell Trouble for Open Source Software π΄
π Read
via "Dark Reading".
The lack of understanding around open source poses a threat when legislation is considered. Governments can help by offering funding to help remediate vulnerabilities and supporting in open source's long-term development.π Read
via "Dark Reading".
Dark Reading
SOSSA and CRA Spell Trouble for Open Source Software
The lack of understanding around open source poses a threat when legislation is considered. Governments can help by offering funding to help remediate vulnerabilities and supporting in open source's long-term development.
βΌ CVE-2023-2365 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file ajax.php?action=delete_subject. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227641 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41397 βΌ
π Read
via "National Vulnerability Database".
The optional Web Screens and Global Search features for Sage 300 through version 2022 use a hard-coded 40-byte blowfish key ("LandlordPassKey") to encrypt and decrypt secrets stored in configuration files and in database tables.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2366 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ajax.php?action=delete_class. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227642 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2367 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/manage_academic.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227643.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41400 βΌ
π Read
via "National Vulnerability Database".
Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and SQL connection strings.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41398 βΌ
π Read
via "National Vulnerability Database".
The optional Global Search feature for Sage 300 through version 2022 uses a set of hard-coded credentials for the accompanying Apache Solr instance. This issue could allow attackers to login to the Solr dashboard with admin privileges and access sensitive information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2369 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/manage_restriction.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227645 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38583 βΌ
π Read
via "National Vulnerability Database".
On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a "Windows Peer-to-Peer Network" or "Client Server Network" configuration, a low-privileged Sage 300 workstation user could abuse their access to the "SharedData" folder on the connected Sage 300 server to view and/or modify the credentials associated with Sage 300 users and SQL accounts to impersonate users and/or access the SQL database as a system administrator. With system administrator-level access to the Sage 300 MS SQL database it would be possible to create, update, and delete all records associated with the program and, depending on the configuration, execute code on the underlying database server.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30024 βΌ
π Read
via "National Vulnerability Database".
Insecure Permissions vulnerability found in MagicJack A921 USB Phone Jack Rev 3.0 v.1.4 allows a physically proximate attacker to escalate privileges and gain access to sensitive information via the NAND flash memory.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2368 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php?page=manage_questionnaire. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227644.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2360 βΌ
π Read
via "National Vulnerability Database".
Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41399 βΌ
π Read
via "National Vulnerability Database".
The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database.π Read
via "National Vulnerability Database".
β S3 Ep132: Proof-of-concept lets anyone hack at will β
π Read
via "Naked Security".
When Doug says, "Happy Remote Code Execution Day, Duck"... it's irony. For the avoidance of all doubt :-)π Read
via "Naked Security".
Naked Security
S3 Ep132: Proof-of-concept lets anyone hack at will
When Doug says, βHappy Remote Code Execution Day, Duckββ¦ itβs irony. For the avoidance of all doubt :-)
βΌ CVE-2023-2374 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument ecn-down leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227650 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".