β Tracked by hidden tags? Apple and Google unite to propose safety and security standardsβ¦ β
π Read
via "Naked Security".
To bleat, or not to bleat, that is the question.π Read
via "Naked Security".
Naked Security
Tracked by hidden tags? Apple and Google unite to propose safety and security standardsβ¦
To bleat, or not to bleat, that is the question.
βΌ CVE-2017-20184 βΌ
π Read
via "National Vulnerability Database".
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4259 βΌ
π Read
via "National Vulnerability Database".
Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.π Read
via "National Vulnerability Database".
π΄ Microsoft Patches Serious Azure Cloud Security Flaws π΄
π Read
via "Dark Reading".
Three vulnerabilities in the platform's API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals.π Read
via "Dark Reading".
Dark Reading
Microsoft Patches Serious Azure Cloud Security Flaws
Three vulnerabilities in the platform's API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals.
π΄ New Generative AI Tools Aim to Improve Security π΄
π Read
via "Dark Reading".
The debate over whether ChatGPT and other generative AI tools will benefit defenders or further embolden attackers may be ongoing, but companies are going forward with new tools.π Read
via "Dark Reading".
Dark Reading
New Generative AI Tools Aim to Improve Security
The debate over whether ChatGPT and other generative AI tools will benefit defenders or further embolden attackers may be ongoing, but companies are going forward with new tools.
β World Password Day: 2 + 2 = 4 β
π Read
via "Naked Security".
We've kept it short and simple, with no sermons, no judgmentalism, no tubthumping... and no BUY NOW buttons. Have a nice day!π Read
via "Naked Security".
Naked Security
World Password Day: 2 + 2 = 4
Weβve kept it short and simple, with no sermons, no judgmentalism, no tubthumpingβ¦ and no BUY NOW buttons. Have a nice day!
π΄ Famine to Feast and Back: Startups Adjust to Economic Realities π΄
π Read
via "Dark Reading".
Cybersecurity is a hotbed of startup activity, and with good reason. Startups typically look for an IPO or acquisition, but right now IPOs are off the table.π Read
via "Dark Reading".
Dark Reading
Famine to Feast and Back: Startups Adjust to Economic Realities
Cybersecurity is a hotbed of startup activity, and with good reason. Startups typically look for an IPO or acquisition, but right now IPOs are off the table.
βΌ CVE-2023-26016 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tauhidul Alam Simple Portfolio Gallery plugin <=Γ 0.1 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25962 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Biplob Adhikari Accordion Γ’β¬β Multiple Accordion or FAQs Builder plugin <=Γ 2.3.0 versions.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-45818 βΌ
π Read
via "National Vulnerability Database".
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP OnlineSupport, Essential Plugin Hero Banner Ultimate plugin <=Γ 1.3.4 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23470 βΌ
π Read
via "National Vulnerability Database".
IBM i 7.2, 7.3, 7.4, and 7.5 could allow an authenticated privileged administrator to gain elevated privileges in non-default configurations, as a result of improper SQL processing. By using a specially crafted SQL operation, the administrator could exploit the vulnerability to perform additional administrator operations. IBM X-Force ID: 244510.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24958 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the IBM TS7700 Management Interface 8.51.2.12, 8.52.200.111, 8.52.102.13, and 8.53.0.63 could allow an authenticated user to submit a specially crafted URL leading to privilege escalation and remote code execution. IBM X-Force ID: 246320.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26012 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Denzel Chia | Phire Design Custom Login Page plugin <=Γ 2.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30619 βΌ
π Read
via "National Vulnerability Database".
Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26010 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPMobile.App plugin <=Γ 11.18 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29827 βΌ
π Read
via "National Vulnerability Database".
ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter.π Read
via "National Vulnerability Database".
π΄ How Public-Private Information Sharing Can Level the Cybersecurity Playing Field π΄
π Read
via "Dark Reading".
Sharing information is critical to help organizations protect data and systems. To be even more effective, collaboration should be inclusive β vendors, researchers, and private companies large and small.π Read
via "Dark Reading".
Dark Reading
How Public-Private Information Sharing Can Level the Cybersecurity Playing Field
Sharing information is critical to help organizations protect data and systems. To be even more effective, collaboration should be inclusive β vendors, researchers, and private companies large and small.
β S3 Ep133: Apple takes βtight-lippedβ to a whole new level β
π Read
via "Naked Security".
Entertaining, educational, and all in plain English π§ππ Read
via "Naked Security".
Naked Security
S3 Ep133: Apple takes βtight-lippedβ to a whole new level
Entertaining, educational, and all in plain English π§π
βΌ CVE-2023-29995 βΌ
π Read
via "National Vulnerability Database".
In NanoMQ v0.15.0-0, a Heap overflow occurs in copyn_utf8_str function of mqtt_parser.cπ Read
via "National Vulnerability Database".
βΌ CVE-2023-29996 βΌ
π Read
via "National Vulnerability Database".
In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2521 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in NEXTU NEXT-7004N 3.0.1. It has been classified as problematic. Affected is an unknown function of the file /boafrm/formFilter of the component POST Request Handler. The manipulation of the argument url with the input <svg onload=alert(1337)> leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228012. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".