π΄ Global Research From Delinea Reveals That 61% of IT Security Decision Makers Think Leadership Overlooks the Role of Cybersecurity in Business Success π΄
π Read
via "Dark Reading".
Disconnect between security and business goals had negative consequences for 89% of respondents and increased the success of cyberattacks at one in four companies.π Read
via "Dark Reading".
Dark Reading
Global Research From Delinea Reveals That 61% of IT Security Decision Makers Think Leadership Overlooks the Role of Cybersecurityβ¦
Disconnect between security and business goals had negative consequences for 89% of respondents and increased the success of cyberattacks at one in four companies.
π΄ Secureframe Finds 37% of Organizations Reuse Passwords for Cloud Service Providers π΄
π Read
via "Dark Reading".
Secureframe launches Secureframe Trust to empower businesses to showcase astrong security posture.π Read
via "Dark Reading".
Dark Reading
Secureframe Finds 37% of Organizations Reuse Passwords for Cloud Service Providers
Secureframe launches Secureframe Trust to empower businesses to showcase a strong security posture.
π΄ Experian Announces US Fintech Data Network to Combat Fraud π΄
π Read
via "Dark Reading".
Experian's Hunter comes to the United States with nine top fintechs committed to participating.π Read
via "Dark Reading".
Dark Reading
Experian Announces US Fintech Data Network to Combat Fraud
Experian's Hunter comes to the United States with nine top fintechs committed to participating.
βΌ CVE-2022-29842 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability that could allow an attacker to execute code in the context of the root user on a vulnerable CGI file was discovered in Western Digital My Cloud OS 5 devicesThis issue affects My Cloud OS 5: through 5.26.119.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31150 βΌ
π Read
via "National Vulnerability Database".
A Storing Passwords in a Recoverable Format vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) database system could allow an authenticated attacker to retrieve passwords.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31148 βΌ
π Read
via "National Vulnerability Database".
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31160 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31155 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2310 βΌ
π Read
via "National Vulnerability Database".
A Channel Accessible by Non-Endpoint vulnerability in the Schweitzer Engineering Laboratories SEL Real-Time Automation Controller (RTAC) could allow a remote attacker to perform a man-in-the-middle (MiTM) that could result in denial of service.See the ACSELERATOR RTAC SEL-5033 Software instruction manual date code 20210915 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31152 βΌ
π Read
via "National Vulnerability Database".
An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass. See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31164 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31149 βΌ
π Read
via "National Vulnerability Database".
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31162 βΌ
π Read
via "National Vulnerability Database".
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to arbitrarily alter the content of a configuration file.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31161 βΌ
π Read
via "National Vulnerability Database".
AnΓ Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow an authenticated remote attacker to use internal resources, allowing a variety of potential effects.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31154 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31156 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31158 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31165 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31166 βΌ
π Read
via "National Vulnerability Database".
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to create folders in arbitrary paths of the file system.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45345 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability found in En3rgy WebcamServer v.0.5.2 allows a remote attacker to cause a denial of service via the WebcamServer.exe file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31159 βΌ
π Read
via "National Vulnerability Database".
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.π Read
via "National Vulnerability Database".