‼ CVE-2023-31701 ‼
📖 Read
via "National Vulnerability Database".
TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.📖 Read
via "National Vulnerability Database".
⚠ US offers $10m bounty for Russian ransomware suspect outed in indictment ⚠
📖 Read
via "Naked Security".
"Up to $10 million for information that leads to the arrest and/or conviction of this defendant."📖 Read
via "Naked Security".
Naked Security
US offers $10m bounty for Russian ransomware suspect outed in indictment
“Up to $10 million for information that leads to the arrest and/or conviction of this defendant.”
👍1
🕴 Talking Security Strategy: Cybersecurity Has a Seat at the Boardroom Table 🕴
📖 Read
via "Dark Reading".
Pending new SEC rules reinforce how integral cybersecurity is to modern business operations, and will help close the gap between security teams and those making policy decisions. 📖 Read
via "Dark Reading".
Dark Reading
Talking Security Strategy: Cybersecurity Has a Seat at the Boardroom Table
Pending new SEC rules reinforce how integral cybersecurity is to modern business operations, and will help close the gap between security teams and those making policy decisions.
🕴 Microsoft Teams Features Amp Up Orgs' Cyberattack Exposure 🕴
📖 Read
via "Dark Reading".
It's as they say: A Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings, and Messages functions, and they all can be exploited.📖 Read
via "Dark Reading".
Dark Reading
Microsoft Teams Features Amp Up Orgs' Cyberattack Exposure
It's as they say: Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings, and Messages functions, and they all can be exploited.
‼ CVE-2023-2765 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been found in Weaver OA up to 9.5 and classified as problematic. This vulnerability affects unknown code of the file /E-mobile/App/System/File/downfile.php. The manipulation of the argument url leads to absolute path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2766 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.📖 Read
via "National Vulnerability Database".
🕴 Apple Boots a Half-Million Developers From Official App Store 🕴
📖 Read
via "Dark Reading".
The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.📖 Read
via "Dark Reading".
Dark Reading
Apple Boots a Half-Million Developers From Official App Store
The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.
‼ CVE-2023-22348 ‼
📖 Read
via "National Vulnerability Database".
Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2768 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Sucms 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin_ads.php?action=add. The manipulation of the argument intro leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229274 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2772 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in SourceCodester Budget and Expense Tracker System 1.0. Affected is an unknown function of the file /admin/budget/manage_budget.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-229278 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2770 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in SourceCodester Online Exam System 1.0. This vulnerability affects unknown code of the file /kelasdosen/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229276.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31135 ‼
📖 Read
via "National Vulnerability Database".
Dgraph is an open source distributed GraphQL database. Existing Dgraph audit logs are vulnerable to brute force attacks due to nonce collisions. The first 12 bytes come from a baseIv which is initialized when an audit log is created. The last 4 bytes come from the length of the log line being encrypted. This is problematic because two log lines will often have the same length, so due to these collisions we are reusing the same nonce many times. All audit logs generated by versions of Dgraph <v23.0.0 are affected. Attackers must have access to the system the logs are stored on. Dgraph users should upgrade to v23.0.0. Users unable to upgrade should store existing audit logs in a secure location and for extra security, encrypt using an external tool like `gpg`.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2769 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229275.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2771 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in SourceCodester Online Exam System 1.0. This issue affects some unknown processing of the file /jurusanmatkul/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229277 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2773 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-26044 ‼
📖 Read
via "National Vulnerability Database".
react/http is an event-driven, streaming HTTP client and server implementation for ReactPHP. Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the RequestBodyBufferMiddleware with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests. This issue has been addressed in release 1.9.0. Users are advised to upgrade. Users unable to upgrade may keep the request body limited using RequestBodyBufferMiddleware with a sensible value which should mitigate the issue. An infrastructure or DevOps workaround could be to place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-24805 ‼
📖 Read
via "National Vulnerability Database".
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.📖 Read
via "National Vulnerability Database".
🕴 Houthi-Backed Spyware Effort Targets Yemen Aid Workers 🕴
📖 Read
via "Dark Reading".
Pro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.📖 Read
via "Dark Reading".
Dark Reading
Houthi-Backed Spyware Effort Targets Yemen Aid Workers
Pro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.
🕴 5 Ways Security Testing Can Aid Incident Response 🕴
📖 Read
via "Dark Reading".
Organizations can focus on these key considerations to develop their cybersecurity testing program sustainably.📖 Read
via "Dark Reading".
Dark Reading
5 Ways Security Testing Can Aid Incident Response
Organizations can focus on these key considerations to develop their cybersecurity testing programs sustainably.
🕴 BianLian Cybercrime Group Changes Attack Methods, CISA Advisory Notes 🕴
📖 Read
via "Dark Reading".
CISA urges small and midsized organizations as well as critical infrastructures to implement mitigations to shield from further attacks.📖 Read
via "Dark Reading".
Dark Reading
BianLian Cybercrime Group Changes Up Extortion Methods, Warns CISA
CISA urges small and midsized organizations as well as critical infrastructure to implement mitigations immediately to shield themselves from further data exfiltration attacks.
🕴 Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise 🕴
📖 Read
via "Dark Reading".
Lemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.📖 Read
via "Dark Reading".
Dark Reading
Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise
Lemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.