βΌ CVE-2023-30382 βΌ
π Read
via "National Vulnerability Database".
A buffer overflow in the component hl.exe of Valve Half-Life up to 5433873 allows attackers to execute arbitrary code and escalate privileges by supplying crafted parameters.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31759 βΌ
π Read
via "National Vulnerability Database".
Weak Security in the 433MHz keyfob of Kerui W18 Alarm System v1.0 allows attackers to gain full access via a code replay attack.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31761 βΌ
π Read
via "National Vulnerability Database".
Weak security in the transmitter of Blitzwolf BW-IS22 Smart Home Security Alarm v1.0 allows attackers to gain full access to the system via a code replay attack.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31763 βΌ
π Read
via "National Vulnerability Database".
Weak security in the transmitter of AGShome Smart Alarm v1.0 allows attackers to gain full access to the system via a code replay attack.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2496 βΌ
π Read
via "National Vulnerability Database".
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized arbitrary file uploads due to an improper capability check on the 'validate_upload' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to upload arbitrary files on the affected site's server which may make remote code execution possible.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2498 βΌ
π Read
via "National Vulnerability Database".
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.19 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31762 βΌ
π Read
via "National Vulnerability Database".
Weak security in the transmitter of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to gain full access to the system via a code replay attack.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2494 βΌ
π Read
via "National Vulnerability Database".
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_postdata' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to modify access to the plugin when it should only be the administrator's privilege.π Read
via "National Vulnerability Database".
π’ Rogue IT worker extorted company after hijacking ransomware attack π’
π Read
via "ITPro".
Lilesβ involvement in the scheme was revealed after unauthorized email access was traced to his home address π Read
via "ITPro".
ITPro
Rogue IT worker extorted company after hijacking ransomware attack
Lilesβ involvement in the scheme was revealed after unauthorized email access was traced to his home address
π’ Azure AD vulnerability gave attackers backdoor authentication control π’
π Read
via "ITPro".
Secureworks shared its findings with Microsoft in 2022, and the company has since issued changes to improve audit logs π Read
via "ITPro".
ITPro
Azure AD vulnerability gave attackers backdoor authentication control
Secureworks shared its findings with Microsoft in 2022, and the company has since issued changes to improve audit logs
π’ Do risk awareness and risk management strategies actually make a difference? π’
π Read
via "ITPro".
If cyber attacks are a matter of when, not if, it's tempting to ask whether risk awareness and risk management are effective π Read
via "ITPro".
ITPro
Do risk awareness and risk management strategies actually make a difference?
If cyber attacks are a matter of when, not if, it's tempting to ask whether risk awareness and risk management are effective
βΌ CVE-2023-2859 βΌ
π Read
via "National Vulnerability Database".
Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0357 βΌ
π Read
via "National Vulnerability Database".
Unquoted Search Path or Element vulnerability in the Vulnerability Scan component of Bitdefender Total Security, Bitdefender Internet Security, and Bitdefender Antivirus Plus allows an attacker to elevate privileges to SYSTEM.This issue affects:Bitdefender Total Securityversions prior to 26.0.10.45.Bitdefender Internet Securityversions prior to 26.0.10.45.Bitdefender Antivirus Plusversions prior to 26.0.10.45.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1424 βΌ
π Read
via "National Vulnerability Database".
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.π Read
via "National Vulnerability Database".
π΄ 5 Questions to Ask When Evaluating a New Cybersecurity Technology π΄
π Read
via "Dark Reading".
Any new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.π Read
via "Dark Reading".
Dark Reading
5 Questions to Ask When Evaluating a New Cybersecurity Technology
Any new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.
βΌ CVE-2023-2750 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cityboss E-municipality allows SQL Injection.This issue affects E-municipality: before 6.05.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33009 βΌ
π Read
via "National Vulnerability Database".
A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33937 βΌ
π Read
via "National Vulnerability Database".
Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form's `name` field.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33010 βΌ
π Read
via "National Vulnerability Database".
A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2065 βΌ
π Read
via "National Vulnerability Database".
Authorization Bypass Through User-Controlled Key vulnerability in Armoli Technology Cargo Tracking System allows Authentication Abuse, Authentication Bypass.This issue affects Cargo Tracking System: before 3558f28 .π Read
via "National Vulnerability Database".
π΄ Israeli Shipping, Logistics Companies Targeted in Watering Hole Attacks π΄
π Read
via "Dark Reading".
Researchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.π Read
via "Dark Reading".
Dark Reading
Israeli Shipping, Logistics Companies Targeted in Watering Hole Attacks
Researchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.