🕴 Undetected Attacks Against Middle East Targets Conducted Since 2020 🕴
📖 Read
via "Dark Reading".
Targeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that's been in the wild since 2020.📖 Read
via "Dark Reading".
Dark Reading
Undetected Attacks Against Middle East Targets Conducted Since 2020
Targeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that's been in the wild since 2020.
⚠ Serious Security: Verification is vital – examining an OAUTH login bug ⚠
📖 Read
via "Naked Security".
What good is a popup asking for your approval if an attacker can bypass it simply by suprpessing it?📖 Read
via "Naked Security".
‼ CVE-2022-4240 ‼
📖 Read
via "National Vulnerability Database".
Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentication Bypass. This issue affects OneWireless version 322.1📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-24568 ‼
📖 Read
via "National Vulnerability Database".
Dell NetWorker, contains an Improper Validation of Certificate with Host Mismatch vulnerability in Rabbitmq port which could disallow replacing CA signed certificates.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-23754 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33656 ‼
📖 Read
via "National Vulnerability Database".
A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2968 ‼
📖 Read
via "National Vulnerability Database".
A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.📖 Read
via "National Vulnerability Database".
🕴 421M Spyware Apps Downloaded Through Google Play 🕴
📖 Read
via "Dark Reading".
A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.📖 Read
via "Dark Reading".
Dark Reading
421M Spyware Apps Downloaded Through Google Play
A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.
🕴 Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots 🕴
📖 Read
via "Dark Reading".
On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.📖 Read
via "Dark Reading".
Dark Reading
Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots
On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.
‼ CVE-2023-32218 ‼
📖 Read
via "National Vulnerability Database".
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-601: URL Redirection to Untrusted Site ('Open Redirect')📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29734 ‼
📖 Read
via "National Vulnerability Database".
An issue found in edjing Mix v.7.09.01 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2932 ‼
📖 Read
via "National Vulnerability Database".
Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33962 ‼
📖 Read
via "National Vulnerability Database".
JStachio is a type-safe Java Mustache templating engine. Prior to version 1.0.1, JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware.Version 1.0.1 contains a patch for this issue. To mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `'`. As a workaround, users can avoid this issue by using only double quotes `"` for HTML attributes.📖 Read
via "National Vulnerability Database".
♟️ Discord Admins Hacked by Malicious Bookmarks ♟️
📖 Read
via "Krebs on Security".
A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark.📖 Read
via "Krebs on Security".
Krebs on Security
Discord Admins Hacked by Malicious Bookmarks
A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark.
🕴 Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews 🕴
📖 Read
via "Dark Reading".
As the second Kaminsky Fellow, Dr. Andrews will study the use of threat intelligence to track campaigns against the human rights community.📖 Read
via "Dark Reading".
Dark Reading
Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews
As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
❤1
‼ CVE-2023-2998 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-47526 ‼
📖 Read
via "National Vulnerability Database".
Fox-IT DataDiode (aka Fox DataDiode) 3.4.3 suffers from a path traversal vulnerability with resultant arbitrary writing of files. A remote attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the downstream node user. Exploitation of this issue does not require user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3004 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Chat System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=read_msg of the component POST Parameter Handler. The manipulation of the argument convo_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230348.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-25539 ‼
📖 Read
via "National Vulnerability Database".
Dell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3003 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in SourceCodester Train Station Ticketing System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_prices.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230347.📖 Read
via "National Vulnerability Database".
⚠ Serious Security: Verification is vital – examining an OAUTH login bug ⚠
📖 Read
via "Naked Security".
What good is a popup asking for your approval if an attacker can bypass it simply by suppressing it?📖 Read
via "Naked Security".