βΌ CVE-2023-2060 βΌ
π Read
via "National Vulnerability Database".
Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.π Read
via "National Vulnerability Database".
π₯1
π’ Horabot campaign targeted businesses for more than two years before finally being discovered π’
π Read
via "ITPro".
The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular π Read
via "ITPro".
Cloud Pro
Horabot campaign targeted businesses for more than two years before finally being discovered
The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
π1
π’ Kaspersky traces spyware attack on staff iOS devices back to 2019 π’
π Read
via "ITPro".
It's currently unclear who is behind the spyware attack on the Russian-based cyber security firm π Read
via "ITPro".
ITPro
Kaspersky traces spyware attack on staff iOS devices back to 2019
It's currently unclear who is behind the spyware attack on the Russian-based cyber security firm
π1
βΌ CVE-2023-28705 βΌ
π Read
via "National Vulnerability Database".
Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain malicious web pages injected with JavaScript. When users access the system and open the email, it triggers an XSS (Reflected Cross-site scripting) attack.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28702 βΌ
π Read
via "National Vulnerability Database".
ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands, disrupt system or terminate service.π Read
via "National Vulnerability Database".
β Researchers claim Windows βbackdoorβ affects hundreds of Gigabyte motherboards β
π Read
via "Naked Security".
It's a backdoor, Jim, but not as we know it... here's a sober look at this issue.π Read
via "Naked Security".
βΌ CVE-2023-3056 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33717 βΌ
π Read
via "National Vulnerability Database".
mp4v2 v2.1.3 was discovered to contain a memory leak when a method calling MP4File::ReadBytes() had allocated memory but did not catch exceptions thrown by ReadBytes()π Read
via "National Vulnerability Database".
π΄ How CISOs Can Manage the Intersection of Security, Privacy, And Trust π΄
π Read
via "Dark Reading".
Integrating a subject rights request tool with security and compliance solutions can help identify potential data conflicts more efficiently and with greater accuracy.π Read
via "Dark Reading".
Dark Reading
How CISOs Can Manage the Intersection of Security, Privacy, And Trust
Integrating a subject rights request tool with security and compliance solutions can help identify potential data conflicts more efficiently and with greater accuracy.
π΄ Want Sustainable Security? Find Middle Ground Between Tech & Education π΄
π Read
via "Dark Reading".
The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.π Read
via "Dark Reading".
Dark Reading
Want Sustainable Security? Find Middle Ground Between Tech & Education
The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.
π Faraday 4.4.0 π
π Read
via "Packet Storm Security".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Read
via "Packet Storm Security".
Packetstormsecurity
Faraday 4.4.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2023-30149 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in the City Autocomplete (cityautocomplete) module from ebewe.net for PrestaShop, prior to version 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7), allows remote attackers to execute arbitrary SQL commands via the type, input_name. or q parameter in the autocompletion.php front controller.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34362 βΌ
π Read
via "National Vulnerability Database".
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3061 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in code-projects Agro-School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file btn_functions.php of the component Attachment Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-230567.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33476 βΌ
π Read
via "National Vulnerability Database".
ReadyMedia (MiniDLNA) versions from 1.1.15 up to 1.3.2 is vulnerable to Buffer Overflow. The vulnerability is caused by incorrect validation logic when handling HTTP requests using chunked transport encoding. This results in other code later using attacker-controlled chunk values that exceed the length of the allocated buffer, resulting in out-of-bounds read/write.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3060 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as problematic. This vulnerability affects the function doAddQuestion of the file btn_functions.php. The manipulation of the argument Question leads to cross site scripting. The attack can be initiated remotely. VDB-230566 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3062 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in code-projects Agro-School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-230568.π Read
via "National Vulnerability Database".
π΄ Streamers Ditch Netflix for Dark Web After Password Sharing Ban π΄
π Read
via "Dark Reading".
Disgruntled users are pursuing offers for "full Netflix access" at steeply discounted rates.π Read
via "Dark Reading".
Dark Reading
Streamers Ditch Netflix for Dark Web After Password Sharing Ban
Disgruntled users are pursuing offers for "full Netflix access" at steeply discounted rates.
π΄ 'Picture-in-Picture' Obfuscation Spoofs Delta, Kohl's for Credential Harvesting π΄
π Read
via "Dark Reading".
A recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from trusted brands.π Read
via "Dark Reading".
Dark Reading
'Picture-in-Picture' Obfuscation Spoofs Delta, Kohl's for Credential Harvesting
A recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from trusted brands.
βΌ CVE-2023-25749 βΌ
π Read
via "National Vulnerability Database".
Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so. <br>*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25751 βΌ
π Read
via "National Vulnerability Database".
Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.π Read
via "National Vulnerability Database".