‼ CVE-2023-37210 ‼
📖 Read
via "National Vulnerability Database".
A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-37206 ‼
📖 Read
via "National Vulnerability Database".
Uploading files which contain symlinks may have allowed an attacker to trick a user into submitting sensitive data to a malicious website. This vulnerability affects Firefox < 115.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3089 ‼
📖 Read
via "National Vulnerability Database".
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3455 ‼
📖 Read
via "National Vulnerability Database".
Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2538 ‼
📖 Read
via "National Vulnerability Database".
A CWE-552 "Files or Directories Accessible to External Partiesâ€� in the web interface of the Tyan S5552 BMC version 3.00 allows an unauthenticated remote attacker to retrieve the private key of the TLS certificate in use by the BMC via forced browsing. This can then be abused to perform Man-in-the-Middle (MitM) attacks against victims that access the web interface through HTTPS.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46890 ‼
📖 Read
via "National Vulnerability Database".
Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46891 ‼
📖 Read
via "National Vulnerability Database".
Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46893 ‼
📖 Read
via "National Vulnerability Database".
Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity.📖 Read
via "National Vulnerability Database".
🕴 Microsoft Can Fix Ransomware Tomorrow 🕴
📖 Read
via "Dark Reading".
You can't encrypt a file you can't open — Microsoft could dramatically impact ransomware by slowing it down.📖 Read
via "Dark Reading".
Dark Reading
Microsoft Can Fix Ransomware Tomorrow
You can't encrypt a file you can't open — Microsoft could dramatically impact ransomware by slowing it down.
👍2❤1
🕴 China's Mustang Panda Linked to SmugX Attacks on European Governments 🕴
📖 Read
via "Dark Reading".
Attackers use HTML smuggling to spread the PlugX RAT in the campaign, which has been ongoing since at least December.📖 Read
via "Dark Reading".
Dark Reading
China's Mustang Panda Linked to SmugX Attacks on European Governments
Attackers use HTML smuggling to spread the PlugX RAT in the campaign, which has been ongoing since at least December.
‼ CVE-2023-36665 ‼
📖 Read
via "National Vulnerability Database".
protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype.<new-property> = ...;" whereas CVE-2022-25878 was about "Object.__proto__.<new-property> = ...;" instead.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35971 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35974 ‼
📖 Read
via "National Vulnerability Database".
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35972 ‼
📖 Read
via "National Vulnerability Database".
An authenticated remote command injection vulnerability exists in the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3515 ‼
📖 Read
via "National Vulnerability Database".
Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35979 ‼
📖 Read
via "National Vulnerability Database".
There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35977 ‼
📖 Read
via "National Vulnerability Database".
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35975 ‼
📖 Read
via "National Vulnerability Database".
An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to delete arbitrary files in the underlying operating system.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35976 ‼
📖 Read
via "National Vulnerability Database".
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35973 ‼
📖 Read
via "National Vulnerability Database".
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35978 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in ArubaOS could allow an unauthenticated remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.📖 Read
via "National Vulnerability Database".