βΌ CVE-2022-4921 βΌ
π Read
via "National Vulnerability Database".
Use after free in Accessibility in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Low)π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-4923 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Omnibox in Google Chrome prior to 99.0.4844.51 allowed an attacker in a privileged network position to perform a man-in-the-middle attack via malicious network traffic. (Chromium security severity: Low)π Read
via "National Vulnerability Database".
βΌ CVE-2023-37214 βΌ
π Read
via "National Vulnerability Database".
Heights Telecom ERO1xS-Pro Dual-Band FW version BZ_ERO1XP.025.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37213 βΌ
π Read
via "National Vulnerability Database".
Synel SYnergy Fingerprint Terminals - CWE-78: 'OS Command Injection'π Read
via "National Vulnerability Database".
βΌ CVE-2023-32227 βΌ
π Read
via "National Vulnerability Database".
Synel SYnergy Fingerprint Terminals - CWE-798: Use of Hard-coded Credentialsπ Read
via "National Vulnerability Database".
βΌ CVE-2023-32226 βΌ
π Read
via "National Vulnerability Database".
Sysaid - CWE-552: Files or Directories Accessible to External Parties -Γ Authenticated users may exfiltrate files from the server via an unspecified method.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32225 βΌ
π Read
via "National Vulnerability Database".
Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -Γ A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37215 βΌ
π Read
via "National Vulnerability Database".
JBL soundbar multibeam 5.1 - CWE-798: Use of Hard-coded Credentialsπ Read
via "National Vulnerability Database".
π2
βΌ CVE-2023-4005 βΌ
π Read
via "National Vulnerability Database".
Insufficient Session Expiration in GitHub repository fossbilling/fossbilling prior to 0.5.5.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4007 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4006 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35019 βΌ
π Read
via "National Vulnerability Database".
IBM Security Verify Governance, Identity Manager 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 257873.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35016 βΌ
π Read
via "National Vulnerability Database".
IBM Security Verify Governance, Identity Manager 10.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 257772.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43831 βΌ
π Read
via "National Vulnerability Database".
IBM Storage Scale Container Native Storage Access 5.1.2.1 through 5.1.6.1 could allow a local user to obtain escalated privileges on a host without proper security context settings configured. IBM X-Force ID: 238941.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24971 βΌ
π Read
via "National Vulnerability Database".
IBM B2B Advanced Communications 1.0.0.0 and IBM Multi-Enterprise Integration Gateway 1.0.0.1 could allow a user to cause a denial of service due to the deserializing of untrusted serialized Java objects. IBM X-Force ID: 246976.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4868 βΌ
π Read
via "National Vulnerability Database".
IBM TRIRIGA 3.0, 4.0, and 4.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190744.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22595 βΌ
π Read
via "National Vulnerability Database".
IBM B2B Advanced Communications 1.0.0.0 and IBM Multi-Enterprise Integration Gateway 1.0.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 244076.π Read
via "National Vulnerability Database".
π1
π¦Ώ Server Inventory Checklist π¦Ώ
π Read
via "Tech Republic".
Itβs important to maintain accurate infrastructure inventories to assist secure and effective network administration. A checklist, like the accompanying file from TechRepublic Premium, is an easy and efficient way to begin the process of maintaining accurate infrastructure inventories. From the checklist: DONβT FORGET ABOUT FORGOTTEN SYSTEMS Itβs common for technical network audits to surface forgotten ...π Read
via "Tech Republic".
TechRepublic
Server Inventory Checklist
Itβs important to maintain accurate infrastructure inventories to assist secure and effective network administration. A checklist, like the accompanying
π2
π’ Four measures SMBs can take to avoid common security pitfalls π’
π Read
via "ITPro".
Security can be challenging for SMBs, but itβs possible to make yourself more resilient to reduce the impact of cyber attacks π Read
via "ITPro".
ITPro
Four measures SMBs can take to avoid common security pitfalls
Security can be challenging for SMBs, but itβs possible to make yourself more resilient to reduce the impact of cyber attacks
π’ SEC data breach rules branded βworryingly vagueβ by industry body π’
π Read
via "ITPro".
The new rules announced last week leave many questions unanswered, according to security industry experts π Read
via "ITPro".
ITPro
SEC data breach rules branded βworryingly vagueβ by industry body
The new rules announced last week leave many questions unanswered, according to security industry experts
βΌ CVE-2023-34360 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) issue was discovered within the Custom User Icons functionality of ASUS RT-AX88U running firmware versions 3.0.0.4.388.23110 and prior.Γ After a remote attacker logging in device with regular user privilege, the remote attacker can perform a Stored Cross-site Scripting (XSS) attack by uploading image which containing JavaScript code.π Read
via "National Vulnerability Database".
π1