🕴 AI Risk Database Tackles AI Supply Chain Risks 🕴
📖 Read
via "Dark Reading".
The open source tool — a collaboration between Robust Intelligence, MITRE, and Indiana University — assesses heavily shared, public machine learning models for risk.📖 Read
via "Dark Reading".
Dark Reading
AI Risk Database Tackles AI Supply Chain Risks
The open source tool — a collaboration between Robust Intelligence, MITRE, and Indiana University — assesses heavily shared, public machine learning models for risk.
‼ CVE-2023-3953 ‼
📖 Read
via "National Vulnerability Database".
A CWE-119: Improper Restriction of Operations within the Bounds of a MemoryBuffer vulnerability exists that could cause memory corruption when an authenticated useropens a tampered log file from GP-Pro EX.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34545 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability in CSZCMS 1.3.0 allows remote attackers to run arbitrary SQL commands via p parameter or the search URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4273 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40012 ‼
📖 Read
via "National Vulnerability Database".
uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a "signed" PE file that uthenticode would verify and consider valid using an X.509 certificate that isn't entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3518 ‼
📖 Read
via "National Vulnerability Database".
HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39969 ‼
📖 Read
via "National Vulnerability Database".
uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Version 1.0.9 of uthenticode hashed the entire file rather than hashing sections by virtual address, in violation of the Authenticode specification. As a result, an attacker could modify code within a binary without changing its Authenticode hash, making it appear valid from uthenticode's perspective. Versions of uthenticode prior to 1.0.9 are not vulnerable to this attack, nor are versions in the 2.x series. By design, uthenticode does not perform full-chain validation. However, the malleability of signature verification introduced in 1.0.9 was an unintended oversight. The 2.x series addresses the vulnerability. Versions prior to 1.0.9 are also not vulnerable, but users are encouraged to upgrade rather than downgrade. There are no workarounds to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39531 ‼
📖 Read
via "National Vulnerability Database".
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.📖 Read
via "National Vulnerability Database".
⚠ Microsoft Patch Tuesday: 74 CVEs plus 2 “Exploit Detected” advisories ⚠
📖 Read
via "Naked Security".
74 CVEs, and two "Exploitation Detected" advisories, which are nearly but not quite the same as 0-days. Also, two Teams treacheries that you really want to fix. 📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
❤1
🕴 Safety of Officers & Civilians of PSNI Compromised in Major Data Breach 🕴
📖 Read
via "Dark Reading".
A mistake snowballs into a serious political issue as the safety of police officers in Northern Ireland is compromised in an accidental data leak.📖 Read
via "Dark Reading".
Dark Reading
Major Police Breach Endangers Safety of Officers & Civilians
A mistake snowballs into a serious political issue as the safety of police officers in Northern Ireland is compromised in an accidental data leak.
🕴 'Downfall' Bug in Billions of Intel CPUs Reveals Major Design Flaw 🕴
📖 Read
via "Dark Reading".
A newly revealed flaw affects a good chunk of the world's computers. A patch has been released, but broad, structural change in CPU design will be required to address the root cause.📖 Read
via "Dark Reading".
Dark Reading
'Downfall' Bug in Billions of Intel CPUs Reveals Major Design Flaw
A newly revealed flaw affects a good chunk of the world's computers. A patch has been released, but broad, structural change in CPU design will be required to address the root cause.
‼ CVE-2023-39001 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the component diag_backup.php of OPNsense before 23.7 allows attackers to execute arbitrary commands via a crafted backup configuration file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48600 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability exists in the “notes viewâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48587 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability exists in the “schedule editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48585 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability exists in the “admin brand portalâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39000 ‼
📖 Read
via "National Vulnerability Database".
A reflected cross-site scripting (XSS) vulnerability in the component /ui/diagnostics/log/core/ of OPNsense before 23.7 allows attackers to inject arbitrary JavaScript via the URL path.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48596 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability exists in the “ticket queue watchersâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39008 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the component /api/cron/settings/setJob/ of OPNsense before 23.7 allows attackers to execute arbitrary system commands.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2022-48589 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability exists in the “reporting job editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39002 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in the act parameter of system_certmanager.php in OPNsense before 23.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48593 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability exists in the “topology data serviceâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.📖 Read
via "National Vulnerability Database".