βΌ CVE-2023-28479 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform installs a full development toolchain within every TigerGraph deployment. An attacker is able to compile new executables on each Tigergraph system and modify system and Tigergraph binaries.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4371 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in phpRecDB 1.3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument r/view leads to cross site scripting. The attack may be launched remotely. VDB-237194 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
π’ Unearthed LockBit secrets suggest gang is faltering in bid to corner ransomware market π’
π Read
via "ITPro".
Laden with technical difficulties, the ransomware group is riding on the wave of its notorious reputation to force victims into paying π Read
via "ITPro".
ITPro
Unearthed LockBit secrets suggest gang is faltering in bid to corner ransomware market
Laden with technical difficulties, the ransomware group is riding on the wave of its notorious reputation to force victims into paying
π’ Patch-resistant autonomous exploits of Citrix NetScaler hardware hit thousands in Europe π’
π Read
via "ITPro".
More than 1,800 Citrix NetScalerdevices still contained backdoors at the time of publication π Read
via "ITPro".
ITPro
Patch-resistant autonomous exploits of Citrix NetScaler hardware hit thousands in Europe
More than 1,800 Citrix NetScaler devices still contained backdoors at the time of publication
π΄ Bolstering Africaβs Cybersecurity π΄
π Read
via "Dark Reading".
A thriving economy needs several factors to continue an upward trajectory β but is Africa in a position to enable these factors to take place?π Read
via "Dark Reading".
Dark Reading
Bolstering Africaβs Cybersecurity
A thriving economy needs several factors to continue an upward trajectory β but is Africa in a position to enable these factors to take place?
π¦Ώ DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities π¦Ώ
π Read
via "Tech Republic".
Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI.π Read
via "Tech Republic".
TechRepublic
DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities
Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI.
β€1
π¦Ώ Microsoft Defender for Cloud Gets More Multicloud π¦Ώ
π Read
via "Tech Republic".
With Microsoft Defender for Cloud, cloud security posture management features are now available for Google Cloud Platform, as well as AWS and Azure. π Read
via "Tech Republic".
TechRepublic
Microsoft Defender for Cloud Gets More Multicloud
With Microsoft Defender for Cloud, cloud security posture management features are now available for Google Cloud Platform, as well as AWS and Azure.
βΌ CVE-2023-38857 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability infaad2 v.2.10.1 allows a remote attacker to execute arbitrary code and cause a denial of service via the stcoin function in mp4read.c.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38856 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the get_string function in xlstool.c:411.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38855 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the get_string function in xlstool.c:395.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38916 βΌ
π Read
via "National Vulnerability Database".
SQL Injection vulnerability in eVotingSystem-PHP v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the user input fields.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39662 βΌ
π Read
via "National Vulnerability Database".
An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38898 βΌ
π Read
via "National Vulnerability Database".
An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38915 βΌ
π Read
via "National Vulnerability Database".
File Upload vulnerability in Wolf-leo EasyAdmin8 v.1.0 allows a remote attacker to execute arbtirary code via the upload type function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38840 βΌ
π Read
via "National Vulnerability Database".
An issue in Bitwarden Bitwarden Desktop v.2023.5.1 allows a local attacker to obtain sensitive information via the the bitwarden.exeπ Read
via "National Vulnerability Database".
βΌ CVE-2023-38850 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in Michaelrsweet codedoc v.3.7 allows an attacker to cause a denial of service via the codedoc.c:1742 comppnent.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39659 βΌ
π Read
via "National Vulnerability Database".
An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38896 βΌ
π Read
via "National Vulnerability Database".
An issue in Harrison Chase langchain v.0.0.194 and before allows a remote attacker to execute arbitrary code via the from_math_prompt and from_colored_object_prompt functions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39438 βΌ
π Read
via "National Vulnerability Database".
A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38851 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the xls_parseWorkBook function in xls.c:1018.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32003 βΌ
π Read
via "National Vulnerability Database".
`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.This vulnerability affects all users using the experimental permission model in Node.js 20.Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.π Read
via "National Vulnerability Database".