βΌ CVE-2023-4362 βΌ
π Read
via "National Vulnerability Database".
Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)π Read
via "National Vulnerability Database".
βΌ CVE-2023-4361 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)π Read
via "National Vulnerability Database".
βΌ CVE-2023-4367 βΌ
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)π Read
via "National Vulnerability Database".
βΌ CVE-2023-4360 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)π Read
via "National Vulnerability Database".
π΄ Patch Now: OpenNMS Bug Steals Data, Triggers Denial of Service π΄
π Read
via "Dark Reading".
Monitoring platform is trusted by Cisco, Savannah River Nuclear Solutions, and others in CISA's critical infrastructure Sectors, say Synopsys researchers.π Read
via "Dark Reading".
Dark Reading
Patch Now: OpenNMS Bug Steals Data, Triggers Denial of Service
Monitoring platform is trusted by Cisco, Savannah River Nuclear Solutions, and others in CISA's critical infrastructure Sectors, say Synopsys researchers.
π΄ 3 Major Email Security Standards Falling Down on the Job π΄
π Read
via "Dark Reading".
Nearly 90% of malicious emails manage to get past SPF, DKIM, or DMARC, since threat actors are apparently using the same filters as legitimate users.π Read
via "Dark Reading".
Dark Reading
3 Major Email Security Standards Prove Too Porous for the Task
Nearly 90% of malicious emails manage to get past SPF, DKIM, or DMARC, since threat actors are apparently using the same filters as legitimate users.
β€1
π΄ Kaspersky Password Manager Adds 2FA One-Time Password Storage and New Browser Support π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Kaspersky Password Manager Adds 2FA One-Time Password Storage and New Browser Support
WOBURN, Mass., Aug. 15, 2023 /PRNewswire/ -- Kaspersky has announced two important new features for its Kaspersky Password Manager. The first one enables users to safely store unique keys for two-factor authentication (2FA) and to generate one-time passwords.β¦
βΌ CVE-2023-39848 βΌ
π Read
via "National Vulnerability Database".
DVWA v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at blind\source\high.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39843 βΌ
π Read
via "National Vulnerability Database".
Missing encryption in the RFID tag of Suleve 5-in-1 Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38866 βΌ
π Read
via "National Vulnerability Database".
COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_415588. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter interface and display_name.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39841 βΌ
π Read
via "National Vulnerability Database".
Missing encryption in the RFID tag of Etekcity 3-in-1 Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39842 βΌ
π Read
via "National Vulnerability Database".
Missing encryption in the RFID tag of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38864 βΌ
π Read
via "National Vulnerability Database".
An issue in COMFAST CF-XR11 v.2.7.2 allows an attacker to execute arbitrary code via the protal_delete_picname parameter in the sub_41171C function at bin/webmgnt.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39852 βΌ
π Read
via "National Vulnerability Database".
Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39851 βΌ
π Read
via "National Vulnerability Database".
webchess v1.0 was discovered to contain a SQL injection vulnerability via the $playerID parameter at mainmenu.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39849 βΌ
π Read
via "National Vulnerability Database".
Pikachu v1.0 was discovered to contain a SQL injection vulnerability via the $username parameter at \inc\function.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20560 βΌ
π Read
via "National Vulnerability Database".
Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD RyzenΓ’βΒ’ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39850 βΌ
π Read
via "National Vulnerability Database".
Schoolmate v1.3 was discovered to contain multiple SQL injection vulnerabilities via the $courseid and $teacherid parameters at DeleteFunctions.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20564 βΌ
π Read
via "National Vulnerability Database".
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD RyzenΓ’βΒ’ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.π Read
via "National Vulnerability Database".
π¦Ώ Get Norton 360 Standard on 2 Devices Plus Identity Theft Protection for $24.99 π¦Ώ
π Read
via "Tech Republic".
This exclusive bundle includes online dark web monitoring and identity theft support, so don't miss out on this discounted year-long subscription.π Read
via "Tech Republic".
TechRepublic
Get Norton 360 Standard on 2 Devices Plus Identity Theft Protection for $24.99
This exclusive bundle includes online dark web monitoring and identity theft support. Don't miss this discounted year-long subscription.