‼ CVE-2023-40826 ‼
📖 Read
via "National Vulnerability Database".
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40827 ‼
📖 Read
via "National Vulnerability Database".
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40781 ‼
📖 Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in Libming Libming v.0.4.8 allows a remote attacker to cause a denial of service via a crafted .swf file to the makeswf function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4569 ‼
📖 Read
via "National Vulnerability Database".
A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause a double-deactivations of catchall elements, which results in a memory leak.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39650 ‼
📖 Read
via "National Vulnerability Database".
Theme Volty CMS Blog up to version v4.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /tvcmsblog/single.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40857 ‼
📖 Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in VirusTotal yara v.4.3.2 allows a remote attacker to execute arbtirary code via the yr_execute_cod function in the exe.c component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34724 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in TECHView LA5570 Wireless Gateway 1.0.19_T53, allows physical attackers to gain escalated privileges via the UART interface.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40828 ‼
📖 Read
via "National Vulnerability Database".
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the expandIfZip method in the extract function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41005 ‼
📖 Read
via "National Vulnerability Database".
An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40998 ‼
📖 Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via the packet size component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40825 ‼
📖 Read
via "National Vulnerability Database".
An issue in Perfree PerfreeBlog v.3.1.2 allows a remote attacker to execute arbitrary code via crafted plugin listed in admin/plugin/access/list.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40997 ‼
📖 Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41358 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41359 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1995 ‼
📖 Read
via "National Vulnerability Database".
Insufficient Logging vulnerability in Hitachi HiRDB Server, HiRDB Server With Addtional Function, HiRDB Structured Data Access Facility.This issue affects HiRDB Server: before 09-60-39, before 09-65-23, before 10-01-10, before 10-03-12, before 10-04-06, before 10-05-06, before 10-06-02; HiRDB Server With Addtional Function: before 09-60-2M, before 09-65-/W; HiRDB Structured Data Access Facility: before 09-60-39, before 10-03-12, before 10-04-06, before 10-06-02.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41360 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41361 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-23773 ‼
📖 Read
via "National Vulnerability Database".
Motorola EBTS/MBTS Base Radio fails to check firmware authenticity. The Motorola MBTS Base Radio lacks cryptographic signature validation for firmware update packages, allowing an authenticated attacker to gain arbitrary code execution, extract secret key material, and/or leave a persistent implant on the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41363 ‼
📖 Read
via "National Vulnerability Database".
In Cerebrate 1.14, a vulnerability in UserSettingsController allows authenticated users to change user settings of other users.📖 Read
via "National Vulnerability Database".
🦿 OpenAI Debuts ChatGPT Enterprise, Touting Better Privacy for Business 🦿
📖 Read
via "Tech Republic".
Data from ChatGPT Enterprise will not be used to train the popular chatbot. Plus, admins can manage access.📖 Read
via "Tech Republic".
TechRepublic
OpenAI Debuts ChatGPT Enterprise, Touting Better Privacy for Business
Data from ChatGPT Enterprise will not be used to train the popular chatbot. Plus, admins can manage access.
🕴 Here's What Your Breach Response Plan Might Be Missing 🕴
📖 Read
via "Dark Reading".
The best way to withstand a data breach is to be prepared. Here are four elements that are easily overlooked in breach response plans.📖 Read
via "Dark Reading".
Dark Reading
Here's What Your Breach Response Plan Might Be Missing
The best way to withstand a data breach is to be prepared. Here are four elements that are easily overlooked in breach response plans.
👍1