βΌ CVE-2023-2188 βΌ
π Read
via "National Vulnerability Database".
The Colibri Page Builder for WordPress is vulnerable to SQL Injection via the Γ’β¬Λpost_idΓ’β¬β’ parameter in versions up to, and including, 1.0.227 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3162 βΌ
π Read
via "National Vulnerability Database".
The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.7.7. This is due to insufficient verification on the user being supplied during a Stripe checkout through the plugin. This allows unauthenticated attackers to log in as users who have orders, who are typically customers.π Read
via "National Vulnerability Database".
π’ Telegramβs popularity continues to soar as catalog of available cyber crime services matures π’
π Read
via "ITPro".
The range of available services on Telegram includes sophisticated phishing kits, cheap stolen data, and access to industry insiders π Read
via "ITPro".
ITPro
Telegramβs popularity continues to soar as catalog of available cyber crime services matures
The range of available services on Telegram includes sophisticated phishing kits, cheap stolen data, and access to industry insiders
βΌ CVE-2023-41740 βΌ
π Read
via "National Vulnerability Database".
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to read specific files via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41741 βΌ
π Read
via "National Vulnerability Database".
Exposure of sensitive information to an unauthorized actor vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to obtain sensitive information via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20900 βΌ
π Read
via "National Vulnerability Database".
VMware Tools contains a SAML token signature bypass vulnerability.Γ A malicious actor with man-in-the-middle (MITM) network positioning between vCenter server and the virtual machine may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41739 βΌ
π Read
via "National Vulnerability Database".
Uncontrolled resource consumption vulnerability in File Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to conduct denial-of-service attacks via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41738 βΌ
π Read
via "National Vulnerability Database".
Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in Directory Domain Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to execute arbitrary commands via unspecified vectors.π Read
via "National Vulnerability Database".
π’ NCSC, SBU reveal overt Russian cyber campaign as cyber war continues to evolve π’
π Read
via "ITPro".
Sandworm-linked threat actors gained access to battlefield tablets π Read
via "ITPro".
ITPro
NCSC, SBU reveal overt Russian cyber campaign as cyber war continues to evolve
Sandworm-linked threat actors gained access to battlefield tablets
π΄ Adversaries Ride RocketMQ Bug to DreamBus Bot Resurgence π΄
π Read
via "Dark Reading".
Last seen in 2021, DreamBus Monero crypto bot is back and finding new life on vulnerable RocketMQ servers. π Read
via "Dark Reading".
Dark Reading
Adversaries Ride RocketMQ Bug to DreamBus Bot Resurgence
Last seen in 2021, DreamBus Monero crypto bot is back and finding new life on vulnerable RocketMQ servers.
π΄ A Brief History of ICS-Tailored Attacks π΄
π Read
via "Dark Reading".
It's on the cyber defenders to learn from the past and make industrial control system networks hostile to attackers.π Read
via "Dark Reading".
Dark Reading
A Brief History of ICS-Tailored Attacks
It's on the cyber defenders to learn from the past and make industrial control system networks hostile to attackers.
βΌ CVE-2023-33833 βΌ
π Read
via "National Vulnerability Database".
IBM Security Verify Information Queue 10.0.4 and 10.0.5 stores sensitive information in plain clear text which can be read by a local user. IBM X-Force ID: 256013.π Read
via "National Vulnerability Database".
π΄ Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage π΄
π Read
via "Dark Reading".
The Kinsing threat group has launched more than 1,000 cyberattacks in less than two months, exploiting a security vulnerability in the internal corporate messaging app in order to upload the malware and a cryptominer.π Read
via "Dark Reading".
Dark Reading
Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage
The Kinsing threat group has launched more than 1,000 cyberattacks in less than two months, exploiting a security vulnerability in the internal corporate messaging app in order to upload the malware and a cryptominer.
π’ National Grid exploring cyber honeypots in bid to mitigate rising threats π’
π Read
via "ITPro".
Honeypots are by no means a new technique, but they are helping firms identify and mitigate cyber threats π Read
via "ITPro".
ITPro
National Grid exploring cyber honeypots in bid to mitigate rising threats
Honeypots are by no means a new technique, but they are helping firms identify and mitigate cyber threats
π TOR Virtual Network Tunneling Tool 0.4.8.5 π
π Read
via "Packet Storm Security".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.8.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2023-41642 βΌ
π Read
via "National Vulnerability Database".
Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33834 βΌ
π Read
via "National Vulnerability Database".
IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a remote attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-force ID: 256014.π Read
via "National Vulnerability Database".
βΌ CVE-2022-45451 βΌ
π Read
via "National Vulnerability Database".
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41742 βΌ
π Read
via "National Vulnerability Database".
Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41638 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the Gestione Documentale module of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41637 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.π Read
via "National Vulnerability Database".