‼ CVE-2023-41637 ‼
📖 Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-46868 ‼
📖 Read
via "National Vulnerability Database".
Local privilege escalation during recovery due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28801 ‼
📖 Read
via "National Vulnerability Database".
An Improper Verification of Cryptographic Signature in the SAML authentication of the Zscaler Admin UI allows a Privilege Escalation.This issue affects Admin UI: from 6.2 before 6.2r.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33835 ‼
📖 Read
via "National Vulnerability Database".
IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a remote attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 256015.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41636 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability in the Data Richiesta dal parameter of GruppoSCAI RealGimm v1.1.37p38 allows attackers to access the database and execute arbitrary commands via a crafted SQL query.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41640 ‼
📖 Read
via "National Vulnerability Database".
An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41635 ‼
📖 Read
via "National Vulnerability Database".
A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.📖 Read
via "National Vulnerability Database".
❤1
🦿 10 best antivirus software for businesses in 2023 🦿
📖 Read
via "Tech Republic".
Antivirus software protects your data against cybercriminals, ransomware and malware. Compare the best software now.📖 Read
via "Tech Republic".
TechRepublic
6 Best Enterprise Antivirus Software Choices in 2024
SentinelOne, Microsoft Defender for Endpoint, and CrowdStrike Falcon are among my top recommendations for businesses looking for an enterprise antivirus solution.
‼ CVE-2023-31171 ‼
📖 Read
via "National Vulnerability Database".
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4683 ‼
📖 Read
via "National Vulnerability Database".
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41717 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31170 ‼
📖 Read
via "National Vulnerability Database".
An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41743 ‼
📖 Read
via "National Vulnerability Database".
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31167 ‼
📖 Read
via "National Vulnerability Database".
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Schweitzer Engineering Laboratories SEL-5036 acSELerator Bay Screen Builder Software on Windows allows Relative Path Traversal.SEL acSELerator Bay Screen Builder software is distributed by SEL-5033 SEL acSELerator RTAC, SEL-5030 Quickset, and SEL Compass. CVE-2023-31167 and was patched in the acSELerator Bay Screen Builder release available on 20230602. Please contact SEL for additional details.This issue affects SEL-5036 acSELerator Bay Screen Builder Software: before 1.0.49152.778.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31172 ‼
📖 Read
via "National Vulnerability Database".
An Incomplete Filtering of Special Elements vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4682 ‼
📖 Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31174 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to embed instructions that could be executed by an authorized device operator.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31169 ‼
📖 Read
via "National Vulnerability Database".
An Improper Handling of Unicode Encoding vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-31173 ‼
📖 Read
via "National Vulnerability Database".
Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34391 ‼
📖 Read
via "National Vulnerability Database".
Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths.See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details. This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4681 ‼
📖 Read
via "National Vulnerability Database".
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.📖 Read
via "National Vulnerability Database".