🕴 AI in Software Development: The Good, the Bad, and the Dangerous 🕴
📖 Read
via "Dark Reading".
Just like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software.📖 Read
via "Dark Reading".
Dark Reading
AI in Software Development: The Good, the Bad, and the Dangerous
Just like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software.
‼ CVE-2023-5033 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /admin/category/cate-edit-run.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239877 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42523 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via unpacking of a PE file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42522 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via processing of an import struct in a PE file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36766 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5036 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43114 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Qt before 5.15.16, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3 on Windows. When using the GDI font engine, if a corrupted font is loaded via QFontDatabase::addApplicationFont{FromData], then it can cause the application to crash because of missing length checks.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42525 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow an infinite loop in a scanning engine via unspecified file types. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43115 ‼
📖 Read
via "National Vulnerability Database".
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5034 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in SourceCodester My Food Recipe 1.0. This vulnerability affects unknown code of the file index.php of the component Image Upload Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239878 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42520 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via unpacking of crafted data files. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42521 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via processing of a compressed file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42526 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via decompression of crafted data files. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42524 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow an infinite loop in a scanning engine via unspecified file types. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34999 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.📖 Read
via "National Vulnerability Database".
🕴 Supporting Africa's Cybersecurity Talent Makes the World Safer 🕴
📖 Read
via "Dark Reading".
The global infosec community needs to help African nations defend against growing threats. 📖 Read
via "Dark Reading".
Dark Reading
Supporting Africa's Cybersecurity Talent Makes the World Safer
The global infosec community needs to help African nations defend against growing threats.
‼ CVE-2023-42359 ‼
📖 Read
via "National Vulnerability Database".
SQL injection vulnerability in Exam Form Submission in PHP with Source Code v.1.0 allows a remote attacker to escalate privileges via the val-username parameter in /index.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34195 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in SystemFirmwareManagementRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The implementation of the GetImage method retrieves the value of a runtime variable named GetImageProgress, and later uses this value as a function pointer. This variable is wiped out by the same module near the end of the function. By setting this UEFI variable from the OS to point into custom code, an attacker could achieve arbitrary code execution in the DXE phase, before several chipset locks are set.📖 Read
via "National Vulnerability Database".
🕴 A Playbook for Bridging Africa's Cybersecurity Skills Shortage 🕴
📖 Read
via "Dark Reading".
A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.📖 Read
via "Dark Reading".
Dark Reading
A Playbook for Bridging Africa's Cybersecurity Skills Shortage
A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.
‼ CVE-2023-42387 ‼
📖 Read
via "National Vulnerability Database".
An issue in TDSQL Chitu management platform v.10.3.19.5.0 allows a remote attacker to obtain sensitive information via get_db_info function in install.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42371 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in Summernote Rich Text Editor v.0.8.18 and before allows a remote attacker to execute arbitrary code via a crafted script to the insert link function in the editor component.📖 Read
via "National Vulnerability Database".