‼ CVE-2023-5034 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in SourceCodester My Food Recipe 1.0. This vulnerability affects unknown code of the file index.php of the component Image Upload Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239878 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42520 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via unpacking of crafted data files. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42521 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via processing of a compressed file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42526 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow a remote crash of a scanning engine via decompression of crafted data files. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42524 ‼
📖 Read
via "National Vulnerability Database".
Certain WithSecure products allow an infinite loop in a scanning engine via unspecified file types. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34999 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.📖 Read
via "National Vulnerability Database".
🕴 Supporting Africa's Cybersecurity Talent Makes the World Safer 🕴
📖 Read
via "Dark Reading".
The global infosec community needs to help African nations defend against growing threats. 📖 Read
via "Dark Reading".
Dark Reading
Supporting Africa's Cybersecurity Talent Makes the World Safer
The global infosec community needs to help African nations defend against growing threats.
‼ CVE-2023-42359 ‼
📖 Read
via "National Vulnerability Database".
SQL injection vulnerability in Exam Form Submission in PHP with Source Code v.1.0 allows a remote attacker to escalate privileges via the val-username parameter in /index.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34195 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in SystemFirmwareManagementRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The implementation of the GetImage method retrieves the value of a runtime variable named GetImageProgress, and later uses this value as a function pointer. This variable is wiped out by the same module near the end of the function. By setting this UEFI variable from the OS to point into custom code, an attacker could achieve arbitrary code execution in the DXE phase, before several chipset locks are set.📖 Read
via "National Vulnerability Database".
🕴 A Playbook for Bridging Africa's Cybersecurity Skills Shortage 🕴
📖 Read
via "Dark Reading".
A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.📖 Read
via "Dark Reading".
Dark Reading
A Playbook for Bridging Africa's Cybersecurity Skills Shortage
A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.
‼ CVE-2023-42387 ‼
📖 Read
via "National Vulnerability Database".
An issue in TDSQL Chitu management platform v.10.3.19.5.0 allows a remote attacker to obtain sensitive information via get_db_info function in install.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42371 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in Summernote Rich Text Editor v.0.8.18 and before allows a remote attacker to execute arbitrary code via a crafted script to the insert link function in the editor component.📖 Read
via "National Vulnerability Database".
🦿 Best IT Asset Management Software for 2023 🦿
📖 Read
via "Tech Republic".
These top IT asset management tools can increase visibility of your IT assets for improved risk reduction. Find out which one is best for your business.📖 Read
via "Tech Republic".
TechRepublic
Best IT Asset Management Software for 2023
These top ITAM tools can increase visibility of your IT assets for improved risk reduction. Find out which one is best for your business.
❤1
🕴 Dragos Raises $74M in Latest Funding Round 🕴
📖 Read
via "Dark Reading".
The funds will be used to expand its global presence beyond Europe and the US. 📖 Read
via "Dark Reading".
Dark Reading
Dragos Raises $74M in Latest Funding Round
The funds will be used to expand its global presence beyond Europe and the US.
🦿 What Does Closed-Door Meeting With AI Industry Leaders Mean for Business? 🦿
📖 Read
via "Tech Republic".
Businesses should plan for the development of AI regulation in the US, but knowing what it will look like is still a challenge. 📖 Read
via "Tech Republic".
TechRepublic
What Does Closed-Door Meeting With AI Industry Leaders Mean for Business?
Businesses should plan for the development of AI regulation in the US, but knowing what it will look like is still a challenge.
🕴 How to Get Your Board on Board With Cybersecurity 🕴
📖 Read
via "Dark Reading".
CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape.📖 Read
via "Dark Reading".
Dark Reading
How to Get Your Board on Board With Cybersecurity
CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape.
‼ CVE-2023-4527 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42328 ‼
📖 Read
via "National Vulnerability Database".
An issue in PeppermintLabs Peppermint v.0.2.4 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the hardcoded session cookie.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42320 ‼
📖 Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in Tenda AC10V4 v.US_AC10V4.0si_V16.03.10.13_cn_TDC01 allows a remote attacker to cause a denial of service via the mac parameter in the GetParentControlInfo function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41595 ‼
📖 Read
via "National Vulnerability Database".
An issue in xui-xray v1.8.3 allows attackers to obtain sensitive information via default password.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4806 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.📖 Read
via "National Vulnerability Database".