βΌ CVE-2023-40043 βΌ
π Read
via "National Vulnerability Database".
In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interfaceΓ that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. AΓ MOVEit system administrator could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.π Read
via "National Vulnerability Database".
βΌ CVE-2023-42656 βΌ
π Read
via "National Vulnerability Database".
In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a reflected cross-site scriptingΓ (XSS) vulnerability has been identified in MOVEit Transfer's web interface.Γ An attacker could craft a malicious payload targetingΓ MOVEit Transfer users during the package composition procedure.Γ If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43495 βΌ
π Read
via "National Vulnerability Database".
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43500 βΌ
π Read
via "National Vulnerability Database".
A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43499 βΌ
π Read
via "National Vulnerability Database".
Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not escape Failure Cause names in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or update Failure Causes.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43497 βΌ
π Read
via "National Vulnerability Database".
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.π Read
via "National Vulnerability Database".
π΄ OneLayer Expands Its Private Cellular Network Security Solutions to Operations and Asset Management π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
OneLayer Expands Its Private Cellular Network Security Solutions to Operations and Asset Management
BOSTON, Sept. 20, 2023 /PRNewswire/ -- OneLayer, a leader in securing private LTE/5G networks for enterprises, announced today the expansion of its private cellular network security solutions to encompass the areas of operations and asset management, leveragingβ¦
π΄ 83% of IT Security Professionals Say Burnout Causes Data Breaches π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
83% of IT Security Professionals Say Burnout Causes Data Breaches
CAMBRIDGE, Mass. β Sept. 19, 2023 β Devo Technology, the cloud-native security analytics company, today unveiled the results of a new study examining the ramifications of cybersecurity burnout, finding the vast majority of IT security professionals admitβ¦
π΄ Dig Security Enhances DSPM Platform to Secure Enterprise Data in On-Prem, File-Share Environments π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Dig Security Enhances DSPM Platform to Secure Enterprise Data in On-Prem, File-Share Environments
TEL AVIV, Israel, September 20, 2023 β Dig, the cloud data security leader, today announced the expansion of the Dig Data Security Platform to protect data anywhere enterprises store sensitive information, including public cloud, software as a service (SaaS)β¦
π΄ FBI, CISA Issue Joint Warning on 'Snatch' Ransomware-as-a-Service π΄
π Read
via "Dark Reading".
The group's use of malware that forces Windows computers to reboot into Safe Mode before encrypting files is noteworthy, advisory says.π Read
via "Dark Reading".
Dark Reading
FBI, CISA Issue Joint Warning on 'Snatch' Ransomware-as-a-Service
The group's use of malware that forces Windows computers to reboot into Safe Mode before encrypting files is noteworthy, advisory says.
π΄ Fake WinRAR PoC Exploit Conceals VenomRAT Malware π΄
π Read
via "Dark Reading".
A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.π Read
via "Dark Reading".
Dark Reading
Fake WinRAR PoC Exploit Conceals VenomRAT Malware
A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.
βΌ CVE-2023-20594 βΌ
π Read
via "National Vulnerability Database".
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43377 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-43371 βΌ
π Read
via "National Vulnerability Database".
Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the numcaselle parameter at /hoteldruid/creaprezzi.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43373 βΌ
π Read
via "National Vulnerability Database".
Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43376 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the nometipotariffa1 parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20597 βΌ
π Read
via "National Vulnerability Database".
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40368 βΌ
π Read
via "National Vulnerability Database".
IBM Storage Protect 8.1.0.0 through 8.1.19.0 could allow a privileged user to obtain sensitive information from the administrative command line client. IBM X-Force ID: 263456.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40618 βΌ
π Read
via "National Vulnerability Database".
A reflected cross-site scripting (XSS) vulnerability in OpenKnowledgeMaps Head Start versions 4, 5, 6, 7 as well as Visual Project Explorer 1.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'service' parameter in 'headstart_snapshot.php'.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39041 βΌ
π Read
via "National Vulnerability Database".
An information leak in KUKURUDELI Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages.π Read
via "National Vulnerability Database".