‼ CVE-2023-3971 ‼
📖 Read
via "National Vulnerability Database".
An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4237 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3665 ‼
📖 Read
via "National Vulnerability Database".
A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables,leading to denial of service and or the execution of arbitrary code.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40376 ‼
📖 Read
via "National Vulnerability Database".
IBM UrbanCode Deploy (UCD) 7.1 - 7.1.2.12, 7.2 through 7.2.3.5, and 7.3 through 7.3.2.0 under certain configurations could allow an authenticated user to make changes to environment variables due to improper authentication controls. IBM X-Force ID: 263581.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27433 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Make Paths Relative plugin <=Â 1.3.0 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40561 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Enhanced Ecommerce Google Analytics for WooCommerce plugin <=Â 3.7.1 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40684 ‼
📖 Read
via "National Vulnerability Database".
IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOne Virtual is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 264019.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1832 ‼
📖 Read
via "National Vulnerability Database".
An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-43906 ‼
📖 Read
via "National Vulnerability Database".
IBM Security Guardium 11.5 could disclose sensitive information due to a missing or insecure SameSite attribute for a sensitive cookie. IBM X-Force ID: 240897.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5113 ‼
📖 Read
via "National Vulnerability Database".
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4567 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** Issue has been found to be non-reproducible, therefore not a viable flaw.📖 Read
via "National Vulnerability Database".
👍1
🕴 Turnkey Rootkit for Amateur Hackers Makes Supply Chain Attacks Easy 🕴
📖 Read
via "Dark Reading".
It's never been easier to hide malware in plain sight in open source software package repositories, and "DiscordRAT 2.0" now makes it easy to take advantage of those who stumble upon it.📖 Read
via "Dark Reading".
Dark Reading
Turnkey Rootkit for Amateur Hackers Makes Supply Chain Attacks Easy
It's never been easier to hide malware in plain sight in open source software package repositories, and "DiscordRAT 2.0" now makes it easy to take advantage of those who stumble upon it.
🕴 Breaches Are the Cost of Doing Business, but NIST Is Here to Help 🕴
📖 Read
via "Dark Reading".
Treating the NIST Cybersecurity Framework as a business requirement is a strong step toward preventing breaches.📖 Read
via "Dark Reading".
Dark Reading
Breaches Are the Cost of Doing Business, but NIST Is Here to Help
Treating the NIST Cybersecurity Framework as a business requirement is a strong step toward preventing breaches.
🕴 'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover 🕴
📖 Read
via "Dark Reading".
The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.📖 Read
via "Dark Reading".
Dark Reading
'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover
The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.
‼ CVE-2022-36276 ‼
📖 Read
via "National Vulnerability Database".
TCMAN GIM v8.0.1 is vulnerable to a SQL injection via the 'SqlWhere' parameter inside the function 'BuscarESM'. The exploitation of this vulnerability might allow a remote attacker to directly interact with the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43838 ‼
📖 Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-36277 ‼
📖 Read
via "National Vulnerability Database".
The 'sReferencia', 'sDescripcion', 'txtCodigo' and 'txtDescripcion' parameters, in the frmGestionStock.aspx and frmEditServicio.aspx files in TCMAN GIM v8.0.1, could allow an attacker to perform persistent XSS attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43804 ‼
📖 Read
via "National Vulnerability Database".
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-20259 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device. This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-20101 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are typically reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3784 ‼
📖 Read
via "National Vulnerability Database".
Garuda Linux performs an insecure user creation and authentication that allows any user to impersonate the created account. By creating users from the 'Garuda settings manager', an insecure procedure is performed that keeps the created user without an assigned password during some seconds. This could allow a potential attacker to exploit this vulnerability in order to authenticate without knowing the password.📖 Read
via "National Vulnerability Database".