βΌ CVE-2023-30804 βΌ
π Read
via "National Vulnerability Database".
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authenticated file disclosure vulnerability. A remote and authenticated attacker can read arbitrary system files using the svpn_html/loadfile.php endpoint. This issue is exploitable by a remote and unauthenticated attacker when paired with CVE-2023-30803.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44475 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Michael Simpson Add Shortcodes Actions And Filters plugin <=Γ 2.0.9 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44487 βΌ
π Read
via "National Vulnerability Database".
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5491 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This issue affects some unknown processing of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241643. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44241 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Keap Keap Landing Pages plugin <=Γ 1.4.2 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30806 βΌ
π Read
via "National Vulnerability Database".
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /cgi-bin/login.cgi endpoint. This is due to mishandling of shell meta-characters in the PHPSESSID cookie.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5489 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This affects an unknown part of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-241641 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30803 βΌ
π Read
via "National Vulnerability Database".
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can bypass authentication and access administrative functionality by sending HTTP requests using a crafted Y-forwarded-for header.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44994 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Bainternet ShortCodes UI plugin <=Γ 1.9.8 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44471 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Bernhard Kau Backend Localization plugin <=Γ 2.1.10 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5488 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241640. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4966 βΌ
π Read
via "National Vulnerability Database".
Sensitive information disclosureΓ in NetScaler ADC and NetScaler Gateway when configured as aΓ Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)Γ orΓ AAA ?virtual?server.Γ π Read
via "National Vulnerability Database".
βΌ CVE-2023-30805 βΌ
π Read
via "National Vulnerability Database".
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.π Read
via "National Vulnerability Database".
π΄ North Korea's State-Sponsored APTs Organize & Align π΄
π Read
via "Dark Reading".
An unprecedented collaboration by various APTs within the DPKR makes them harder to track, setting the stage for aggressive, complex cyberattacks that demand strategic response efforts, Mandiant warns.π Read
via "Dark Reading".
Dark Reading
North Korea's State-Sponsored APTs Organize & Align
An unprecedented collaboration by various APTs within the DPKR makes them harder to track, setting the stage for aggressive, complex cyberattacks that demand strategic response efforts, Mandiant warns.
π΄ How Keyloggers Have Evolved From the Cold War to Today π΄
π Read
via "Dark Reading".
Keyloggers have been used for espionage since the days of the typewriter, but today's threats are easier to get and use than ever.π Read
via "Dark Reading".
Dark Reading
How Keyloggers Have Evolved From the Cold War to Today
Keyloggers have been used for espionage since the days of the typewriter, but today's threats are easier to get and use than ever.
βΌ CVE-2023-37935 βΌ
π Read
via "National Vulnerability Database".
A use of GET request method with sensitive query strings vulnerability in Fortinet FortiOS 7.0.0 - 7.0.12, 7.2.0 - 7.2.5 and 7.4.0 allows an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44995 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in WP Doctor WooCommerce Login Redirect plugin <=Γ 2.2.4 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37939 βΌ
π Read
via "National Vulnerability Database".
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] inΓ FortiClient for Windows 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions, Linux 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions and Mac 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all versions, 6.2 all versions, may allow a local authenticated attacker with no Administrative privileges to retrieve the list ofΓ files or folders excluded from malware scanning.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34993 βΌ
π Read
via "National Vulnerability Database".
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41675 βΌ
π Read
via "National Vulnerability Database".
A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27633 βΌ
π Read
via "National Vulnerability Database".
In FNET 4.6.3, TCP ISNs are improperly random.π Read
via "National Vulnerability Database".