🕴 Tips for a Successful SecOps Game Plan 🕴
📖 Read
via "Dark Reading".
Dark Reading's special report on SecOps data analytics looks at the elements needed to set up a proper data foundation. Getting the data right when collecting, aggregating, and analyzing it is essential.📖 Read
via "Dark Reading".
Dark Reading
Tips for a Successful SecOps Game Plan
Dark Reading's special report on SecOps data analytics looks at the elements needed to set up a proper data foundation — because getting the data right when collecting, aggregating, and analyzing it is essential.
‼ CVE-2023-45277 ‼
📖 Read
via "National Vulnerability Database".
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45278 ‼
📖 Read
via "National Vulnerability Database".
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-46033 ‼
📖 Read
via "National Vulnerability Database".
** UNSUPPORTED WHEN ASSIGNED ** D-Link (Non-US) DSL-2750U N300 ADSL2+ and (Non-US) DSL-2730U N150 ADSL2+ are vulnerable to Incorrect Access Control. The UART/Serial interface on the PCB, provides log output and a root terminal without proper access control.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45281 ‼
📖 Read
via "National Vulnerability Database".
An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-47583 ‼
📖 Read
via "National Vulnerability Database".
Terminal character injection in Mintty before 3.6.3 allows code execution via unescaped output to the terminal.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35126 ‼
📖 Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists within the parsers for both the "DocumentViewStyles" and "DocumentEditStyles" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45665 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** This CVE is a duplicate of another CVE.📖 Read
via "National Vulnerability Database".
🕴 Europol Strike Wounds Ragnar Locker Ransomware Group 🕴
📖 Read
via "Dark Reading".
Several countries in Europe as well as the United States and Japan were involved in the operation, which is aimed at defanging one of the bigger names in ransomware.📖 Read
via "Dark Reading".
Dark Reading
Europol Strike Wounds Ragnar Locker Ransomware Group
Several countries in Europe as well as the United States and Japan were involved in the operation, which is aimed at defanging one of the bigger names in ransomware.
‼ CVE-2023-40153 ‼
📖 Read
via "National Vulnerability Database".
The affected product is vulnerable to a cross-site scripting vulnerability, which could allow an attacker to access the web application to introduce arbitrary Java Script by injecting an XSS payload into the 'hostname' parameter of the vulnerable software.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41088 ‼
📖 Read
via "National Vulnerability Database".
The affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker with access to the network, where clients have access to the DexGate server, could capture traffic. The attacker can later us the information within it to access the application.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45381 ‼
📖 Read
via "National Vulnerability Database".
In the module "Creative Popup" (creativepopup) up to version 1.6.9 from WebshopWorks for PrestaShop, a guest can perform SQL injection via `cp_download_popup().`📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42666 ‼
📖 Read
via "National Vulnerability Database".
The affected product is vulnerable to an exposure of sensitive information to an unauthorized actor vulnerability, which may allow an attacker to create malicious requests for obtaining the information of the version about the web server used.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45809 ‼
📖 Read
via "National Vulnerability Database".
Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 4.1.8 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38128 ‼
📖 Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause a type confusion, which can lead to memory corruption and eventually arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43986 ‼
📖 Read
via "National Vulnerability Database".
DM Concept configurator before v4.9.4 was discovered to contain a SQL injection vulnerability via the component ConfiguratorAttachment::getAttachmentByToken.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45992 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in Ruckus Wireless (CommScope) Ruckus CloudPath v.5.12.54414 allows a remote attacker to escalate privileges via a crafted script to the macaddress parameter in the onboarding portal.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42435 ‼
📖 Read
via "National Vulnerability Database".
The affected product is vulnerable to a cross-site request forgery vulnerability, which may allow an attacker to perform actions with the permissions of a victim user.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5059 ‼
📖 Read
via "National Vulnerability Database".
Santesoft Sante FFT Imaging lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45820 ‼
📖 Read
via "National Vulnerability Database".
Directus is a real-time API and App dashboard for managing SQL database content. In affected versions any Directus installation that has websockets enabled can be crashed if the websocket server receives an invalid frame. A malicious user could leverage this bug to crash Directus. This issue has been addressed in version 10.6.2. Users are advised to upgrade. Users unable to upgrade should avoid using websockets.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-45825 ‼
📖 Read
via "National Vulnerability Database".
ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong (credentials: %q)", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state.📖 Read
via "National Vulnerability Database".