βΌ CVE-2022-48460 βΌ
π Read
via "National Vulnerability Database".
In setting service, there is a possible undefined behavior due to incorrect error handling. This could lead to local denial of service with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42642 βΌ
π Read
via "National Vulnerability Database".
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-1719 βΌ
π Read
via "National Vulnerability Database".
Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.π Read
via "National Vulnerability Database".
βΌ CVE-2023-42645 βΌ
π Read
via "National Vulnerability Database".
In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-1713 βΌ
π Read
via "National Vulnerability Database".
Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted ".htaccess" file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-42639 βΌ
π Read
via "National Vulnerability Database".
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42641 βΌ
π Read
via "National Vulnerability Database".
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2022-48461 βΌ
π Read
via "National Vulnerability Database".
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42655 βΌ
π Read
via "National Vulnerability Database".
In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with System execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2022-48456 βΌ
π Read
via "National Vulnerability Database".
In camera driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2022-48457 βΌ
π Read
via "National Vulnerability Database".
In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42648 βΌ
π Read
via "National Vulnerability Database".
In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42632 βΌ
π Read
via "National Vulnerability Database".
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2022-48455 βΌ
π Read
via "National Vulnerability Database".
In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42637 βΌ
π Read
via "National Vulnerability Database".
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42651 βΌ
π Read
via "National Vulnerability Database".
In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42631 βΌ
π Read
via "National Vulnerability Database".
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
βΌ CVE-2023-42646 βΌ
π Read
via "National Vulnerability Database".
In Ifaa service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges neededπ Read
via "National Vulnerability Database".
π΄ Unsolved Cyber Mysteries: Signal Hacking π΄
π Read
via "Dark Reading".
Episode 1 of Bugcrowdββs docuseries, Unsolved Cyber Mysteries, describes signal hacking attacks in the 1980s and the potential motivations behind them.π Read
via "Dark Reading".
Dark Reading
Unsolved Cyber Mysteries: Signal Hacking
Episode 1 of Bugcrowd's "Unsolved Cyber Mysteries" docuseries describes signal-hacking attacks in the 1980s and the potential motivations behind them.
π¦Ώ Australian CEOs Struggling to Face Cyber Risk Realities π¦Ώ
π Read
via "Tech Republic".
Research has found 91% of CEOs view IT security as a technical function that's the CIO or CISO's problem, meaning IT leaders have more work to do to engage senior executives and boards.π Read
via "Tech Republic".
TechRepublic
Australian CEOs Struggling to Face Cyber Risk Realities
91% of CEOs view IT security as the CIO or CISO's problem, meaning IT leaders have more work to do to engage senior executives and boards.
π΄ It's Cheap to Exploit Software β and That's a Major Security Problem π΄
π Read
via "Dark Reading".
The solution? Follow in the footsteps of companies that have raised the cost of exploitation.π Read
via "Dark Reading".
Dark Reading
It's Cheap to Exploit Software β and That's a Major Security Problem
The solution? Follow in the footsteps of companies that have raised the cost of exploitation.