CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on September 19, 2023. These...
Apple Releases Security Updates for Multiple Products Apple has released security updates to address vulnerabilities in multiple products. A cyber...
Drupal Releases Security Advisory to Address Vulnerability in Drupal Core Drupal has released a security advisory to address a vulnerability...
Atlassian Releases September Security Bulletin Atlassian has released its security bulletin for September 2023 to address vulnerabilities in multiple products....
CISA Releases Six Industrial Control Systems Advisories CISA released six Industrial Control Systems (ICS) advisories on September 21, 2023. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines....
NAME__________Ivanti Endpoint Manager information disclosurePlatforms Affected:Ivanti Endpoint Manager 2022Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Ivanti Endpoint Manager could allow a remote attacker to...
NAME__________Ivanti Endpoint Manager file disclosurePlatforms Affected:Ivanti Endpoint Manager 2022Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Ivanti Endpoint Manager could allow a remote authenticated attacker...
NAME__________Contribsys faktory denial of servicePlatforms Affected:contribsys faktory 1.7.0Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Contribsys faktory is vulnerable to a denial of service,...
NAME__________Mobile Security Framework information disclosurePlatforms Affected:MobSF MobSF 3.7.8Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Mobile Security Framework could allow a remote attacker to obtain...
NAME__________Samsung Mobile Processor Exynos 2200 denial of servicePlatforms Affected:Samsung Mobile Processor Exynos 2200Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Samsung Mobile Processor Exynos...
NAME__________Prossimo sudo-rs directory traversalPlatforms Affected:Prossimo sudo-rs 0.2.0Risk Level:4.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Prossimo sudo-rs could allow a local authenticated attacker to traverse...
NAME__________Input Output Hydra security bypassPlatforms Affected:Input Output Hydra 0.12.0Risk Level:6.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Input Output Hydra could allow a remote authenticated attacker...
NAME__________Plone plone.rest denial of servicePlatforms Affected:Plone plone.rest 2.0.0 Plone plone.rest 3.0.0Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Plone plone.rest is vulnerable to a...
NAME__________CoreCode MacUpdater privilege escalationPlatforms Affected:CoreCode MacUpdater 2.3.7 CoreCode MacUpdater 3.1.1Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________CoreCode MacUpdater could allow a local authenticated attacker...
NAME__________DataEase information disclosurePlatforms Affected:DataEase DataEase 1.18.10Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________DataEase could allow a remote attacker to obtain sensitive information, caused by...
NAME__________quinn-rs quinn-proto denial of servicePlatforms Affected:quinn-rs quinn-proto 0.9.4 quinn-rs quinn-proto 0.10.4Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________quinn-rs quinn-proto is vulnerable to a...
NAME__________Zopefoundation Zope cross-site scriptingPlatforms Affected:Zope Zope 4.8.9 Zope Zope 5.8.4Risk Level:3.7Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Zopefoundation Zope is vulnerable to cross-site scripting, caused...
Data is the lifeblood of operations in today's digital age. It helps improve operations and make informed decisions. However, with...
A novel and sophisticated backdoor malware named 'Deadglyph' was seen used in a cyberespionage attack against a government agency in...
Image Credit: John McArthur (Unsplash) Air Canada, the flag carrier and the largest airline of Canada, disclosed a cyber security incident...