Aggregator
Submit #436675: 上海灵当信息科技有限公司 Lingdang CRM <= 8.6.4.3 SQL injection [Accepted]
CVE-2015-7068 | Apple Mac OS X up to 10.11.1 IOKit SCSI memory corruption (HT205637 / EDB-38145)
CVE-2015-7111 | Apple Mac OS X up to 10.11.1 IOHIDFamily memory corruption (HT205637 / EDB-38145)
CVE-2015-7112 | Apple Mac OS X up to 10.11.1 IOHIDFamily memory corruption (HT205637 / EDB-38145)
CVE-2015-7111 | Apple iOS up to 9.1 IOHIDFamily memory corruption (HT205635 / EDB-38917)
CVE-2015-7077 | Apple Mac OS X up to 10.11.1 Intel Graphics Driver memory corruption (HT205637 / EDB-39368)
CVE-2015-7109 | Apple Mac OS X up to 10.11.1 IOAcceleratorFamily memory corruption (HT205637 / EDB-38917)
CVE-2024-48838 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x file access (dsa-2024-425)
CVE-2024-49557 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x command injection (dsa-2024-425)
CVE-2024-9836 | RSS Feed Widget Plugin up to 2.x on WordPress Shortcode cross site scripting
CVE-2024-9835 | RSS Feed Widget Plugin up to 3.0.0 on WordPress $_SERVER['REQUEST_URI'] cross site scripting
CVE-2024-45827 | SoftBank Mesh Wi-Fi router RP562B up to 1.0.2 os command injection
CVE-2024-29075 | SoftBank Mesh Wi-Fi Router RP562B up to 1.0.2 Setting debug code
CVE-2024-47799 | SoftBank Mesh Wi-Fi Router RP562B up to 1.0.2 exposure of sensitive system information to an unauthorized control sphere
多个僵尸网络正利用Raisecom MSG1200 命令执行漏洞(CVE-2024-7120)传播
多个僵尸网络正利用Raisecom MSG1200 命令执行漏洞(CVE-2024-7120)传播
Amazon Confirms Employee Data Breach Via Third-party Vendor
Amazon has confirmed that sensitive employee data was exposed due to a breach at a third-party vendor. The breach arose from exploiting a critical vulnerability in MOVEit, a widely used file transfer software. The vulnerability, first reported in mid-2023 under the code CVE-2023-34362, has been linked to a massive leak of corporate information affecting multiple […]
The post Amazon Confirms Employee Data Breach Via Third-party Vendor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The post Amazon Confirms Employee Data Breach Via Third-party Vendor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
披头士《Now And Then》成为首个获格莱美提名的 AI 辅助创作的歌曲
Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design weakness in the product.
According to the security team at Wallarm, “An attacker creates a legitimate, paid DocuSign account that allows them to change templates and use the API directly.” They then employ a special template that masquerades as a well-known brand to send the billing invoice. Because the fraudulent invoice is directly sent from the DocuSign platform, it appears legitimate and won’t be stopped by email filters.
The entire process can be automated and sent out on a massive scale, spraying large numbers of unsuspecting victims.
It is the old story of well-intentioned developers asking if they “can” develop something without questioning if they “should” develop something.
It often takes security-minded experts, savvy in the ways of how attackers think, to evaluate such situations. These are often missed by even experienced developers because there is no technical vulnerability per se. But that does not mean a creative adversary can’t use it in destructive ways. Often, additional controls, oversight, or accountability must be included to dissuade, prevent, or quickly alert of misuse.
The sustainable solution for all software and service vendors is to have cybersecurity experts, not just security-minded developers, as part of the initial feature design teams, keep them in the loop during development, and make sure they vet the final capabilities before going live.
The post Fraudsters Abuse DocuSign API for Legit-Looking Invoices appeared first on Security Boulevard.