Aggregator
Submit #434191: MonoCMS 23-20240528 Improper Neutralization of Alternate XSS Syntax [Duplicate]
Submit #434189: MonoCMS 23-20240528 Improper Neutralization of Alternate XSS Syntax [Accepted]
Submit #434188: MonoCMS 23-20240528 Improper Neutralization of Alternate XSS Syntax [Accepted]
CVE-2023-42670 | Samba up to 4.17.11/4.18.7/4.19.0 AD DC Busy RPC denial of service
CVE-2023-47039 | Perl on Windows cmd.exe uncontrolled search path
CVE-2023-45929 | S-Lang 2.3.2 fixup_tgetstr memory corruption
CVE-2024-26468 | jstrieb urlpages URL index.html cross site scripting
CVE-2020-36780 | Linux Kernel up to 5.4.118/5.10.36/5.11.20/5.12.3 sprd sprd_i2c_master_xfer memory leak
CVE-2021-47057 | Linux Kernel up to 5.10.36/5.11.20/5.12.3 sun8i-ss dma_iv memory leak
CVE-2023-52566 | Linux Kernel up to 6.5.5 nilfs2 nilfs_gccache_submit_read_data use after free
CVE-2024-1901 | Devolutions Server up to 2023.3.14.0 PAM Password Rotation denial of service (DEVO-2024-0002)
CVE-2021-47161 | Linux Kernel up to 5.12.8 spi dspi_request_dma information disclosure
Interpol Operation Shuts Down 22,000 Malicious Servers
Interpol, other law enforcement agencies, and cybersecurity firms teamed up for Operation Synergia II, shutting down 22,000 malicious servers that supported ransomware, phishing, and other attacks and arresting 41 people connected to the cybercrime campaigns.
The post Interpol Operation Shuts Down 22,000 Malicious Servers appeared first on Security Boulevard.
Cyber-Attack on Microlise Disrupts DHL and Serco Tracking Services
Joint advisory on the 2023 top routinely exploited vulnerabilities
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Key findings While we finalized this blog post, a technical analysis of this activity was published by fellow researchers from Cisco Talos. While it overlaps with our findings to some extent, our report provides additional extended information about the activity. Introduction Since July 2024, Check Point Research (CPR) has been tracking an extensive and ongoing phishing campaign […]
The post CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits appeared first on Check Point Research.