Aggregator
CVE-2023-39743 | lrzip-next 3.c/23.01 LZMA src/libbz3.c memory corruption (Issue 132)
CVE-2023-36106 | powerjob up to 4.3.2 /container/list appId information disclosure
CVE-2023-32626 | Logitec LAN-W300N-RS/LAN-W300N-PR5 Management Console os command injection
CVE-2023-38576 | Logitec AN-WH300N-RE Management Console os command injection
CVE-2023-39445 | Logitec LAN-WH300N-RE Management Console Remote Code Execution
CVE-2023-40069 | Elecom WRC-F1167ACF Request os command injection
CVE-2023-38132 | LOGITEC LAN-W451NGR Telnet Service access control
CVE-2023-36674 | MediaWiki prior 1.35.11/1.38.7/1.39.4/1.40.1 Bad Image List thumb protection mechanism (FEDORA-2023-1fcaba0998)
CVE-2023-25848 | Esri ArcGIS Enterprise Server up to 11.0 Query information disclosure
Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)
If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an analysis of CVE-2024-45409 and an exploit script that may help attackers gain access as any user on GitLab. About CVE-2024-45409 GitLab is a popular software development platform that can be deployed by users on on-premises servers, Kubernetes, or with a cloud provider. CVE-2024-45409 is a critical authentication bypass … More →
The post Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409) appeared first on Help Net Security.
CVE-2024-28168 | Apache XML Graphics FOP 2.9 xml external entity reference
Минцифры дарит россиянам власть над входящими звонками
CVE-2014-7521 | Mobiloapps Anderson Musaamil 1.4 X.509 Certificate cryptographic issues (VU#582497)
Microsoft стремительно теряет позиции в нейросетевой гонке
CVE-2024-47334 | Zoho Flow Plugin up to 2.7.1 on WordPress sql injection
CVE-2004-2078 | Red-M Red-Alert 2.7.5 V3.1 Build 24 memory corruption (EDB-23672 / XFDB-15086)
Enhancing AD Security Against Password Spraying Attacks
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
The post Enhancing AD Security Against Password Spraying Attacks appeared first on Security Boulevard.