Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

watchTowr Warns of Active Exploitation of SonicWall SMA 100 Devices

watchTowr reveals active exploitation of SonicWall SMA 100 vulnerabilities (CVE-2024-38475 & CVE-2023-44221) potentially leading to full system takeover…

HackRead
#vulnerability#web#apache#auth
Phishing Emails Impersonating Qantas Target Credit Card Info

Fake Qantas emails in a sophisticated phishing scam steal credit card and personal info from Australians, bypassing major…

Hacking Spree Hits UK Retail Giants

Plus: France blames Russia for a series of cyberattacks, the US is taking steps to crack down on a gray market allegedly used by scammers, and Microsoft pushes the password one step closer to death.

GHSA-v2p5-q653-9j99: obfstr Type Confusion vulnerability

In the obfstr crate before 0.4.4 for Rust, the obfstr! argument type is not restricted to string slices, leading to invalid UTF-8 conversion that produces an invalid value.

GHSA-h3vp-qwmx-5j25: Grokability Snipe-IT has incorrect authorization for accessing asset information

Grokability Snipe-IT before 8.1.0 has incorrect authorization for accessing asset information.

Mike Waltz Has Somehow Gotten Even Worse at Using Signal

A photo taken this week showed Mike Waltz using an app that looks like—but is not—Signal to communicate with top officials. "I don't even know where to start with this," says one expert.

GHSA-f9ch-h8j7-8jwg: Hashicorp Vault Community vulnerable to Incorrect Authorization

Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18.

GHSA-8w8f-h4cm-c4pg: Casdoor SCIM User Creation Endpoint scim.go HandleScim authorization in github.com/casdoor/casdoor

A vulnerability classified as critical was found in Casdoor up to 1.811.0. This vulnerability affects the function HandleScim of the file controllers/scim.go of the component SCIM User Creation Endpoint. The manipulation leads to authorization bypass. The attack can be initiated remotely. Upgrading to version 1.812.0 is able to address this issue. The name of the patch is 3d12ac8dc2282369296c3386815c00a06c6a92fe. It is recommended to upgrade the affected component.

Police Seize Dark Web Shop Pygmalion, Access User Data from 7K Orders

German police seized the dark web shop Pygmalion, gaining access to customer data linked to over 7,000 drug…

UK Luxury Retailer Harrods Hit by Cyber Attack After M&S, Co-op

Luxury retailer Harrods confirms a cyber attack attempt, restricting internet access but keeping its online store running. Learn…