Security
Headlines
HeadlinesLatestCVEs

Tag

#git

CVE-2023-39049: CVE-reports/CVE-2023-39049.md at main · syz913/CVE-reports

An information leak in youmart-tokunaga v13.6.1 allows attackers to obtain the channel access token and send crafted messages.

CVE
#vulnerability#git
CVE-2023-39046: CVE-reports/CVE-2023-39046.md at main · syz913/CVE-reports

An information leak in TonTon-Tei_waiting Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages.

GHSA-r87q-fq37-pvr6: A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA

A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.

CVE-2023-42441: incorrect re-entrancy lock when key is empty string

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant("")` or `@nonreentrant('')` do not produce reentrancy checks at runtime. This issue is fixed in version 0.3.10. As a workaround, ensure the lock name is a non-empty string.

CVE-2023-39058: CVE-reports/CVE-2023-39058.md at main · syz913/CVE-reports

An information leak in THE_B_members card v13.6.1 allows attackers to obtain the channel access token and send crafted messages.

CVE-2023-39043: Home - YK Communications

An information leak in YKC Tokushima_awayokocho Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages.

CVE-2023-39040: CVE-reports/CVE-2023-39040.md at main · syz913/CVE-reports

An information leak in Cheese Cafe Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages.

GHSA-3hg2-r75x-g69m: Vyper has incorrect re-entrancy lock when key is empty string

### Impact Locks of the type `@nonreentrant("")` or `@nonreentrant('')` do not produce reentrancy checks at runtime. ```Vyper @nonreentrant("") # unprotected @external def bar(): pass @nonreentrant("lock") # protected @external def foo(): pass ``` ### Patches Patched in #3605 ### Workarounds The lock name should be a non-empty string.

Microsoft AI Researchers Expose 38TB of Top Sensitive Data

By Waqas Another day, another data security incident at Microsoft. This is a post from HackRead.com Read the original post: Microsoft AI Researchers Expose 38TB of Top Sensitive Data

Crooks Exploited Satellite Live Feed Delay for Betting Advantage

By Deeba Ahmed The gang used satellite technology to get sports feed and predict match results before bookmakers. This is a post from HackRead.com Read the original post: Crooks Exploited Satellite Live Feed Delay for Betting Advantage