Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

CVE-2023-35624

Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVE
#vulnerability#mac
CVE-2023-35625

Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability

CVE-2023-35619

Microsoft Outlook for Mac Spoofing Vulnerability

CVE-2020-28369: Privilege Management for Windows and Mac | BeyondTrust

In BeyondTrust Privilege Management for Windows (aka PMfW) through 5.7, a SYSTEM installation causes Cryptbase.dll to be loaded from the user-writable location %WINDIR%\Temp.

Non-Human Access is the Path of Least Resistance: A 2023 Recap

2023 has seen its fair share of cyber attacks, however there’s one attack vector that proves to be more prominent than others - non-human access. With 11 high-profile attacks in 13 months and an ever-growing ungoverned attack surface, non-human identities are the new perimeter, and 2023 is only the beginning.  Why non-human access is a cybercriminal’s paradise  People always

CVE-2023-49563: storedxss-snmpwebpro1.1

Cross Site Scripting (XSS) in Voltronic Power SNMP Web Pro v.1.1 allows an attacker to execute arbitrary code via a crafted script within a request to the webserver.

CVE-2023-35624: Azure Connected Machine Agent Elevation of Privilege Vulnerability

**According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?** A non-admin local user who has sufficient permissions to create symbolic links on a Windows computer that has Azure Connected Machine Agent installed (or before the agent is installed) could create links from a directory used by the agent to other privileged files on the computer. If the administrator later installs virtual machine extensions on the machine, those files could be deleted.

CVE-2023-35619: Microsoft Outlook for Mac Spoofing Vulnerability

**What is the nature of the spoofing?** An attacker could appear as a trusted user when they should not be. This could cause a user to mistakenly trust a signed email message as if it came from a legitimate user.

CVE-2023-35625: Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does this mean for this vulnerability?** The vulnerability enables data leakage only when a user's script is improperly used and triggers specific errors. The conditions required for triggering the error are not easily met making the complexity high.

CVE-2023-36004: Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability

**What is the attack vector for this vulnerability?** To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine.