Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

CVE-2023-22372: myF5

In the pre connection stage, an improper enforcement of message integrity vulnerability exists in BIG-IP Edge Client for Windows and Mac OS.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVE
#vulnerability#mac#windows
CVE-2023-24461: myF5

An improper certificate validation vulnerability exists in the BIG-IP Edge Client for Windows and macOS and may allow an attacker to impersonate a BIG-IP APM system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Google takes CryptBot to the wood shed

Categories: News Tags: CryptBot Tags: malware Tags: chrome Tags: download Tags: package Tags: packages Tags: google Tags: legal Tags: court order Tags: RICO Tags: Pakistan We take a look at Google's efforts to shut down a particularly nasty set of modified Chrome installs playing host to CryptBot malware. (Read more...) The post Google takes CryptBot to the wood shed appeared first on Malwarebytes Labs.

CVE-2022-40302: Releases · FRRouting/frr

An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.

CVE-2023-25792: WordPress WP Open Social plugin <= 5.0 - Cross Site Scripting (XSS) - Patchstack

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in XiaoMac WP Open Social plugin <= 5.0 versions.

Is it OK to train an AI on your images, without permission?

Categories: News Tags: AI Tags: bot Tags: tool Tags: scrape Tags: scraper Tags: website. image Tags: images Tags: art Tags: artist Tags: consent A tool that's harvesting pictures to train image-generating AIs has caused some measure of chaos among webmasters who'd rather their sites were not scraped. (Read more...) The post Is it OK to train an AI on your images, without permission? appeared first on Malwarebytes Labs.

CVE-2023-31434: Stored and reflected XSS - CVE-2023-31434

The parameters nutzer_titel, nutzer_vn, and nutzer_nn in the user profile, and langID and ONLINEID in direct links, in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 do not validate input, which allows authenticated attackers to inject HTML Code and XSS payloads in multiple locations.

CVE-2023-26546: $the_title - $company_name

European Chemicals Agency IUCLID before 6.27.6 allows remote authenticated users to execute arbitrary code via Server Side Template Injection (SSTI) with a crafted template file. The attacker must have template manager permission.

Red Hat Security Advisory 2023-2074-01

Red Hat Security Advisory 2023-2074-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

SolarWinds: The Untold Story of the Boldest Supply-Chain Hack

The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.