Security
Headlines
HeadlinesLatestCVEs

Tag

#pdf

Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote Campaign

The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and rapidly evolving its tools and tactics as part of a long-running activity called DeathNote. While the nation-state adversary is known for its persistent attacks on the cryptocurrency sector, it has also targeted automotive, academic, and defense sectors in Eastern Europe and other parts of the world

The Hacker News
#web#mac#google#microsoft#git#backdoor#pdf#The Hacker News
Lazarus Group's 'DeathNote' Cluster Pivots to Defense Sector

Usually focused on going after cryptocurrency organizations, the threat actor has begun targeting defense companies around the world.

CVE-2023-26852: textpattern_4.8.8 – Google Drive

An arbitrary file upload vulnerability in the upload plugin of Textpattern v4.8.8 and below allows attackers to execute arbitrary code by uploading a crafted PHP file.

CVE-2023-27703: pikpak_debugging_interface_leakage_vulnerability – Google Drive

The Android version of pikpak v1.29.2 was discovered to contain an information leak via the debug interface.

CVE-2023-1988: Online-Computer-and-Laptop-Store/5- There is a storage type cross site scripting attack at the brand name.pdf at main · boyi0508/Online-Computer-and-Laptop-Store

A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=maintenance/brand. The manipulation of the argument Brand Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225536.

CVE-2023-1987: Online-Computer-and-Laptop-Store/4-SQL injection present at order status update.pdf at main · boyi0508/Online-Computer-and-Laptop-Store

A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is the function update_order_status of the file /classes/Master.php?f=update_order_status. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225535.

CVE-2023-1986: Online-Computer-and-Laptop-Store/3-SQL injection exists at order deletion point.pdf at main · boyi0508/Online-Computer-and-Laptop-Store

A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. Affected is the function delete_order of the file /classes/master.php?f=delete_order. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225534 is the identifier assigned to this vulnerability.

Where Are the Women? Making Cybersecurity More Inclusive

Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.

CVE-2023-1552

ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.  Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user. 

CVE-2023-23277: security-advisories/CVE-2023-23277.pdf at master · go-compile/security-advisories

Snippet-box 1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote attackers can render arbitrary web script or HTML from the "Snippet code" form field.