Security
Headlines
HeadlinesLatestCVEs

Tag

#web

Remote Monitoring & Management software used in phishing attacks

Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.

Malwarebytes
#web#mac#git
Remote Monitoring & Management software used in phishing attacks

Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.

Patch now! Roundcube mail servers are being actively exploited

A vulnerability in Roundcube webmail is being actively exploited and CISA is urging users to install an updated version.

Stalkerware App “TheTruthSpy” Hacked Again, 50,000 Device Data Stolen

By Waqas The infamous stalkerware app was hacked by SiegedSec and ByteMeCrew, who shared the data with Switzerland-based hacker Maia Arson Crimew. This is a post from HackRead.com Read the original post: Stalkerware App “TheTruthSpy” Hacked Again, 50,000 Device Data Stolen

Mitsubishi Electric MELSEC iQ-R Series Safety CPU

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: MELSEC iQ-R Series Safety CPU and SIL2 Process CPU Module Vulnerability: Incorrect Privilege Assignment 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than themselves. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Mitsubishi Electric reports that the following MELSEC iQ-R Series products are affected: MELSEC iQ-R Series Safety CPU R08SFCPU: All versions MELSEC iQ-R Series Safety CPU R16SFCPU: All versions MELSEC iQ-R Series Safety CPU R32SFCPU: All versions MELSEC iQ-R Series Safety CPU R120SFCPU: All versions MELSEC iQ-R Series SIL2 Process CPU R08PSFCPU: All versions MELSEC iQ-R Series SIL2 Process CPU R16PSFCPU: All versions MELSEC iQ-R Series SIL2 Process CPU R32PSFCPU: All versions MELSEC iQ-R Series SIL2 Proce...

Warzone RAT infrastructure seized

International law enforcements agencies have disruped the infrastructure behind the Warzone RAT.

CVE-2024-21384: Microsoft Office OneNote Remote Code Execution Vulnerability

**According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?** The word **Remote** in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the **Attack Vector** is **Local** and **User Interaction** is **Required**, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.

CVE-2024-20673: Microsoft Office Remote Code Execution Vulnerability

**According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?** The word **Remote** in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the **Attack Vector** is **Local** and **User Interaction** is **Required**, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.

CVE-2024-21328: Dynamics 365 Sales Spoofing Vulnerability

**According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?** The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.

CVE-2024-21394: Dynamics 365 Field Service Spoofing Vulnerability

**According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?** The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.