Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

FlightPath LMS 5.0-rc2 Insecure Direct Object Reference

FlightPath LMS version 5.0-rc2 suffers from an insecure direct object reference vulnerability.

Packet Storm
#vulnerability#windows#google#auth#firefox
FAST TECH CMS 1.0 Cross Site Request Forgery

FAST TECH CMS version 1.0 suffers from a cross site request forgery vulnerability.

doorGets CMS 12 Shell Upload

doorGets CMS version 12 suffers from a remote shell upload vulnerability.

Lazarus Group's infrastructure reuse leads to discovery of new malware

Lazarus Group appears to be changing its tactics, increasingly relying on open-source tools and frameworks in the initial access phase of their attacks, as opposed to strictly employing them in the post-compromise phase.

Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT

This is the third documented campaign attributed to this actor in less than a year, with the actor reusing the same infrastructure throughout these operations.

New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute

The SmokeLoader malware is being used to deliver a new Wi-Fi scanning malware strain called Whiffy Recon on compromised Windows machines. "The new malware strain has only one operation. Every 60 seconds it triangulates the infected systems' positions by scanning nearby Wi-Fi access points as a data point for Google's geolocation API," Secureworks Counter Threat Unit (CTU) said in a statement

CVE-2023-40185: Provide explicit `$PATH` value to which by ericcornelissen · Pull Request #1142 · ericcornelissen/shescape

shescape is simple shell escape library for JavaScript. This may impact users that use Shescape on Windows in a threaded context. The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This bug has been patched in version 1.7.4.

CVE-2023-1409: [SERVER-77028] tlsClusterCAFile is not being used to validate client certificates on macOS

If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate. This issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions.

GEN Security+ 4.0 SQL Injection

GEN Security+ version 4.0 suffers from a remote SQL injection vulnerability.

Geeklog 2.1.0b1 Database Disclosure

Geeklog version 2.1.0b1 suffers from a database disclosure vulnerability.