Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Videoflix CMS 1.3 Insecure Settings

Videoflix CMS version 1.3 appears to leave default credentials installed after installation.

Packet Storm
#vulnerability#windows#google#php#auth
Virtues cpanelCMS 1.0 SQL Injection

Virtues cpanelCMS version 1.0 suffers from a remote SQL injection vulnerability.

CMS BMGI International 4.0 SQL Injection

CMS BMGI International version 4.0 suffers from a remote SQL injection vulnerability.

CVE-2023-36546: DLL Hijacking – Finding CVE-2023-36546 in PEStudio 9.52

An issue in PEStudio v.9.52 allows a remote attacker to execute arbitrary code via a crafted DLL file to the PESstudio exeutable.

Understanding Active Directory Attack Paths to Improve Security

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies for all network endpoints. With it, users can access various resources across networks. As things tend to do, times, they are a'changin' – and a few years back, Microsoft introduced Azure Active Directory, the

CVE-2023-4009: Ops Manager Server Changelog — MongoDB Ops Manager 5.0

In MongoDB Ops Manager v5.0 prior to 5.0.22 and v6.0 prior to 6.0.17 it is possible for an authenticated user with project owner or project user admin access to generate an API key with the privileges of org owner resulting in privilege escalation.

CVE-2023-20569: AMD: CVE-2023-20569 Return Address Predictor

**Why is this AMD CVE included in the Security Update Guide?** The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please see the following for more information: * AMD-SB-7005

CVE-2023-38154: Windows Kernel Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.