Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Hackers Exploit Windows Policy Loophole to Forge Kernel-Mode Driver Signatures

A Microsoft Windows policy loophole has been observed being exploited primarily by native Chinese-speaking threat actors to forge signatures on kernel-mode drivers. "Actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates," Cisco Talos said in an exhaustive two-part report shared

The Hacker News
#web#windows#google#microsoft#cisco#git#auth#chrome#firefox#The Hacker News
Mastery LMS 1.2 Cross Site Scripting

Mastery LMS version 1.2 suffers from a cross site scripting vulnerability.

Academy LMS 5.15 Cross Site Scripting

Academy LMS version 5.15 suffers from a cross site scripting vulnerability.

Atlas Business Directory Listing 2.13 Cross Site Scripting

Atlas Business Directory Listing version 2.13 suffers from cross site scripting vulnerabilities.

Ekushey Project Manager CRM 5.0 Cross Site Scripting

Ekushey Project Manager CRM version 5.0 suffers from a persistent cross site scripting vulnerability.

Ateme TITAN File 3.9 Job Callbacks Server-Side Request Forgery

Ateme TITAN File version 3.9 suffers from a server-side request forgery vulnerability that allows for file enumeration.

CVE-2023-36167: AVG 2023 | FREE Antivirus, VPN & TuneUp for All Your Devices

An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component.

CVE-2020-20118: Avast | Lataa Free Antivirus ja VPN | Täysin ilmainen ja helppo

Buffer Overflow vulnerability in Avast AntiVirus before v.19.7 allows a local attacker to cause a denial of service via a crafted request to the aswSnx.sys driver.

Beware of Big Head Ransomware: Spreading Through Fake Windows Updates

A developing piece of ransomware called Big Head is being distributed as part of a malvertising campaign that takes the form of bogus Microsoft Windows updates and Word installers. Big Head was first documented by Fortinet FortiGuard Labs last month, when it discovered multiple variants of the ransomware that are designed to encrypt files on victims' machines in exchange for a cryptocurrency

CVE-2023-32049: Windows SmartScreen Security Feature Bypass Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** The user would have to click on a specially crafted URL to be compromised by the attacker.