Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

DSL-124 Wireless N300 ADSL2+ Backup Disclosure

DSL-124 Wireless N300 ADSL2+ suffers from a backup disclosure vulnerability.

Packet Storm
#vulnerability#web#mac#windows#php#auth
myBB forums 1.8.26 Cross Site Scripting

myBB forums version 1.8.26 suffers from a persistent cross site scripting vulnerability.

CVE-2023-29059: CWE-506: Embedded Malicious Code (4.10)

3CX DesktopApp through 18.12.416 has embedded malicious code, as exploited in the wild in March 2023. This affects versions 18.12.407 and 18.12.416 of the Electron Windows application shipped in Update 7, and versions 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 of the Electron macOS application.

Dreamer CMS 4.0.0 SQL Injection

Dreamer CMS version 4.0.0 suffers from a remote SQL injection vulnerability.

Uniview NVR301-04S2-P4 Cross Site Scripting

Uniview NVR301-04S2-P4 suffers from a cross site scripting vulnerability.

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux backdoor called KEYPLUG. "RedGolf is a particularly prolific Chinese state-sponsored threat actor group that has likely been active for many years against a wide range of industries globally," Recorded Future told The Hacker News. "The group has shown the ability to

Inbit Messenger 4.9.0 Remote Command Execution

Inbit Messenger versions 4.6.0 through 4.9.0 suffer from an unauthenticated remote command execution vulnerability.

Popular PABX platform, 3CX Desktop App suffers supply chain attack

By Deeba Ahmed According to cybersecurity researchers, a nation-state actor, LABYRINTH CHOLLIMA, is suspected to be behind the multi-stage attack on 3CXDesktopApp. This is a post from HackRead.com Read the original post: Popular PABX platform, 3CX Desktop App suffers supply chain attack

3CX Desktop App Targeted in Supply Chain Cyber Attack, Affecting Millions of Users

3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be an active supply chain attack that's using digitally signed and rigged installers of the popular voice and video conferencing software to target downstream customers. "The trojanized 3CX desktop app is the first stage in a multi-stage attack chain that pulls

3CX desktop app used in a supply chain attack

Categories: News Tags: 3CX Tags: supply-chain Tags: sideload Researchers have found that the 3CX desktop app may be compromised and used in supply chain attacks. (Read more...) The post 3CX desktop app used in a supply chain attack appeared first on Malwarebytes Labs.