What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CVE.webp 2023-02-09 23:15:11 CVE-2015-10076 (lien direct) A vulnerability was found in dimtion Shaarlier up to 1.2.2. It has been declared as critical. Affected by this vulnerability is the function createTag of the file app/src/main/java/com/dimtion/shaarlier/TagsSource.java of the component Tag Handler. The manipulation leads to sql injection. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e. It is recommended to upgrade the affected component. The identifier VDB-220453 was assigned to this vulnerability. Vulnerability Guideline
CVE.webp 2023-02-09 20:15:11 CVE-2023-22796 (lien direct) A regular expression based DoS vulnerability in Active Support Vulnerability Guideline
CVE.webp 2023-02-09 20:15:11 CVE-2023-22792 (lien direct) A regular expression based DoS vulnerability in Action Dispatch Vulnerability Guideline
CVE.webp 2023-02-09 20:15:11 CVE-2023-22795 (lien direct) A regular expression based DoS vulnerability in Action Dispatch Vulnerability Guideline
The_Hackers_News.webp 2023-02-09 18:41:00 THN Webinar – Learn How to Comply with New Cyber Insurance Identity Security Requirements (lien direct) The Hacker News is thrilled to announce the launch of our new educational webinar series, in collaboration with the leading cybersecurity companies in the industry! Get ready to dive into the world of enterprise-level security with expert guests who will share their vast knowledge and provide you with valuable insights and information on various security topics. Whether you're a seasoned Guideline
CVE.webp 2023-02-09 17:15:14 CVE-2022-48295 (lien direct) The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). Vulnerability Guideline
CVE.webp 2023-02-09 11:15:10 CVE-2023-0758 (lien direct) A vulnerability was found in glorylion JFinalOA 1.0.2 and classified as critical. This issue affects some unknown processing of the file src/main/java/com/pointlion/mvc/common/model/SysOrg.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220469 was assigned to this vulnerability. Vulnerability Guideline
Logo_logpoint.webp 2023-02-09 10:24:57 Long-term resilience – Driven by innovative leadership (lien direct) >Cybersecurity used to be seen as a less-than-necessary investment. Business leaders were of the opinion that it's better to gamble on not getting targeted by threat actors than to spend money on protecting their digital infrastructure and consequently diminish their profits. And so, fast forward to today and this opinion is way outdated. Thanks to the [...] Threat Guideline ★★
Anomali.webp 2023-02-09 09:45:00 Transforming Threat Data into Actionable Intelligence (lien direct) Introduction In today's digital age, the threat of cyber-attacks is greater than ever. Traditional security operations, which have focused on reactive measures such as patching vulnerabilities and responding to breaches, are no longer sufficient to meet the challenges of the modern threat landscape. As a result, security organizations are shifting their focus to proactive measures to stay ahead of emerging threats. This shift towards proactive security operations is the focus of a new five-article series written by analysts at TAG Cyber. The series examines the latest trends and challenges for cybersecurity teams and explores the cutting-edge solutions that are helping security organizations become more proactive in their defense against cyber-attacks. Anomali's solutions are important in helping security operations (secops) teams move from a reactive to a proactive security program. Anomali, a leading threat intelligence provider and incident management software, offers a viable solution. Anomali's platform enables security teams to quickly and easily identify and respond to emerging threats by providing real-time visibility into the latest cyber threats and vulnerabilities, allowing organizations to take proactive measures to protect themselves from potential attacks instead of simply reacting to breaches after they have occurred. The series also delves into the strategies and technologies that can help CISOs and secops teams improve their operations. Anomali's platform is a key element in integrating threat intelligence with other technologies, such as Extended Detection and Response (XDR) and Attack Surface Management (ASM), to enhance the overall security posture of an organization. Additionally, Anomali's solutions assist with digital risk protection (DRP) in identifying and mitigating the risks associated with third-party vendors and partners. In summary, the series provides an in-depth look at the latest strategies and technologies to help CISOs and security teams become more proactive in their defense against cyber attacks. Anomali's solutions play a crucial role in this shift and assist organizations in identifying and mitigating emerging threats, integrating with other technologies, while addressing the skills gap.   Article 1: Transforming Threat Data into Actionable Intelligence Christopher R. Wilder, TAG Cyber  This article is the first in a series of guest blogs written by TAG Cyber analysts in conjunction with our colleagues at Anomali. Our five-part series of blogs focus on how threat-intelligence management integrates with extended detection and response (XDR) to increase operational efficiencies in an enterprise security operations environment and drive actionable prevention, detection, and response. The commercial Anomali platform demonstrates how integration between threat intelligence and XDR can work in the field. Threat intelligence is divided into three main categories: strategic, operational, and tactical. Strategic threat intelligence focuses on understanding the overall threat landscape and identifying long-term trends. It informs strategic decisions and helps organizations understand the potential risks they face. Operational threat intelligence identifies and responds to specific threats in real-time. It informs an organization’s day-to-day operations and helps protect against immediate threats. Tactical threat intelligence provides detailed information about specific threats, such as the tools, techniques, and procedures used by attackers. It also apprises tactical decisions and helps organizations respond to incidents. Threat intelligence is essential to any security program, providing organizations with the information they need to identify and respond to potential threats proactively. Threat intelligence provides operational and tactical threat intelligence to help organizations respond to specific dangers in real-time an Malware Threat Patching Guideline ★★★
CSO.webp 2023-02-09 08:46:00 BrandPost: Embrace This Opportunity to Attract New Cybersecurity Talent (lien direct) Ask nearly any security leader whether they have adequate resources to protect their organization effectively and consistently, and you'll likely hear an emphatic "No.” Given that an estimated 3.4 million people are needed to fill the global cybersecurity workforce gap, it's no surprise that CISOs feel that they need more staff to safeguard their networks, let alone focus on more strategic priorities. And nearly 70% of leaders say this skills gap creates additional cyber risks for their business.  To read this article in full, please click here Guideline
CSO.webp 2023-02-09 02:00:00 How to unleash the power of an effective security engineering team (lien direct) Security teams are comprised primarily of operations, compliance, and policy-related roles. Security engineering teams, on the other hand, are builders. They build services, automate processes, and streamline deployments to support the core security team and its stakeholders. Security engineering teams are typically made up of software and infrastructure engineers, architects, and product managers.The collective security/security engineering team mindset is also that of a builder, quite different from that of a penetration tester or third-party risk management assessor. This presents a challenge to security leaders. As security engineering teams continue to grow in prominence, CISOs need to be intentional with their structure and development.To read this article in full, please click here Guideline ★★
CVE.webp 2023-02-08 20:15:25 CVE-2023-25166 (lien direct) formula is a math and string formula parser. In versions prior to 3.0.1 crafted user-provided strings to formula's parser might lead to polynomial execution time and a denial of service. Users should upgrade to 3.0.1+. There are no known workarounds for this vulnerability. Guideline
CVE.webp 2023-02-08 20:15:24 CVE-2023-0216 (lien direct) An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data. Guideline
CVE.webp 2023-02-08 20:15:24 CVE-2023-0217 (lien direct) An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3. Guideline
CVE.webp 2023-02-08 20:15:24 CVE-2023-0401 (lien direct) A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data. Guideline
CVE.webp 2023-02-08 20:15:23 CVE-2022-4450 (lien direct) The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. Guideline
CVE.webp 2023-02-08 19:15:11 CVE-2023-23475 (lien direct) IBM Infosphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 245423. Vulnerability Guideline
Checkpoint.webp 2023-02-08 17:00:12 Announcing Check Point Software\'s Americas Partner Winners at CPX 360 New York (lien direct) >At Check Point Software, we are a 100% channel driven company. Together with our partners, we deliver industry-leading cybersecurity solutions to hundreds of thousands of organizations of all sizes, around the world. Each year at our global conference, CPX 360, Check Point comes together with our partners and customers to celebrate our wins and prepare… Guideline ★★
The_Hackers_News.webp 2023-02-08 15:09:00 Russian Hacker Pleads Guilty to Money Laundering Linked to Ryuk Ransomware (lien direct) A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and for attempting to conceal the source of funds obtained in connection with Ryuk ransomware attacks. Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November 2021 before he was extradited from the Netherlands in August 2022. He is awaiting sentencing on April 11, 2023. "Between at least Ransomware Guideline ★★
globalsecuritymag.webp 2023-02-08 12:03:57 Hackuity Strengthens Organisation and UK Leadership with New Appointments (lien direct) Hackuity Strengthens Organisation and UK Leadership with New Appointments A combined 67 years of cybersecurity experience leads Hackuity to new territories - Business News Guideline ★★
CVE.webp 2023-02-08 11:15:10 CVE-2022-43763 (lien direct) Insufficient check of preconditions could lead to Denial of Service conditions when calling commands on the Tbase server of B&R APROL versions < R 4.2-07. Guideline
CVE.webp 2023-02-08 11:15:10 CVE-2022-43762 (lien direct) Lack of verification in B&R APROL Tbase server versions < R 4.2-07 may lead to memory leaks when receiving messages Guideline
CVE.webp 2023-02-08 11:15:10 CVE-2022-43764 (lien direct) Insufficient validation of input parameters when changing configuration on Tbase server in B&R APROL versions < R 4.2-07 could result in buffer overflow. This may lead to Denial-of-Service conditions or execution of arbitrary code. Guideline
CVE.webp 2023-02-08 10:15:09 CVE-2022-2094 (lien direct) The Yellow Yard Searchbar WordPress plugin before 2.8.2 does not escape some URL parameters before outputting them back to the user, leading to Reflected Cross-Site Scripting Guideline
CSO.webp 2023-02-08 07:01:00 Growing number of endpoint security tools overwhelm users, leaving devices unprotected (lien direct) Enterprises that use endpoint security and management technologies face a problem of growing marketplace “sprawl,” as new tools proliferate and options multiply, according to a study released today by the Enterprise Services Group.Between the ongoing influence of remote work and IoT, the number and diversity of devices that have to be managed by endpoint security tools is on the rise. As a consequence, the number of available tools to manage them has also risen.An ESG survey of 380 security professionals in North America, commissioned by cybersecurity company Syxsense, showed that companies using larger numbers of different tools to manage their endpoints had larger proportions of unmanaged endpoints, compared to those with fewer. Put simply, the complexity of the current-day device environment is leading to worse security, according to the research.To read this article in full, please click here Guideline ★★
CSO.webp 2023-02-08 05:08:00 BrandPost: How Do You Protect Your Data in the Age of Hybrid Work? (lien direct) By Sundaram Lakshmanan, Chief Technology Officer, Lookout We live in an age where hybrid work and bring-your-own-device (BYOD) programs have become the norm. The result is that you're tasked with protecting your data in an environment that's far more complex than in the past.   To read this article in full, please click here Guideline
The_State_of_Security.webp 2023-02-08 04:31:31 The Role of Data Hygiene in the Security of the Energy Industry (lien direct) We create massive amounts of data daily, from the exercise stats compiled by our wearable devices to smart meters used at our homes to reduce expense consumption to maintenance statistics of critical systems in industrial settings. If data creation continues at its present rate, more than a yottabyte (a million trillion megabytes) will likely be generated annually by 2030. Even though big data is moving power behind modern, digital-first organizations, an average company uses only a fraction of the data they collect. According to a recent survey by VMware, 83% of business leaders believe that... Guideline Industrial ★★
CVE.webp 2023-02-08 02:15:08 CVE-2023-0722 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-08 02:15:08 CVE-2023-0726 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_edit_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-08 02:15:08 CVE-2023-0725 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_clone_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-08 02:15:08 CVE-2023-0724 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_add_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-08 02:15:07 CVE-2023-0685 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_unassign_folders function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.. Guideline
CVE.webp 2023-02-07 23:15:09 CVE-2023-0727 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_delete_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-07 23:15:09 CVE-2023-0730 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder_order function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-07 23:15:09 CVE-2023-0723 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
CVE.webp 2023-02-07 22:15:11 CVE-2023-0728 (lien direct) The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Guideline
RecordedFuture.webp 2023-02-07 21:17:45 Russian crypto exchange exec pleads guilty to laundering Ryuk ransomware funds (lien direct) justice lawA Russian man pleaded guilty on Monday in an Oregon court on charges related to laundering funds for the Ryuk ransomware group.  Denis Dubnikov was arrested in November 2021 in the Netherlands before being extradited to the U.S. last August. Prosecutors accused him, along with 13 co-conspirators whose names were redacted in a federal indictment, [… Ransomware Guideline ★★★
CVE.webp 2023-02-07 21:15:08 CVE-2011-10003 (lien direct) A vulnerability was found in XpressEngine up to 1.4.4. It has been rated as critical. This issue affects some unknown processing of the component Update Query Handler. The manipulation leads to sql injection. Upgrading to version 1.4.5 is able to address this issue. The name of the patch is c6e94449f21256d6362450b29c7847305e756ad5. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220247. Vulnerability Guideline
CVE.webp 2023-02-07 20:15:08 CVE-2023-0732 (lien direct) A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file oews/classes/Users.php of the component POST Request Handler. The manipulation of the argument firstname/middlename/lastname/lastname/contact leads to cross site scripting. The attack can be launched remotely. The identifier VDB-220369 was assigned to this vulnerability. Vulnerability Guideline
RecordedFuture.webp 2023-02-07 19:19:38 House approves cybersecurity research bill focused on energy infrastructure (lien direct) Rep. Deborah Ross, cybersecurityThe U.S. House of Representatives on Monday passed a bill that would provide funding for cybersecurity research with a focus on protecting the country's energy infrastructure.  The Energy Cybersecurity University Leadership Act - inspired by the ransomware attack on Colonial Pipeline and several other incidents - proposes grants and other forms of funding to graduate [… Ransomware Guideline ★★★
CVE.webp 2023-02-07 19:15:09 CVE-2022-46285 (lien direct) A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. Guideline
CVE.webp 2023-02-07 19:15:09 CVE-2023-24813 (lien direct) Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. Vulnerability Guideline
Cybereason.webp 2023-02-07 18:17:40 THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise (lien direct) THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise The Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader through heavily-obfuscated JavaScript files. In addition to the new techniques used to load GootLoader, Cybereason also observed Cobalt Strike deployment, which leveraged DLL Hijacking, on top of a VLC MediaPlayer executable. Threat Guideline ★★★
RecordedFuture.webp 2023-02-07 17:41:31 More than 2,000 cybersecurity patent applications filed since 2010: report (lien direct) The number of cybersecurity patent applications has skyrocketed over the past decade, with U.S. companies leading the way.  According to French software company IS Decisions, about 2,270 cybersecurity-related patents have been filed since the turn of the century. Nearly all – about 97% – have been filed since 2010, a year that marked a huge [… Guideline ★★★
CS.webp 2023-02-07 17:33:55 Russian ransomware money launderer pleads guilty to funneling Ryuk payments (lien direct) >A Russian man extradited to the U.S. last year pleads guilty to attempting to conceal ransom payments that resulted from attacks on Americans. Ransomware Guideline ★★★
CVE.webp 2023-02-07 17:15:11 CVE-2022-41313 (lien direct) A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="switch_contact" Vulnerability Guideline Industrial
CVE.webp 2023-02-07 17:15:11 CVE-2022-41312 (lien direct) A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="Switch Description", name "switch_description" Vulnerability Guideline Industrial
CVE.webp 2023-02-07 17:15:10 CVE-2022-41311 (lien direct) A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="webLocationMessage_text" name="webLocationMessage_text" Vulnerability Guideline Industrial
CVE.webp 2023-02-07 17:15:10 CVE-2022-40693 (lien direct) A cleartext transmission vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability. Vulnerability Guideline Industrial
CVE.webp 2023-02-07 17:15:10 CVE-2022-40224 (lien direct) A denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability. Vulnerability Guideline Industrial
Last update at: 2024-06-12 05:07:06
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter