Aggregator
CVE-2024-8217 | SourceCodester E-Commerce Website 1.0 /Admin/registration.php fname sql injection
Submit #398205: code-projects Responsive Hotel Site Using PHP With Source Code 1.0 SQL Injection [Accepted]
Submit #398204: code-projects Online Quiz Site Using PHP With Source Code 1.0 SQL Injection [Accepted]
Windows помогла хакерам взломать промышленного гиганта РФ
CVE-2024-8207 | MongoDB Server up to 5.0.13/6.0.2 on Linux Library process control
Submit #398157: SourceCodester E-Commerce Website 1.0 SQL Injection [Accepted]
Submit #397985: sourcecodester Medical Certificate Generator App v1.0 xss [Duplicate]
CVE-2024-8216 | nafisulbari/itsourcecode Insurance Management System 1.0 Payment editPayment.php recipt_no access control
重保战报20240827|TOP恶意IP、高危漏洞、热点事件分析持续更新中
Submit #393532: GitHub Insurance Management System 1.0 Improper Access Controls [Accepted]
Live Webinar | Adapting Firewalls and Proxy Gateways in the Zero Trust Era
Small Rural Alabama Hospital Reports Big 2023 Hacking Breach
A small rural Alabama hospital is notifying more than 61,000 patients that their sensitive information was potentially compromised in an October 2023 hacking incident. Why the many months-long delay in notifying regulators and affected individuals?
French Prosecutors Detail Motives For Telegram CEO Arrest
The Saturday evening arrest of Telegram CEO Pavel Durov by French law enforcement agencies thrust the already controversial social media platform further into the international spotlight as Paris authorities said the Russian billionaire will likely remain in custody at least through Wednesday.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-38856 Apache OFBiz Incorrect Authorization Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Versa Networks Releases Advisory for a Vulnerability in Versa Director, CVE-2024-39717
Versa Networks has released an advisory for a vulnerability (CVE-2024-39717) in Versa Director, a key component in managing SD-WAN networks, used by some Internet Service Providers (ISPs) and Managed Service Providers (MSPs). A cyber threat actor could exploit this vulnerability to take control of an affected system.
CISA urges organizations to apply necessary updates, hunt for any malicious activity, report any positive findings to CISA, and review the following for more information:
CISA has added this vulnerability to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation.
5% от налоговых льгот: ИТ-компании обяжут платить за развитие отрасли
6 Common Obfuscation Methods in Malware
Malware is evolving faster than ever. As security measures improve, so do the techniques used to bypass them. This ongoing arms race has led to increasingly sophisticated obfuscation methods that challenge even seasoned analysts. This blog post will explore some of the cutting-edge obfuscation tactics we’re seeing in the wild. We’ll break down how they […]
The post 6 Common Obfuscation Methods in Malware appeared first on ANY.RUN's Cybersecurity Blog.