Aggregator
CVE-2024-8974 | GitLab Enterprise Edition up to 17.2.7/17.3.3/17.4.0 Private Project incorrect provision of specified functionality (Issue 482843)
CVE-2024-4099 | GitLab Enterprise Edition up to 17.2.7/17.3.3/17.4.0 escape output (Issue 457798)
CVE-2024-47076 | OpenPrinting libcupsfilters up to 2.1b1 IPP Attribute cfGetPrinterAttributes5 input validation (GHSA-rj88-6mr5-rcw8)
CVE-2024-45986 | projectworlds Online Voting System 1.0 voter.php cross site scripting
CVE-2024-47177 | OpenPrinting cups-filters up to 2.0.1 PPD File FoomaticRIPCommandLine command injection (GHSA-rj88-6mr5-rcw8)
CVE-2024-47175 | OpenPrinting libppd up to 2.1b1 buffer overflow (GHSA-rj88-6mr5-rcw8)
CVE-2024-47176 | OpenPrinting cups-browsed 2.0.1 CUPS Service binding to an unrestricted ip address (GHSA-rj88-6mr5-rcw8)
CVE-2024-6769 | Microsoft Windows 10/11/Server 2016/Server 2019/Server 2022 Drive Remapping untrusted search path
Elaine's Realtime CRM Automation 6.18.17 Cross Site Scripting
ABB Cylon Aspect 3.07.00 Remote Code Execution
Security Professionals Cite AI as Top Security Risk
Artificial intelligence (AI) is emerging as a top concern in the cybersecurity world, with 48% of respondents identifying it as the most significant security risk facing their organizations, according to a HackerOne survey of 500 security professionals.
The post Security Professionals Cite AI as Top Security Risk appeared first on Security Boulevard.
ABB Cylon Aspect 3.07.01 Hard-Coded Credentials
The Return of the Laptop From Hell
California court refuses to dismiss computer crime charges against an entity that analyzed Hunter Biden’s laptop.
The post The Return of the Laptop From Hell appeared first on Security Boulevard.
Google 在俄罗斯限制创建新账号
Patch for Critical CUPS vulnerability: Don't Panic, (Thu, Sep 26th)
Exclusive: Compass Group Australia Data Breach. Medusa, “They came to our tor chat, begged long time, but couldn’t pay our amount”
Tosint: Open-source Telegram OSINT tool
Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security researchers, investigators, and others who want to gather insights from Telegram sources. Several law enforcement agencies utilize Tosint to gather intelligence and monitor cybercriminal activities. “I created Tosint to analyze and track cybercriminals, particularly those involved in phishing attacks. As head of threat intelligence at D3Lab, I counter phishing for various Italian and international banks … More →
The post Tosint: Open-source Telegram OSINT tool appeared first on Help Net Security.
How the Promise of AI Will Be a Nightmare for Data Privacy
But as we start delegating LLMs and LAMs the authority to act on our behalf (our personal avatars), we create a true data privacy nightmare.
The post How the Promise of AI Will Be a Nightmare for Data Privacy appeared first on Security Boulevard.