Aggregator
CVE-2024-23469 | SolarWinds Access Rights Manager up to 2023.2.4 input validation
CVE-2024-23471 | SolarWinds Access Rights Manager up to 2023.2.4 Service improper authentication
CVE-2024-23475 | SolarWinds Access Rights Manager up to 2023.2.4 path traversal
CVE-2024-23465 | SolarWinds Access Rights Manager up to 2023.2.4 Active Directory improper authentication
CVE-2024-23474 | SolarWinds Access Rights Manager up to 2023.2.4 path traversal
CVE-2024-28074 | SolarWinds Access Rights Manager up to 2023.2.4 deserialization
Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure
AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-249A) published on September 5, 2024, that assesses cyber actors affiliated with the Russian General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155), who are responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm since at least 2020.
The post Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure appeared first on AttackIQ.
The post Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure appeared first on Security Boulevard.
CVE-2019-14928 | Mitsubishi Electric ME-RTU/INEA ME-RTU index.php input Stored cross site scripting
CVE-2019-14929 | Mitsubishi Electric ME-RTU/INEA ME-RTU Credentials insufficiently protected credentials
CVE-2023-44152 | Acronis Cyber Protect 15 improper authentication
CVE-2023-44156 | Acronis Cyber Protect Spell information disclosure
CVE-2023-44213 | Acronis Agent up to Build 31637 on Windows information disclosure
CVE-2023-45246 | Acronis Agent up to Build 36119 improper authentication
CVE-2023-33558 | Ocomon up to 4.0.0 users-grid-data.php information disclosure
CVE-2023-39726 | Mintty up to 3.6.4 Commands Privilege Escalation
CVE-2024-21796 | Ministry of Defense Electronic Deliverables Creation Support Tool (Construction Edition) XML File xml external entity reference
Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes
September 2024 Patch Tuesday is here and Microsoft has delivered 79 fixes, including those for a handful of zero-days (CVE-2024-38217, CVE-2024-38226, CVE-2024-38014, CVE-2024-43461) exploited by attackers in the wild, and a Windows 10 code defect (CVE-2024-43491) that rolled back earlier CVE fixes. The actively exploited flaws Let’s start with the only one that was previously publicly known: CVE-2024-38217, a vulnerability that allows attackers to bypass Mark of the Web (MotW). Elastic Security researcher Joe Desimone … More →
The post Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes appeared first on Help Net Security.