Aggregator
CVE-2019-14929 | Mitsubishi Electric ME-RTU/INEA ME-RTU Credentials insufficiently protected credentials
CVE-2023-44152 | Acronis Cyber Protect 15 improper authentication
CVE-2023-44156 | Acronis Cyber Protect Spell information disclosure
CVE-2023-44213 | Acronis Agent up to Build 31637 on Windows information disclosure
CVE-2023-45246 | Acronis Agent up to Build 36119 improper authentication
CVE-2023-39726 | Mintty up to 3.6.4 Commands Privilege Escalation
CVE-2024-21796 | Ministry of Defense Electronic Deliverables Creation Support Tool (Construction Edition) XML File xml external entity reference
Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes
September 2024 Patch Tuesday is here and Microsoft has delivered 79 fixes, including those for a handful of zero-days (CVE-2024-38217, CVE-2024-38226, CVE-2024-38014, CVE-2024-43461) exploited by attackers in the wild, and a Windows 10 code defect (CVE-2024-43491) that rolled back earlier CVE fixes. The actively exploited flaws Let’s start with the only one that was previously publicly known: CVE-2024-38217, a vulnerability that allows attackers to bypass Mark of the Web (MotW). Elastic Security researcher Joe Desimone … More →
The post Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes appeared first on Help Net Security.
Adobe security advisory (AV24–511)
Ivanti fixes maximum severity RCE bug in Endpoint Management software
CVE-2014-6255 | Zenoss Core up to 3.0.1 Login Form came_from redirect (VU#449452)
New PIXHELL acoustic attack leaks secrets from LCD screen noise
Microsoft security advisory – September 2024 monthly rollup (AV24-510)
CVE-2017-11823 | Microsoft Windows 10/Server 2016 Device Guard access control (KB4042895 / EDB-42997)
USENIX Security ’23 – Decompiling x86 Deep Neural Network Executables
Authors/Presenters:Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – Decompiling x86 Deep Neural Network Executables appeared first on Security Boulevard.