Aggregator
CVE-2024-7943 | itsourcecode Laravel Property Management System 1.0 PropertiesController.php upload file unrestricted upload
CVE-2024-7942 | SourceCodester Leads Manager Tool 1.0 update-leads.php phone_number cross site scripting
Submit #393373: itsourcecode Laravel Property Management System 1.0 XSS [Accepted]
Submit #393372: itsourcecode Laravel Property Management System v1.0 FileUpload [Accepted]
Submit #393371: itsourcecode Laravel Property Management System v1.0 FileUpload [Accepted]
CVE-2024-43399 | MobSF Mobile-Security-Framework-MobSF up to 4.0.6 a Extension File path traversal
CVE-2024-7885 | Red Hat Undertow Proxy Protocol Parser information disclosure
CVE-2024-7850 | BP Profile Search Plugin up to 5.7.5 on WordPress cross-site request forgery
CVE-2024-7689 | Snapshot Backup Plugin up to 2.1.1 on WordPress cross-site request forgery
CVE-2024-5941 | GiveWP Plugin up to 3.14.1 on WordPress authorization
CVE-2024-5940 | GiveWP Plugin up to 3.13.0 on WordPress Event Setting authorization
CVE-2024-5939 | GiveWP Plugin up to 3.13.0 on WordPress authorization
CVE-2024-5932 | GiveWP Plugin up to 3.14.1 on WordPress code injection
CVE-2024-43379 | trufflesecurity TruffleHog up to 3.81.8 Endpoint server-side request forgery
CVE-2024-43380 | floraison fugit up to 1.11.0 Natural Parser resource consumption
CVE-2024-6508 | Red Hat OpenShift Console state entropy
Submit #393338: SourceCodester Leads Manager Tool 1.0 Cross Site Scripting [Accepted]
USENIX Security ’23 – Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Authors/Presenters:Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software appeared first on Security Boulevard.
Windows Secure Channel RCE Vulnerability Let Attackers Inject Malicious Files Remotely
A recent analysis of a security vulnerability in Microsoft’s Secure Channel revealed a critical flaw that could be exploited for remote code execution. The vulnerability was initially identified as an integer overflow issue. However, further investigation determined it to be a Use-After-Free (UAF) vulnerability. This type of vulnerability occurs when a program continues to use […]
The post Windows Secure Channel RCE Vulnerability Let Attackers Inject Malicious Files Remotely appeared first on Cyber Security News.