Aggregator
Hackers Actively Exploiting Fortinet Firewalls: Real-Time Insights from GreyNoise
7 months 3 weeks ago
This blog details how attackers are actively exploiting Fortinet FortiGate firewalls vulnerable to CVE-2022-40684, with real-time insights from GreyNoise to help defenders understand and respond to these threats.
Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
7 months 3 weeks ago
CVE-2024-40891: Zyxel CPE Zero-day Exploitation. Hackers are actively exploiting a telnet-based command injection vulnerability in Zyxel CPE devices, impacting 1,500+ exposed systems. No patch is available yet.
Cloudflare meets new Global Cross-Border Privacy standards
7 months 3 weeks ago
2025-01-286 min readCloudflare proudly leads the way with our approach to data privacy and the prote
Cloudflare meets new Global Cross-Border Privacy (CBPR) standards
7 months 3 weeks ago
Cloudflare is the first organization globally to announce having been successfully audited against the ‘Global Cross-Border Privacy Rules’ system and ‘Global Privacy Recognition for Processors’.
Rory Malone
U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5
7 months 3 weeks ago
The DOJ, which has move aggressively over the past year to find and shut down North Korea's numerous IT worker scams, indicts two U.S. citizens and three others for running a six-year operation the stole more than $866,000 from 10 U.S. companies that thought they were hiring legitimate IT pros.
The post U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5 appeared first on Security Boulevard.
Jeffrey Burt
20 岁的小公司
7 months 3 weeks ago
不要因为走得太远而忘记为什么出发
20 岁的小公司
7 months 3 weeks ago
不要因为走得太远而忘记为什么出发
Daily Dose of Dark Web Informer - January 27th, 2025
7 months 3 weeks ago
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
Dark Web Informer - Cyber Threat Intelligence
CVE-2023-46748 | F5 BIG-IP up to 13.1.5/14.1.5/15.1.10/16.1.4/17.1.0 Configuration Utility sql injection (K000137365)
7 months 3 weeks ago
A vulnerability was found in F5 BIG-IP up to 13.1.5/14.1.5/15.1.10/16.1.4/17.1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component Configuration Utility. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2023-46748. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-33063 | Qualcomm 4 Gen 1 Mobile Platform DSP Service memory corruption
7 months 3 weeks ago
A vulnerability was found in Qualcomm 4 Gen 1 Mobile Platform, 4 Gen 2 Mobile Platform, 7c+ Gen 3 Compute, 8 Gen 1 Mobile Platform, 8 Gen 2 Mobile Platform, 8+ Gen 1 Mobile Platform, 8+ Gen 2 Mobile Platform, 210 Processor, 212 Mobile Platform, 315 5G IoT Modem, 425 Mobile Platform, 429 Mobile Platform, 439 Mobile Platform, 460 Mobile Platform, 480 5G Mobile Platform, 480+ 5G Mobile Platform SM4350-AC, 625 Mobile Platform, 626 Mobile Platform, 632 Mobile Platform, 660 Mobile Platform, 662 Mobile Platform, 665 Mobile Platform, 670 Mobile Platform, 675 Mobile Platform, 678 Mobile Platform SM6150-AC, 680 4G Mobile Platform, 685 4G Mobile Platform SM6225-AD, 690 5G Mobile Platform, 695 5G Mobile Platform, 710 Mobile Platform, 720G Mobile Platform, 730 Mobile Platform SM7150-AA, 730G Mobile Platform SM7150-AB, 732G Mobile Platform SM7150-AC, 750G 5G Mobile Platform, 765 5G Mobile Platform SM7250-AA, 765G 5G Mobile Platform SM7250-AB, 768G 5G Mobile Platform SM7250-AC, 778G+ 5G Mobile Platform SM7325-AE, 778G 5G Mobile Platform, 780G 5G Mobile Platform, 782G Mobile Platform SM7325-AF, 820 Automotive Platform, 835 Mobile PC Platform, 845 Mobile Platform, 855 Mobile Platform, 855+, 860 Mobile Platform SM8150-AC, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, 888 5G Mobile Platform, 888+ 5G Mobile Platform SM8350-AC, APQ8017, AQT1000, AR2 Gen 1 Platform, AR8031, AR8035, AR9380, Auto 4G Modem, Auto 5G Modem-RF, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM9650 and QAM8255P and classified as critical. This issue affects some unknown processing of the component DSP Service. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2023-33063. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-33107 | Qualcomm 4 Gen 1 Mobile Platform IOCTL Call memory corruption
7 months 3 weeks ago
A vulnerability was found in Qualcomm 4 Gen 1 Mobile Platform, 4 Gen 2 Mobile Platform, 7c+ Gen 3 Compute, 8 Gen 1 Mobile Platform, 8 Gen 2 Mobile Platform, 8+ Gen 1 Mobile Platform, 8+ Gen 2 Mobile Platform, 208 Processor, 210 Processor, 212 Mobile Platform, 315 5G IoT Modem, 425 Mobile Platform, 429 Mobile Platform, 439 Mobile Platform, 460 Mobile Platform, 480 5G Mobile Platform, 480+ 5G Mobile Platform SM4350-AC, 625 Mobile Platform, 626 Mobile Platform, 630 Mobile Platform, 632 Mobile Platform, 636 Mobile Platform, 660 Mobile Platform, 662 Mobile Platform, 665 Mobile Platform, 670 Mobile Platform, 675 Mobile Platform, 678 Mobile Platform SM6150-AC, 680 4G Mobile Platform, 685 4G Mobile Platform SM6225-AD, 690 5G Mobile Platform, 695 5G Mobile Platform, 710 Mobile Platform, 720G Mobile Platform, 730 Mobile Platform SM7150-AA, 730G Mobile Platform SM7150-AB, 732G Mobile Platform SM7150-AC, 750G 5G Mobile Platform, 765 5G Mobile Platform SM7250-AA, 765G 5G Mobile Platform SM7250-AB, 768G 5G Mobile Platform SM7250-AC, 778G+ 5G Mobile Platform SM7325-AE, 778G 5G Mobile Platform, 780G 5G Mobile Platform, 782G Mobile Platform SM7325-AF, 820 Automotive Platform, 835 Mobile PC Platform, 845 Mobile Platform, 855 Mobile Platform, 855+, 860 Mobile Platform SM8150-AC, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, 888 5G Mobile Platform, 888+ 5G Mobile Platform SM8350-AC, APQ8017, APQ8064AU, AQT1000, AR2 Gen 1 Platform, AR8031, AR8035, Auto 4G Modem, Auto 5G Modem-RF, C-V2X 9150, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, MDM9250, MDM9650, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU and QCA6574. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component IOCTL Call Handler. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2023-33107. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-47565 | QNAP VioStor NVR 4.x os command injection (qsa-23-48)
7 months 3 weeks ago
A vulnerability, which was classified as critical, was found in QNAP VioStor NVR 4.x. This affects an unknown part. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2023-47565. The attack can only be done within the local network. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-6548 | Citrix NetScaler ADC/NetScaler Gateway NSIP/CLIP/SNIP code injection (CTX584986)
7 months 3 weeks ago
A vulnerability classified as critical was found in Citrix NetScaler ADC and NetScaler Gateway. Affected by this vulnerability is an unknown functionality of the component NSIP/CLIP/SNIP. The manipulation leads to code injection.
This vulnerability is known as CVE-2023-6548. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-1389 | iovamihai Paid Membership Subscriptions Plugin up to 2.11.1 on WordPress pms_stripe_connect_handle_authorization_return
7 months 3 weeks ago
A vulnerability was found in iovamihai Paid Membership Subscriptions Plugin up to 2.11.1 on WordPress and classified as problematic. This issue affects the function pms_stripe_connect_handle_authorization_return. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2024-1389. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-1709 | ConnectWise ScreenConnect up to 23.9.7 authentication bypass
7 months 3 weeks ago
A vulnerability classified as very critical has been found in ConnectWise ScreenConnect up to 23.9.7. Affected is an unknown function. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is traded as CVE-2024-1709. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2024-2546 | Tenda AC18 15.13.07.09 fromSetWirelessRepeat wpapsk_crypto5g stack-based overflow
7 months 3 weeks ago
A vulnerability has been found in Tenda AC18 15.13.07.09 and classified as critical. Affected by this vulnerability is the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-2546. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-2547 | Tenda AC18 15.03.05.05 R7WebsSecurityHandler password stack-based overflow
7 months 3 weeks ago
A vulnerability was found in Tenda AC18 15.03.05.05 and classified as critical. Affected by this issue is the function R7WebsSecurityHandler. The manipulation of the argument password leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-2547. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-2558 | Tenda AC18 15.03.05.05 /goform/execCommand formexeCommand cmdinput stack-based overflow
7 months 3 weeks ago
A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-2558. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2023-46747 | F5 BIG-IP up to 13.1.5/14.1.5/15.1.10.1/16.1.4.0/17.1.0.2 Configuration Utility improper authentication (K000137353)
7 months 3 weeks ago
A vulnerability was found in F5 BIG-IP up to 13.1.5/14.1.5/15.1.10.1/16.1.4.0/17.1.0.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component Configuration Utility. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2023-46747. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com