Aggregator
CVE-2008-0333 | AfterLogic MailBee WebMail Pro 4.1 download_view_attachment.aspx temp_filename path traversal (EDB-4921 / XFDB-39724)
CVE-2008-0337 | MiniWeb HTTP Server 0.8.19 http.c _mwprocessreadsocket memory corruption (EDB-4923 / XFDB-39718)
CVE-2008-0338 | MiniWeb HTTP Server 0.8.19 http.c mwgetlocalfilename path traversal (EDB-4923 / XFDB-39713)
CVE-2008-0371 | Alilg aliTalk 1.9.1.1 username sql injection (EDB-4922 / XFDB-39745)
CVE-2008-0391 | Alilg aliTalk 1.9.1.1 lilil improper authentication (EDB-4922 / BID-27315)
CVE-2008-0332 | aria 0.99-6 Help page path traversal (EDB-4920 / XFDB-39712)
CVE-2008-0359 | Blog Cms 4.2.1 C admin.php cross site scripting (EDB-4919 / XFDB-39710)
pac4j Java Framework Vulnerable to RCE Attacks
A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0 of the pac4j-core module. This vulnerability, identified as CVE-2023-25581, exposes systems to potential remote code execution (RCE) attacks due to a flaw in the deserialization process. Vulnerability Details – CVE-2023-25581 The issue stems from a […]
The post pac4j Java Framework Vulnerable to RCE Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
От свободы слова к диктатуре лайков: что не так с алгоритмами персонализации
Pokémon Developer Game Freak Suffers Data Breach
第39次全国计算机安全学术交流会召开,切面融合智能亮相“网络综合治理”分论坛
CVE-2016-1423 | Cisco Email Security Appliance up to 9.7.2 Messages in Quarantine cross site scripting (CSCuz02235 / ID 316060)
CVE-2014-7667 | enyetech Coca-Cola FM Honduras 2.0.41725 X.509 Certificate cryptographic issues (VU#582497)
5 Steps to Boost Detection and Response in a Multi-Layered Cloud
Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems
Perfectl Malware
Perfectl in an impressive piece of malware:
The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua Security said. It can also exploit CVE-2023-33246, a vulnerability with a severity rating of 10 out of 10 that was patched last year in Apache RocketMQ, a messaging and streaming platform that’s found on many Linux machines.
The researchers are calling the malware Perfctl, the name of a malicious component that surreptitiously mines cryptocurrency. The unknown developers of the malware gave the process a name that combines the perf Linux monitoring tool and ctl, an abbreviation commonly used with command line tools. A signature characteristic of Perfctl is its use of process and file names that are identical or similar to those commonly found in Linux environments. The naming convention is one of the many ways the malware attempts to escape notice of infected users...
The post Perfectl Malware appeared first on Security Boulevard.