Aggregator
Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users
11 months 2 weeks ago
A stealthy new underground offering uses sophisticated adversary-in-the-middle (AitM) techniques to convincingly serve up "Microsoft" login pages of various kinds, with dynamic enterprise branding.
Tara Seals, Managing Editor, News, Dark Reading
Using Rename-Item Cmdlet to Rename Files in PowerShell
11 months 2 weeks ago
This post first appeared on blog.netwrix.com and was written by Kevin Horvatin.
What is the Rename-Item cmdlet? The Rename-Item cmdlet in PowerShell can be used to change the name of an item. This item can be a file, directory, or any object in a path. The cmdlet can also be used to rename items both locally and in a network environment. Users can also perform batch renaming … Continued
What is the Rename-Item cmdlet? The Rename-Item cmdlet in PowerShell can be used to change the name of an item. This item can be a file, directory, or any object in a path. The cmdlet can also be used to rename items both locally and in a network environment. Users can also perform batch renaming … Continued
Kevin Horvatin
CVE-2024-9377 | Products, Order & Customers Export for WooCommerce Plugin cross site scripting
11 months 2 weeks ago
A vulnerability was found in Products, Order & Customers Export for WooCommerce Plugin up to 2.0.15 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-9377. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-9205 | Maximum Products per User for WooCommerce Plugin up to 4.2.8 on WordPress cross site scripting
11 months 2 weeks ago
A vulnerability was found in Maximum Products per User for WooCommerce Plugin up to 4.2.8 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-9205. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-7041 | open-webui up to 0.3.8 API Endpoint update unnecessary privileges
11 months 2 weeks ago
A vulnerability has been found in open-webui up to 0.3.8 and classified as problematic. This vulnerability affects unknown code of the file /api/v1/memories/{id}/update of the component API Endpoint. The manipulation leads to execution with unnecessary privileges.
This vulnerability was named CVE-2024-7041. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-30118 | HCL Connections 7.0/8.0 information disclosure (KB0114302)
11 months 2 weeks ago
A vulnerability, which was classified as problematic, was found in HCL Connections 7.0/8.0. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-30118. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-39525 | Juniper Junos OS/Junos OS Evolved Routing Protocol Daemon exceptional condition (JSA88102)
11 months 2 weeks ago
A vulnerability, which was classified as critical, has been found in Juniper Junos OS and Junos OS Evolved. Affected by this issue is some unknown functionality of the component Routing Protocol Daemon. The manipulation leads to handling of exceptional conditions.
This vulnerability is handled as CVE-2024-39525. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-39516 | Juniper Junos OS/Junos OS Evolved Routing Protocol Daemon out-of-bounds (JSA88100)
11 months 2 weeks ago
A vulnerability classified as critical was found in Juniper Junos OS and Junos OS Evolved. Affected by this vulnerability is an unknown functionality of the component Routing Protocol Daemon. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-39516. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-39515 | Juniper Junos OS/Junos OS Evolved Routing Protocol Daemon improper validation of consistency within input (JSA88099)
11 months 2 weeks ago
A vulnerability classified as critical has been found in Juniper Junos OS and Junos OS Evolved. Affected is an unknown function of the component Routing Protocol Daemon. The manipulation leads to improper validation of consistency within input.
This vulnerability is traded as CVE-2024-39515. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-47828 | ampache up to 6.6.0 Request cross-site request forgery (GHSA-p9cq-2qph-55f2)
11 months 2 weeks ago
A vulnerability was found in ampache up to 6.6.0. It has been rated as problematic. This issue affects some unknown processing of the component Request Handler. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-47828. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-38818 | VMware NSX/Cloud Foundation Group Role privileges management
11 months 2 weeks ago
A vulnerability was found in VMware NSX and Cloud Foundation. It has been declared as critical. This vulnerability affects unknown code of the component Group Role Handler. The manipulation leads to improper privilege management.
This vulnerability was named CVE-2024-38818. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-3656 | Red Hat Keycloak REST API Privilege Escalation (GHSA-2cww-fgmg-4jqc)
11 months 2 weeks ago
A vulnerability was found in Red Hat Keycloak, JBoss Enterprise Application Platform and Single Sign-On. It has been classified as critical. This affects an unknown part of the component REST API. The manipulation leads to Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-3656. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-47832 | ssoready XML Parser signature verification (GHSA-j2hr-q93x-gxvh)
11 months 2 weeks ago
A vulnerability was found in ssoready and classified as very critical. Affected by this issue is some unknown functionality of the component XML Parser. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is handled as CVE-2024-47832. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-7038 | open-webui up to 0.3.8 Admin Setting information disclosure
11 months 2 weeks ago
A vulnerability has been found in open-webui up to 0.3.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Admin Setting Handler. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-7038. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2024-7037 | open-webui up to 0.3.8 /api/pipelines/upload path traversal
11 months 2 weeks ago
A vulnerability, which was classified as problematic, was found in open-webui up to 0.3.8. Affected is an unknown function of the file /api/pipelines/upload. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2024-7037. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-38817 | VMware NSX/Cloud Foundation NSX Edge CLI Terminal command injection
11 months 2 weeks ago
A vulnerability, which was classified as critical, has been found in VMware NSX and Cloud Foundation. This issue affects some unknown processing of the component NSX Edge CLI Terminal. The manipulation leads to command injection.
The identification of this vulnerability is CVE-2024-38817. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-38815 | VMware NSX/Cloud Foundation URL cross site scripting
11 months 2 weeks ago
A vulnerability classified as problematic was found in VMware NSX and Cloud Foundation. This vulnerability affects unknown code of the component URL Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-38815. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-47833 | Avaiga taipy up to 3.x cookie httponly flag (GHSA-r3jq-4r5c-j9hp)
11 months 2 weeks ago
A vulnerability classified as problematic has been found in Avaiga taipy up to 3.x. This affects an unknown part. The manipulation leads to cookie without 'httponly' flag.
This vulnerability is uniquely identified as CVE-2024-47833. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
GitLab 身份验证绕过(CVE-2024-45409)
11 months 2 weeks ago
GitLab 身份验证绕过(CVE-2024-45409)