Intel® Graphics Drivers Advisory
Summary: Potential security vulnerabilities in some Intel® Graphics drivers may allow escalation of privilege, denial of service and information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. Vulnerability Details: CVEID: CVE-2023-29165 Description:...
7.5AI Score
0.0004EPSS
Weston Embedded uC-HTTP HTTP Server memory corruption vulnerability
Talos Vulnerability Report TALOS-2023-1732 Weston Embedded uC-HTTP HTTP Server memory corruption vulnerability November 14, 2023 CVE Number CVE-2023-28391 SUMMARY A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially....
9.8CVSS
7.8AI Score
0.001EPSS
Summary: A potential security vulnerability in some Intel® Field Programmable Gate Array (FPGA) products may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. Vulnerability Details: CVEID: CVE-2023-22327 Description: Out-of-bounds write...
6.4AI Score
0.0004EPSS
Weston Embedded uC-HTTP HTTP Server form boundary heap-based buffer overflow vulnerability
Talos Vulnerability Report TALOS-2023-1733 Weston Embedded uC-HTTP HTTP Server form boundary heap-based buffer overflow vulnerability November 14, 2023 CVE Number CVE-2023-27882 SUMMARY A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston...
9.8CVSS
8AI Score
0.001EPSS
10CVSS
7.2AI Score
0.848EPSS
rf-freunde.de Improper Access Control vulnerability OBB-3780129
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.9AI Score
kernel security, bug fix, and enhancement update
[5.14.0-362.8.1_3.OL9] Update Oracle Linux certificates (Kevin Lyons) Disable signing for aarch64 (Ilya Okomin) Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237] Update x509.genkey [Orabug: 24817676] Conflict with shim-ia32...
8.2CVSS
7.8AI Score
EPSS
Apache MQ and Three Cisco Modules in a Trenchcoat This week’s release has a lot of new content and features modules targeting two major recent vulnerabilities that got a great deal of attention: CVE-2023-46604 targeting Apache MQ resulting in ransomware deployment and CVE-2023-20198 targeting...
10CVSS
9.3AI Score
0.931EPSS
Cisco IOX XE unauthenticated OS Command Execution Exploit
msf > use auxiliary/admin/http/cisco_ios_xe_os_exec_cve_2023_20273 msf auxiliary(cisco_ios_xe_os_exec_cve_2023_20273) > show actions ...actions... msf auxiliary(cisco_ios_xe_os_exec_cve_2023_20273) > set ACTION < action-name > msf auxiliary(cisco_ios_xe_os_exec_cve_2023_20273) > s...
10CVSS
8.6AI Score
0.848EPSS
Huawei EulerOS: Security Advisory for json-c (EulerOS-SA-2023-3216)
The remote host is missing an update for the Huawei...
9.8CVSS
9.6AI Score
0.001EPSS
10CVSS
7.4AI Score
0.848EPSS
10CVSS
7.4AI Score
0.848EPSS
Huawei EulerOS: Security Advisory for json-c (EulerOS-SA-2023-3181)
The remote host is missing an update for the Huawei...
9.8CVSS
9.6AI Score
0.001EPSS
De-risking in Practice: How Qualys Customers are Driving Value in Their Organizations
As the threat landscape continues to grow in complexity, it has become more important than ever for the modern enterprise to measure, communicate, and eliminate cyber risk with efficiency. What does that mean in practice? Over the last two days, during the 2023 Qualys Security Conference (QSC)...
7.6AI Score
Grasping the Fundamentals of API Breaches API, short for Application Programming Interface, consists of a stipulated set of guidelines and procedures enabling heterogeneous software applications to establish communication amongst them. Conceptualize it as an interconnecting channel that unites...
8AI Score
Leveraging AI-informed Cybersecurity to Measure, Communicate, and Eliminate Cyber Risk
Dilip Bachwani, Qualys CTO, shares the Qualys AI strategy with TruRisk AI at QSC 2023. The threat landscape is constantly evolving, and so are the implications of cyber risk across any organization. As attacker tactics become more sophisticated and persistent, cybersecurity strategies must grow...
7.2AI Score
Navigating Threats – Insights from the Wallarm API ThreatStats™ Report Q3’2023
The world of digital technology is perpetually evolving, positioning cybersecurity as a frontline defense in safeguarding essential digital assets. A primary challenge in this sector, accentuated by the Wallarm API ThreatStats™ report Q3’2023, is ensuring robust API security. This in-depth report.....
6.6AI Score
7.5CVSS
7.5AI Score
0.0005EPSS
7.5CVSS
7.5AI Score
0.0004EPSS
7.5CVSS
7.5AI Score
0.0004EPSS
7.8CVSS
7.6AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
Memory corruption in Automotive Audio while copying data from ADSP shared buffer to the VOC packet data...
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
6.1CVSS
5.6AI Score
0.0004EPSS
Memory corruption in core services when Diag handler receives a command to configure event...
9CVSS
7.8AI Score
0.0004EPSS
Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3...
9.8CVSS
9.5AI Score
0.001EPSS
7.5CVSS
7.5AI Score
0.0004EPSS
8.8CVSS
8.8AI Score
0.001EPSS
6.1CVSS
5.5AI Score
0.0004EPSS
6.1CVSS
5.5AI Score
0.0004EPSS
6.1CVSS
5.5AI Score
0.0004EPSS
Information Disclosure in Qualcomm IPC while reading values from shared memory in...
6.1CVSS
5.3AI Score
0.0004EPSS
7.8CVSS
7.6AI Score
0.0004EPSS
Memory Corruption in Core due to secure memory access by user while loading modem...
8.4CVSS
7.5AI Score
0.0004EPSS
6.1CVSS
5.3AI Score
0.0004EPSS
8.2CVSS
7.7AI Score
0.0004EPSS
9.8CVSS
9.3AI Score
0.001EPSS
Cisco IOX XE Unauthenticated RCE Chain
This module leverages both CVE-2023-20198 and CVE-2023-20273 against vulnerable instances of Cisco IOS XE devices which have the Web UI exposed. An attacker can execute a payload with root privileges. The vulnerable IOS XE versions are: 16.1.1, 16.1.2, 16.1.3, 16.2.1, 16.2.2, 16.3.1, 16.3.2,...
10CVSS
8.7AI Score
0.848EPSS
Rapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518
Daniel Lydon and Conor Quinn contributed attacker behavior insights to this blog. As of November 5, 2023, Rapid7 Managed Detection and Response (MDR) is observing exploitation of Atlassian Confluence in multiple customer environments, including for ransomware deployment. We have confirmed that at.....
9.8CVSS
9.9AI Score
0.973EPSS
Summary IBM® Runtime Environment Java™ Version 8.0.7.0 through 8.0.7.11 used by IBM® Db2® is vulnerable to information disclosure. The fix for this issue was already published in an earlier bulletin. If you have already applied the appropriate Db2 special build or Java version 8.0.8.6 or higher...
7.5CVSS
9.1AI Score
0.002EPSS
Summary IBM® Db2® is vulnerable to an information disclosure vulnerability due to the consumed GSKit library. The fix for this issue was already published in an earlier bulletin. If you have already applied the appropriate Db2 special build or installed GSKit version 8.0.55.31, which contains the.....
7.5CVSS
6AI Score
0.001EPSS
PTT for DCSync This week, community member smashery made an improvement to the windows_secrets_dump module to enable it to dump domain hashes using the DCSync method after having authenticated with a Kerberos ticket. Now, if a user has a valid Kerberos ticket for a privileged account, they can...
7.5CVSS
8AI Score
0.971EPSS
Cisco IOX XE unauthenticated Command Line Interface (CLI) execution
This module leverages CVE-2023-20198 against vulnerable instances of Cisco IOS XE devices which have the Web UI exposed. An attacker can execute arbitrary CLI commands with privilege level 15. You must specify the IOS command mode to execute a CLI command in. Valid modes are user, privileged, and.....
10CVSS
7.9AI Score
0.848EPSS
Cisco IOX XE unauthenticated OS command execution
This module leverages both CVE-2023-20198 and CVE-2023-20273 against vulnerable instances of Cisco IOS XE devices which have the Web UI exposed. An attacker can execute arbitrary OS commands with root privileges. This module leverages CVE-2023-20198 to create a new admin user, then authenticating.....
10CVSS
9.2AI Score
0.848EPSS
Unveiling Dark Web Surveillance: Bolstering Internet Safety Journey with us into the unchartered territories of the internet, where a masked sector called the Dark Net thrives. This secret hub is notorious for harboring unlawful actions ranging from infringed identity to stolen data, bringing...
6.9AI Score
Security Bulletin: Vulnerabilities in IBM Java included with IBM Tivoli Monitoring.
Summary Vulnerabilities in IBM® Java™ Technology Edition that is shipped as part of multiple IBM Tivoli Monitoring (ITM) components. CVEs: CVE-2023-22045 and CVE-2023-22049, Vulnerability Details ** CVEID: CVE-2023-22045 DESCRIPTION: **An unspecified vulnerability in Java SE related to the VM...
3.7CVSS
4.5AI Score
0.001EPSS
What is a Polymorphic Virus detection and best practices ?
In the ever-evolving sphere of digital tech, the persistent threat of cyber intrusions remains a formidable concern. A notable example is the polymorphic virus, an insidiously clever adversary in the landscape of cyber threats. Let's probe the intrinsic nature, attributes, and behaviors of this...
7.5AI Score
Exploit for Code Injection in Gitlab
gitlab-cve-2021-22205 A simple bash script that exploits...
10CVSS
7.3AI Score
0.975EPSS
Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade Detection
The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as Kazuar. The new findings come from Palo Alto Networks Unit 42, which is tracking the adversary under its constellation-themed moniker Pensive Ursa. "As the code.....
7.8AI Score