Lucene search

K

Medtronic Mycarelink 24950, 24952 Patient Monitor Security Vulnerabilities

nessus
nessus

Safari < 16.3 Multiple Vulnerabilities

The version of Safari installed on the remote host is prior to 16.3. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213638 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version.....

7.4AI Score

2024-02-05 12:00 AM
1
nessus
nessus

Safari < 13.1.1 Multiple Vulnerabilities

The version of Safari installed on the remote host is prior to 13.1.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211177 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported...

7.4AI Score

2024-02-05 12:00 AM
2
hackerone
hackerone

Reddit: Infromation Disclosure To Use of Hard-coded Cryptographic Key

Summary: [ Leaking very sensitive information through a JS file that is clearly for developers within the website and should not be available to the public. The leaked information consists of a lot of API keys, Paypal keys, information and keys about the server and the application, and a lot...

7.1AI Score

2024-02-02 10:55 PM
50
nvd
nvd

CVE-2024-1185

A vulnerability classified as problematic has been found in Nsasoft NBMonitor Network Bandwidth Monitor 1.6.5.0. This affects an unknown part of the component Registration Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been...

5.5CVSS

4.5AI Score

0.0004EPSS

2024-02-02 04:15 PM
cve
cve

CVE-2024-1185

A vulnerability classified as problematic has been found in Nsasoft NBMonitor Network Bandwidth Monitor 1.6.5.0. This affects an unknown part of the component Registration Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been...

5.5CVSS

5.5AI Score

0.0004EPSS

2024-02-02 04:15 PM
9
prion
prion

Design/Logic Flaw

A vulnerability classified as problematic has been found in Nsasoft NBMonitor Network Bandwidth Monitor 1.6.5.0. This affects an unknown part of the component Registration Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been...

5.5CVSS

7AI Score

0.0004EPSS

2024-02-02 04:15 PM
5
wallarmlab
wallarmlab

Wallarm’s Crusade Against Rising Credential Stuffing Threats

Credential Stuffing, a vital yet often overlooked aspect of cybersecurity, needs to be addressed with urgency. An alarmingly large segment of the population engages in the risky habit of using the same password for various accounts. This behavior parallels the risk of using a universal key for...

7.2AI Score

2024-02-02 03:42 PM
6
vulnrichment
vulnrichment

CVE-2024-1185 Nsasoft NBMonitor Network Bandwidth Monitor Registration denial of service

A vulnerability classified as problematic has been found in Nsasoft NBMonitor Network Bandwidth Monitor 1.6.5.0. This affects an unknown part of the component Registration Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been...

3.3CVSS

5.5AI Score

0.0004EPSS

2024-02-02 03:31 PM
cvelist
cvelist

CVE-2024-1185 Nsasoft NBMonitor Network Bandwidth Monitor Registration denial of service

A vulnerability classified as problematic has been found in Nsasoft NBMonitor Network Bandwidth Monitor 1.6.5.0. This affects an unknown part of the component Registration Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been...

3.3CVSS

5.8AI Score

0.0004EPSS

2024-02-02 03:31 PM
2
thn
thn

DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the country have been infected by a strain of malware called DirtyMoe. The agency attributed the campaign to a threat actor it calls UAC-0027. DirtyMoe, active since at least 2016, is capable of.....

7.5AI Score

2024-02-02 01:17 PM
16
hivepro
hivepro

CISA Known Exploited Vulnerability Catalog January 2024

For a detailed CISA's KEV Catalog, download the pdf file here Summary The Known Exploited Vulnerability (KEV) catalog, maintained by CISA, is the authoritative source of vulnerabilities that have been exploited in the wild. It is recommended that all organizations review and monitor the KEV...

7.5AI Score

2024-02-02 10:35 AM
5
cve
cve

CVE-2023-49115

MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by...

7.5CVSS

7.6AI Score

0.001EPSS

2024-02-01 11:15 PM
9
nvd
nvd

CVE-2023-49115

MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by...

7.5CVSS

7.8AI Score

0.001EPSS

2024-02-01 11:15 PM
5
prion
prion

Design/Logic Flaw

MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by...

7.5CVSS

7.4AI Score

0.001EPSS

2024-02-01 11:15 PM
6
vulnrichment
vulnrichment

CVE-2023-49115 MachineSense FeverWarn Missing Authentication for Critical Function

MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by...

7.5CVSS

7.2AI Score

0.001EPSS

2024-02-01 10:28 PM
1
cvelist
cvelist

CVE-2023-49115 MachineSense FeverWarn Missing Authentication for Critical Function

MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by...

7.5CVSS

7.8AI Score

0.001EPSS

2024-02-01 10:28 PM
malwarebytes
malwarebytes

&#8220;You have blood on your hands.&#8221; Senate Committee calls for action by social media giants to protect children online

In an unusually emotional and unified setting, the Senate Judiciary Committee found common ground for the need to protect children online yesterday. On January 31, 2024, the CEOs of the most widely used social media platforms appeared before the Committee. Meta’s Mark Zuckerberg, X's Linda...

7.5AI Score

2024-02-01 10:21 PM
10
talosblog
talosblog

The many ways electric cars are vulnerable to hacks, and whether that matters in a real-world

I'd hate to be labeled a "car guy" now mentioning my new electric car in the lede of two newsletters in a row, but I couldn't resist. I'd been reading headlines for years about how electric cars (most notably Tesla) were vulnerable to a range of security vulnerabilities, even some that could allow....

7.4AI Score

2024-02-01 07:00 PM
5
wallarmlab
wallarmlab

How to Implement a Secure Incident Response Plan

Understanding the Basics of Secure Incident Response Plan A proactive strategy for coping with digital dangers calls for a well-planned process that can neutralize and diminish the harmful aftermath of unauthorized intrusion attempts and neglect of security principles. The primary aim of this...

8.3AI Score

2024-02-01 02:54 PM
6
impervablog
impervablog

Optimizing Data Lakes: Streamlining Storage with Effective Object Management

Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible and cost effective, as they allow multiple query engines and many object formats without the need to manage resources like disks, CPUs, and memory. In a data lake, data is simply stored in an object...

6.8AI Score

2024-02-01 02:26 PM
6
thn
thn

Why the Right Metrics Matter When it Comes to Vulnerability Management

How's your vulnerability management program doing? Is it effective? A success? Let's be honest, without the right metrics or analytics, how can you tell how well you're doing, progressing, or if you're getting ROI? If you're not measuring, how do you know it's working? And even if you are...

7.4AI Score

2024-02-01 11:40 AM
22
github
github

Grafana path traversal

Today we are releasing Grafana 8.3.1, 8.2.7, 8.1.8, 8.0.7. This patch release includes a high severity security fix that affects Grafana versions from v8.0.0-beta1 through v8.3.0. Release v8.3.1, only containing a security fix: Download Grafana 8.3.1 Release notes Release v8.2.7, only containing...

7.5CVSS

6.5AI Score

0.975EPSS

2024-02-01 12:16 AM
13
osv
osv

Grafana path traversal

Today we are releasing Grafana 8.3.1, 8.2.7, 8.1.8, 8.0.7. This patch release includes a high severity security fix that affects Grafana versions from v8.0.0-beta1 through v8.3.0. Release v8.3.1, only containing a security fix: Download Grafana 8.3.1 Release notes Release v8.2.7, only containing...

7.5CVSS

6.1AI Score

0.975EPSS

2024-02-01 12:16 AM
8
qualysblog
qualysblog

Identify and De-risk Unmanaged, Unauthorized Devices With Qualys CyberSecurity Asset Management (CSAM)

69% of organizations said they experienced at least one cyberattack resulting from an exploit of an unknown or unmanaged asset such as software, cloud-based workloads user accounts, and IoT devices. Ultimately, these attacks stem from visibility gaps in the attack surface. Bringing these assets...

7.3AI Score

2024-02-01 12:00 AM
14
wallarmlab
wallarmlab

How to Prepare for a Cyberattack

Deciphering the Cyber Invasion Terrain We exist in an era deeply entrenched in digital dependence, where cyber invasions present significant risks for companies, government establishments, and solitary users. As we hurdle deeper into the digital era, the art of cyber misdemeanors continues to...

6.9AI Score

2024-01-31 07:35 PM
7
malwarebytes
malwarebytes

ChatGPT accused of breaking data protection rules

Italy's Data Protection Authority (GPDP) has uncovered data privacy violations related to collecting personal data and age protections after an inquiry into OpenAI’s ChatGPT. OpenAI has 30 days to respond with a defense. ChatGPT is an artificial intelligence (AI) chatbot that can engage in...

6.8AI Score

2024-01-31 05:24 PM
6
ibm
ibm

Security Bulletin: Vulnerabilities in Node.js affects IBM Voice Gateway

Summary Security Vulnerabilities in Node.js affects IBM Voice Gateway. The vulnerability has been addressed. Vulnerability Details ** CVEID: CVE-2023-30581 DESCRIPTION: **Node.js could allow a remote attacker to bypass security restrictions, caused by the use of proto in...

7.5CVSS

6.8AI Score

EPSS

2024-01-31 02:00 PM
6
thn
thn

The SEC Won't Let CISOs Be: Understanding New SaaS Cybersecurity Rules

The SEC isn't giving SaaS a free pass. Applicable public companies, known as "registrants," are now subject to cyber incident disclosure and cybersecurity readiness requirements for data stored in SaaS systems, along with the 3rd and 4th party apps connected to them. The new cybersecurity...

6.4AI Score

2024-01-31 11:02 AM
18
kitploit
kitploit

PurpleKeep - Providing Azure Pipelines To Create An Infrastructure And Run Atomic Tests

With the rapidly increasing variety of attack techniques and a simultaneous rise in the number of detection rules offered by EDRs (Endpoint Detection and Response) and custom-created ones, the need for constant functional testing of detection rules has become evident. However, manually re-running.....

7.2AI Score

2024-01-30 11:30 AM
12
thn
thn

Top Security Posture Vulnerabilities Revealed

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It's the nature of the field – the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in...

7.4AI Score

2024-01-30 10:49 AM
34
zdt
zdt

Vinchin Backup And Recovery 7.2 syncNtpTime Command Injection Vulnerability

Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in the syncNtpTime...

8.8CVSS

7.7AI Score

0.002EPSS

2024-01-29 12:00 AM
140
zdt
zdt

Vinchin Backup And Recovery 7.2 setNetworkCardInfo Command Injection Vulnerability

Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in the setNetworkCardInfo...

8.8CVSS

9AI Score

0.002EPSS

2024-01-29 12:00 AM
68
wired
wired

23andMe Failed to Detect Account Intrusions for Months

Plus: North Korean hackers get into generative AI, a phone surveillance tool that can monitor billions of devices gets exposed, and ambient light sensors pose a new privacy...

7.4AI Score

2024-01-27 02:00 PM
7
rapid7blog
rapid7blog

Metasploit Weekly Wrap-Up 01/26/24

Direct Syscalls Support for Windows Meterpreter Direct system calls are a well-known technique that is often used to bypass EDR/AV detection. This technique is particularly useful when dynamic analysis is performed, where the security software monitors every process on the system to detect any...

10CVSS

10AI Score

0.972EPSS

2024-01-26 09:12 PM
28
packetstorm

7.4AI Score

0.002EPSS

2024-01-26 12:00 AM
117
packetstorm

9.8CVSS

7.4AI Score

0.01EPSS

2024-01-26 12:00 AM
146
packetstorm

7.4AI Score

0.002EPSS

2024-01-26 12:00 AM
119
packetstorm

7.4AI Score

0.002EPSS

2024-01-26 12:00 AM
118
krebs
krebs

Using Google Search to Find Software Can Be Risky

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of...

7.1AI Score

2024-01-25 06:38 PM
6
ics
ics

MachineSense FeverWarn

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: MachineSense LLC. Equipment: MachineSense FeverWarn Vulnerabilities: Missing Authentication for Critical Function, Use of Hard-coded Credentials, Improper Access Control, OS Command...

10CVSS

9AI Score

0.001EPSS

2024-01-25 12:00 PM
22
kitploit
kitploit

Airgorah - A WiFi Auditing Software That Can Perform Deauth Attacks And Passwords Cracking

Airgorah is a WiFi auditing software that can discover the clients connected to an access point, perform deauthentication attacks against specific clients or all the clients connected to it, capture WPA handshakes, and crack the password of the access point. It is written in Rust and uses GTK4 for....

7.4AI Score

2024-01-24 11:30 AM
28
thn
thn

What is Nudge Security and How Does it Work?

In today's highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has been a critical boon to productivity and innovation in the digital enterprise, it has upended traditional...

7AI Score

2024-01-24 11:24 AM
28
pentestpartners
pentestpartners

10 years on from the Target breach. Has building cyber security improved?

It’s over a decade since the Target data breach. It was an event that reinforced the need for supply chain security reviews. It seems that much has changed since then, or has it? Has the security profile of the average connected building in the USA improved in that time period, be it retail,...

7.2AI Score

2024-01-24 06:47 AM
5
nessus
nessus

RHCOS 4 : OpenShift Container Platform 4.11.53 (RHSA-2023:6274)

The remote Red Hat Enterprise Linux CoreOS 4 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2023:6274 advisory. A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker...

5.3CVSS

6.5AI Score

0.001EPSS

2024-01-24 12:00 AM
7
nessus
nessus

RHCOS 4 : OpenShift Container Platform 4.14.0 (RHSA-2023:5009)

The remote Red Hat Enterprise Linux CoreOS 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:5009 advisory. In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection...

9.8CVSS

8.3AI Score

0.732EPSS

2024-01-24 12:00 AM
15
wallarmlab
wallarmlab

TCP Resets from Client and Server aka TCP-RST-FROM-Client

Diving into the Enigma of TCP Resets Executed by Client and Server The Base Communication Protocol (BCP), understoond as the Transmission Control Protocol (TCP) equivalent, plays a key role in the protocol unit of the internet. Its primary task entails laying a groundwork for communication between....

7.7AI Score

2024-01-23 12:21 PM
8
nessus
nessus

Amazon Linux 2 : dbus (ALAS-2024-2428)

The version of dbus installed on the remote host is prior to 1.10.24-7. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2024-2428 advisory. D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the...

6.5CVSS

7AI Score

0.001EPSS

2024-01-23 12:00 AM
5
nessus
nessus

Safari < 17.3 Multiple Vulnerabilities

The version of Safari installed on the remote host is prior to 17.3. It is, therefore, affected by multiple vulnerabilities as referenced in the HT214056 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version.....

7.4AI Score

2024-01-23 12:00 AM
2
githubexploit
githubexploit

Exploit for Out-of-bounds Write in Gnu Glibc

GNU C Library's Dynamic Loader Vulnerability (CVE-2023-4911)...

7.8CVSS

8.7AI Score

0.014EPSS

2024-01-20 06:47 PM
119
Total number of security vulnerabilities23936