Lucene search

K

Medtronic Mycarelink 24950, 24952 Patient Monitor Security Vulnerabilities

securelist
securelist

The State of Stalkerware in 2023–2024

The State of Stalkerware in 2023 (PDF) The annual Kaspersky State of Stalkerware report aims to contribute to awareness and a better understanding of how people around the world are impacted by digital stalking. Stalkerware is commercially available software that can be discreetly installed on...

6.8AI Score

2024-03-13 08:00 AM
11
thn
thn

Microsoft's March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws

Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws spanning its software, including two critical issues impacting Windows Hyper-V that could lead to denial-of-service (DoS) and remote code execution. Of the 61 vulnerabilities, two are rated Critical,.....

9.8CVSS

8.2AI Score

0.005EPSS

2024-03-13 05:38 AM
76
zdi
zdi

Microsoft Office Performance Monitor Link Following Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Office. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Office...

7.8CVSS

7.4AI Score

0.0005EPSS

2024-03-13 12:00 AM
15
krebs
krebs

Patch Tuesday, March 2024 Edition

Apple and Microsoft recently released software updates to fix dozens of security holes in their operating systems. Microsoft today patched at least 60 vulnerabilities in its Windows OS. Meanwhile, Apple's new macOS Sonoma addresses at least 68 security weaknesses, and its latest update for iOS...

9.8CVSS

9.1AI Score

0.002EPSS

2024-03-12 08:36 PM
23
wizblog
wizblog

Monitor sensitive data [3**-** ***7] that resides in code

Monitor code for sensitive data to reduce the risk of accidental exposure or compliance...

7.3AI Score

2024-03-12 04:02 PM
3
thn
thn

CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management

In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you'd want to do. But if you are looking for ways to continuously reduce risk across your environment while making significant and consistent improvements to security...

7AI Score

2024-03-12 11:07 AM
13
mskb
mskb

March 12, 2024—KB5035845 (OS Builds 19044.4170 and 19045.4170)

March 12, 2024—KB5035845 (OS Builds 19044.4170 and 19045.4170) NEW 03/12/24 IMPORTANT The following editions of Windows 10, version 21H2 will reach end of service on June 11, 2024:- Windows 10 Enterprise and Education- Windows 10 IoT Enterprise- Windows 10 Enterprise multi-sessionAfter that date,.....

8.8CVSS

7.7AI Score

0.001EPSS

2024-03-12 07:00 AM
56
veracode
veracode

Cross-Site Scripting

org.jenkins-ci.plugins, build-monitor-plugin is vulnerable to Cross-site Scripting (XSS). The vulnerability is due improper sanitization of Build Monitor View names, which allows attackers with the ability to configure Build Monitor Views to inject malicious scripts into the view...

6.6AI Score

0.0004EPSS

2024-03-12 05:46 AM
9
cve
cve

CVE-2024-28120

codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus...

6.5CVSS

6.5AI Score

0.0004EPSS

2024-03-11 10:15 PM
34
nvd
nvd

CVE-2024-28120

codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus...

6.5CVSS

6.5AI Score

0.0004EPSS

2024-03-11 10:15 PM
2
prion
prion

Code injection

codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus...

6.5CVSS

6.5AI Score

0.0004EPSS

2024-03-11 10:15 PM
17
cvelist
cvelist

CVE-2024-28120 API key leak in codeium-chrome

codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus...

6.5CVSS

6.8AI Score

0.0004EPSS

2024-03-11 09:14 PM
impervablog
impervablog

Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

On February 26, 2024, NIST released version 2.0 of the Cybersecurity Framework. This blog reviews the fundamental changes introduced in CSF 2.0 and data-centric security considerations that should be made when aligning with the new framework. As cybercriminals become more sophisticated,...

7.2AI Score

2024-03-11 01:28 PM
7
thn
thn

Guide: On-Prem is Dead. Have You Adjusted Your Web DLP Plan?

As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data security are becoming obsolete. Rather than protecting the endpoint, DLP solutions need to refocus their efforts to where corporate data...

7.1AI Score

2024-03-11 11:33 AM
19
githubexploit
githubexploit

Exploit for CVE-2024-29059

Leaking and Exploiting ObjRefs via HTTP .NET Remoting...

6.5AI Score

2024-03-11 10:14 AM
218
spring
spring

Bootiful Spring Boot in 2024 (part 1)

NB: the code is here on my Github account: github.com/joshlong/bootiful-spring-boot-2024-blog. Hi, Spring fans! I'm Josh Long, and I work on the Spring team. I'm excited to be keynoting and giving a talk at Microsoft's JDConf this year. I'm a Kotlin GDE and a Java Champion, and I'm of the opinion.....

6.9AI Score

2024-03-11 12:00 AM
13
thn
thn

Secrets Sensei: Conquering Secrets Management Challenges

In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We're all familiar with the routine: safeguarding those API keys, connection strings, and certificates is non-negotiable....

7.1AI Score

2024-03-08 09:49 AM
20
cve
cve

CVE-2024-2275

A vulnerability, which was classified as problematic, was found in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0. Affected is an unknown function of the component OBS Patient/Gynee Prescription. The manipulation of the argument Patient Title/Full Name/Address/Cheif...

2.4CVSS

3.7AI Score

0.0004EPSS

2024-03-08 01:15 AM
31
nvd
nvd

CVE-2024-2275

A vulnerability, which was classified as problematic, was found in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0. Affected is an unknown function of the component OBS Patient/Gynee Prescription. The manipulation of the argument Patient Title/Full Name/Address/Cheif...

2.4CVSS

3.3AI Score

0.0004EPSS

2024-03-08 01:15 AM
prion
prion

Cross site scripting

A vulnerability, which was classified as problematic, was found in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0. Affected is an unknown function of the component OBS Patient/Gynee Prescription. The manipulation of the argument Patient Title/Full Name/Address/Cheif...

2.4CVSS

6.5AI Score

0.0004EPSS

2024-03-08 01:15 AM
5
cvelist
cvelist

CVE-2024-2275 Bdtask G-Prescription Gynaecology & OBS Consultation Software OBS Patient/Gynee Prescription cross site scripting

A vulnerability, which was classified as problematic, was found in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0. Affected is an unknown function of the component OBS Patient/Gynee Prescription. The manipulation of the argument Patient Title/Full Name/Address/Cheif...

2.4CVSS

3.7AI Score

0.0004EPSS

2024-03-08 12:00 AM
wpvulndb
wpvulndb

Download Monitor < 4.9.5 - Authenticated (Admin+) SQL Injection

Description The Download Monitor plugin for WordPress is vulnerable to SQL Injection via the 'limit' parameter in all versions up to 4.9.5 (exclusive) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible...

7.5AI Score

2024-03-08 12:00 AM
6
rapid7blog
rapid7blog

Securing the Next Level: Automated Cloud Defense in Game Development with InsightCloudSec

Imagine the following scenario: You're about to enjoy a strategic duel on chess.com or dive into an intense battle in Fortnite, but as you log in, you find your hard-earned achievements, ranks, and reputation have vanished into thin air. This is not just a hypothetical scenario but a real...

7.2AI Score

2024-03-07 06:04 PM
13
qualysblog
qualysblog

Qualys Updates Login Page to Improve User Experience and Highlight Latest Qualys News

With an eye to updating the overall user experience (UI), continuing to fortify security, and keeping you informed of the latest Qualys news, we're optimizing our login at the end of May 2024. This 'UI overhaul' of sorts aims not only to refresh the aesthetic appeal but also to integrate robust...

7.5AI Score

2024-03-07 05:10 PM
8
malwarebytes
malwarebytes

Predator spyware vendor banned in US

The US Treasury Department has sanctioned Predator spyware vendor Intellexa Consortium, and banned the company from doing business in the US. Predator can turn infected smartphones into surveillance devices. Intellexa is based in Greece but the Treasury Department imposed the sanctions because of.....

7.4AI Score

2024-03-07 01:20 PM
15
nessus
nessus

Jenkins plugins Multiple Vulnerabilities (2024-03-06)

According to their self-reported version numbers, the version of Jenkins plugins running on the remote web server are affected by multiple vulnerabilities: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to...

5.9CVSS

8AI Score

0.963EPSS

2024-03-07 12:00 AM
18
osv
osv

Jenkins Build Monitor View Plugin vulnerable to stored Cross-site Scripting

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor...

5.5AI Score

0.0004EPSS

2024-03-06 06:30 PM
9
github
github

Jenkins Build Monitor View Plugin vulnerable to stored Cross-site Scripting

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor...

5.5AI Score

0.0004EPSS

2024-03-06 06:30 PM
6
cve
cve

CVE-2024-28156

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor...

5.3AI Score

0.0004EPSS

2024-03-06 05:15 PM
43
nvd
nvd

CVE-2024-28156

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor...

5.5AI Score

0.0004EPSS

2024-03-06 05:15 PM
2
prion
prion

Cross site scripting

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor...

5.4AI Score

0.0004EPSS

2024-03-06 05:15 PM
10
cvelist
cvelist

CVE-2024-28156

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor...

5.4AI Score

0.0004EPSS

2024-03-06 05:01 PM
thn
thn

A New Way To Manage Your Web Exposure: The Reflectiz Product Explained

An in-depth look into a proactive website security solution that continuously detects, prioritizes, and validates web threats, helping to mitigate security, privacy, and compliance risks. [Reflectiz shields websites from client-side attacks, supply chain risks, data breaches, privacy violations,...

6.9AI Score

2024-03-06 11:30 AM
24
kitploit
kitploit

SharpCovertTube - Youtube As Covert-Channel - Control Windows Systems Remotely And Execute Commands By Uploading Videos To Youtube

SharpCovertTube is a program created to control Windows systems remotely by uploading videos to Youtube. The program monitors a Youtube channel until a video is uploaded, decodes the QR code from the thumbnail of the uploaded video and executes a command. The QR codes in the videos can use...

7.8AI Score

2024-03-06 11:30 AM
19
osv
osv

BIT-jenkins-2021-21604

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an...

8CVSS

6.4AI Score

0.001EPSS

2024-03-06 11:03 AM
6
osv
osv

BIT-jupyter-notebook-2022-24758

The Jupyter notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.9, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by...

7.5CVSS

6.8AI Score

0.002EPSS

2024-03-06 10:54 AM
3
osv
osv

BIT-jupyter-base-notebook-2022-24758

The Jupyter notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.9, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by...

7.5CVSS

6.8AI Score

0.002EPSS

2024-03-06 10:54 AM
3
thn
thn

Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries

The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. "TheGhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks on various business verticals in multiple countries," Cisco Talos researcher...

6AI Score

2024-03-06 07:11 AM
33
pentestpartners
pentestpartners

Living off the land with native SSH and split tunnelling

TL;DR Attackers can use Microsoft native SSH client to forward out internal network traffic Windows native SSH is common The attack only needs minimal set-up and commands Quicker and more cost effective for an attacker than using C2 infrastructure Reduces likelihood of Blue team detection ...

7.6AI Score

2024-03-06 06:12 AM
14
talosblog
talosblog

Badgerboard: A PLC backplane network visibility module

Analysis of the traffic between networked devices has always been of interest since devices could even communicate with one another. As the complexity of networks grew, the more useful dedicated traffic analysis tools became. Major advancements have been made over the years with tools like Snort...

6.8AI Score

2024-03-05 08:30 PM
15
thn
thn

What is Exposure Management and How Does it Differ from ASM?

Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility and flexibility that cloud environments provide, the mid-market is predominantly running in a hybrid state, partly in the cloud but with some on-prem...

7.5AI Score

2024-03-05 10:55 AM
23
cnvd
cnvd

IBM Cognos Command Center Information Disclosure Vulnerability

IBM Cognos Command Center is a software product from International Business Machines (IBM) that helps organizations manage and monitor their IBM Cognos Business Intelligence solutions. An information disclosure vulnerability exists in IBM Cognos Command Center that stems from disclosing details of....

5.3CVSS

6.1AI Score

0.0004EPSS

2024-03-05 12:00 AM
7
hivepro
hivepro

CISA Known Exploited Vulnerability Catalog February 2024

For a detailed CISA's KEV Catalog, download the pdf file here Summary The Known Exploited Vulnerability (KEV) catalog, maintained by CISA, is the authoritative source of vulnerabilities that have been exploited in the wild. It is recommended that all organizations review and monitor the KEV...

7.5AI Score

2024-03-04 07:33 AM
6
zdt

4.3CVSS

7.4AI Score

0.001EPSS

2024-03-04 12:00 AM
106
openvas
openvas

openSUSE: Security Advisory for phpMyAdmin (openSUSE-SU-2023:0047-1)

The remote host is missing an update for...

7.5CVSS

5.7AI Score

0.008EPSS

2024-03-04 12:00 AM
4
openvas

8.8CVSS

7.3AI Score

0.024EPSS

2024-03-04 12:00 AM
5
openvas

9.8CVSS

6.8AI Score

0.001EPSS

2024-03-04 12:00 AM
4
openvas
openvas

openSUSE: Security Advisory for openvswitch3 (SUSE-SU-2023:3710-1)

The remote host is missing an update for...

8.8CVSS

6.4AI Score

0.002EPSS

2024-03-04 12:00 AM
4
exploitdb

4.3CVSS

4.8AI Score

0.001EPSS

2024-03-03 12:00 AM
80
githubexploit
githubexploit

Exploit for CVE-2024-25600

CVE-2024-25600 - WordPress Bricks Builder Remote Code...

10CVSS

8.4AI Score

0.001EPSS

2024-03-01 09:28 AM
107
Total number of security vulnerabilities23936