python-django3-3.2.19-1.fc38
FEDORA-2023-0d20d09f2d Packages in this update: python-django3-3.2.19-1.fc38 Update description: Update to latest 3.2 release Security fix for CVE-2023-31047 Provide python3-django so it can be used by...
python-django3-3.2.19-1.fc37
FEDORA-2023-8f9d949dbc Packages in this update: python-django3-3.2.19-1.fc37 Update description: Update to latest 3.2 release Security fix for CVE-2023-31047 Provide python3-django so it can be used by...
USN-6063-1: Ceph vulnerabilities
Mark Kirkwood discovered that Ceph incorrectly handled certain key lengths. An attacker could possibly use this issue to create non-random encryption keys. This issue only...
Critical Patches Issued for Microsoft Products, May 9, 2023
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
python-django3-3.2.19-1.el8
FEDORA-EPEL-2023-f85a1a2b90 Packages in this update: python-django3-3.2.19-1.el8 Update description: Update to latest 3.2 release Security fix for CVE-2023-31047 Provide python3-django so it can be used by...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based installers delivered via E-mail as...
New Botnet Campaign Exploits Ruckus Wireless Flaw
Tracked CVE-2023-25717, the flaw was recently exploited by the AndoryuBot botnet, says Fortinet Read More
Cybersecurity stress returns after a brief calm: ProofPoint report
Global cybersecurity concerns are returning to pandemic levels as 68% of CISOs from 16 countries said they fear a cyberattack in the next 12 months,...
CVE-2020-23363
Cross Site Request Forgery (CSRF) vulnerability found in Verytops Verydows all versions that allows an attacker to execute arbitrary code via a crafted script. Read...
CVE-2020-23362
Insecure Permissons vulnerability found in Shop_CMS YerShop all versions allows a remote attacker to escalate privileges via the cover_id parameter. Read More