Air Europa Asks Customers to Cancel Cards After Breach
Spanish airline did not disclose scale of the attack Read More
Tech Giants Reveal Record-Breaking “Rapid Reset” DDoS Bug
Zero-day has been exploited to launch largest attacks ever seen Read More
libXpm-3.5.17-1.fc38
FEDORA-2023-591b7f5047 Packages in this update: libXpm-3.5.17-1.fc38 Update description: Security fix for [PUT CVEs HERE] Read More
CVE-2022-44758
BigFix Insights/IVR fixlet uses improper credential handling within certain fixlet content. An attacker can gain access to information that is not explicitly authorized. Read More
CVE-2022-44757
BigFix Insights for Vulnerability Remediation (IVR) uses weak cryptography that can lead to credential exposure. An attacker could gain access to sensitive information, modify data...
CVE-2022-42451
Certain credentials within the BigFix Patch Management Download Plug-ins are stored insecurely and could be exposed to a local privileged user. Read More
ZDI-23-1540: (Pwn2Own) Microsoft Teams Cross-Site Scripting Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. User interaction is required to exploit this vulnerability in that...
ZDI-23-1541: (Pwn2Own) Microsoft Teams Incorrect Privilege Assignment Local Privilege Escalation Vulnerability
This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Teams. An attacker must first obtain the ability to execute script within...
ZDI-23-1542: Microsoft Windows UMPDDrvCopyBits Type Confusion Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code...
ZDI-23-1543: Microsoft Windows UMPDDrvBitBlt Type Confusion Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code...