Skip to the content
October 29, 2024
Cyber Security NewsCyber Security NewsCyber Security News
News, Advisories and much more
  • Home
  • Academy
  • Advisories
  • News
1

Evasive Panda’s CloudScout Toolset Targets Taiwan

October 28, 2024
2

New Type of Job Scam Targets Financially Vulnerable Populations

October 28, 2024
3

Criminals Are Blowing up ATMs in Germany

October 28, 2024
4

Russian Malware Campaign Targets Ukrainian Recruits Via Telegram

October 28, 2024
5

Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland

October 28, 2024
6

AI-Powered BEC Scams Zero in on Manufacturers

October 28, 2024
7

Friday Squid Blogging: Giant Squid Found on Spanish Beach

October 25, 2024
8

US offers $10 million bounty for members of Iranian hacking gang

October 25, 2024
9

Change Healthcare Breach Affects 100 Million Americans

October 25, 2024
Cyber Security News
Category:
Category: Advisories
  • Home
  • Pin Posts
  • Advisories
  • Page 213

Category: Advisories

ZDI-24-570: Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability
Advisories

ZDI-24-570: Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability...

June 6, 2024
Read More
ZDI-24-569: Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability
Advisories

ZDI-24-569: Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability...

June 6, 2024
Read More
ZDI-24-568: Trend Micro Apex One Damage Cleanup Engine Link Following Denial-of-Service Vulnerability
Advisories

ZDI-24-568: Trend Micro Apex One Damage Cleanup Engine Link Following Denial-of-Service Vulnerability

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain...

June 6, 2024
Read More
ZDI-24-579: Apple macOS PPM Image Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Advisories

ZDI-24-579: Apple macOS PPM Image Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the ImageIO framework is required to exploit this...

June 6, 2024
Read More
ZDI-24-578: Apple macOS CoreGraphics Image Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Advisories

ZDI-24-578: Apple macOS CoreGraphics Image Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that...

June 6, 2024
Read More
ZDI-24-582: SEW-EURODRIVE MOVITOOLS MotionStudio XML External Entity Processing Information Disclosure Vulnerability
Advisories

ZDI-24-582: SEW-EURODRIVE MOVITOOLS MotionStudio XML External Entity Processing Information Disclosure Vulnerability

This vulnerability allows remote atttackers to disclose sensitive information on affected installations of SEW-EURODRIVE MOVITOOLS MotionStudio. User interaction is required to exploit this vulnerability in...

June 6, 2024
Read More
ZDI-24-581: Microsoft Azure SQL Managed Instance Documentation SAS Token Incorrect Permission Assignment Authentication Bypass Vulnerability
Advisories

ZDI-24-581: Microsoft Azure SQL Managed Instance Documentation SAS Token Incorrect Permission Assignment Authentication Bypass Vulnerability

This vulnerability allows remote attackers to bypass authentication on Microsoft Azure. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS...

June 6, 2024
Read More
ZDI-24-580: Microsoft Artifact Registry Container Images Empty Password Authentication Bypass Vulnerability
Advisories

ZDI-24-580: Microsoft Artifact Registry Container Images Empty Password Authentication Bypass Vulnerability

This vulnerability allows remote attackers to bypass authentication on affected installations of Microsoft Artifact Registry Container images. Authentication is not required to exploit this vulnerability....

June 6, 2024
Read More
USN-6813-1: OpenJDK 21 vulnerabilities
Advisories

USN-6813-1: OpenJDK 21 vulnerabilities

It was discovered that the Hotspot component of OpenJDK 21 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this...

June 6, 2024
Read More
USN-6812-1: OpenJDK 17 vulnerabilities
Advisories

USN-6812-1: OpenJDK 17 vulnerabilities

It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this...

June 6, 2024
Read More

Posts navigation

Previous 1 … 212 213 214 … 1,604 Next
  • Home
  • Academy
  • Advisories
  • News
To the Top ↑ Up ↑