Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

Chyrp 2.5.2 Cross Site Scripting

Chryp version 2.5.2 suffers from a persistent cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#web#mac#git#intel#auth#firefox
Leafpub 1.1.9 Cross Site Scripting

Leafpub version 1.1.9 suffers from a persistent cross site scripting vulnerability.

Prison Management System Using PHP SQL Injection

Prison Management System Using PHP suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Talos joins CISA to counter cyber threats against non-profits, activists and other at-risk communities

Commercial spyware tools can threaten democratic values by enabling governments to conduct covert surveillance on citizens, undermining privacy rights and freedom of expression.

6 Mistakes Organizations Make When Deploying Advanced Authentication

Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication sophistication to adequately safeguard organizational data. When deploying

CVE-2024-30038: Win32k Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.

CVE-2024-30028: Win32k Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.

CVE-2024-30021: Windows Mobile Broadband Driver Remote Code Execution Vulnerability

**According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?** To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine

CVE-2024-30017: Windows Hyper-V Remote Code Execution Vulnerability

**According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?** The attacker must be authenticated to be able to exploit this vulnerability.

CVE-2024-30016: Windows Cryptographic Services Information Disclosure Vulnerability

**How could an attacker exploit this vulnerability?** For successful exploitation, a locally authenticated attacker needs to send a specially crafted request to the cryptography provider's vulnerable function.