Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2023-39453: TALOS-2023-1830 || Cisco Talos Intelligence Group

A use-after-free vulnerability exists in the tif_parse_sub_IFD functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can deliver file to trigger this vulnerability.

CVE
#vulnerability#web#mac#windows#microsoft#linux#cisco#intel#pdf
CVE-2023-23567: TALOS-2023-1729 || Cisco Talos Intelligence Group

A heap-based buffer overflow vulnerability exists in the CreateDIBfromPict functionality of Accusoft ImageGear 20.1. A specially crafted file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2023-32653: TALOS-2023-1802 || Cisco Talos Intelligence Group

An out-of-bounds write vulnerability exists in the dcm_pixel_data_decode functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.

Deadglyph: A New Backdoor Linked to Stealth Falcon APT in the Middle East

By Waqas Stealth Falcon APT group is notorious for its cyber-espionage campaigns in the Middle East. This is a post from HackRead.com Read the original post: Deadglyph: A New Backdoor Linked to Stealth Falcon APT in the Middle East

CVE-2023-43131: OffSec’s Exploit Database Archive

General Device Manager 2.5.2.2 is vulnerable to Buffer Overflow.

LogoBee CMS 0.2 Cross Site Scripting

LogoBee CMS version 0.2 suffers from a cross site scripting vulnerability.

Lamano LMS 0.1 Insecure Settings

Lamano LMS version 0.1 suffers from an ignored default credential vulnerability.

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. "Since drones or Unmanned Aerial Vehicles (UAVs) have been an integral tool used by the Ukrainian military, malware-laced lure files themed as UAVs service manuals have begun to surface," Securonix researchers Den