Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

PoC Exploit Released for Critical VMware Aria's SSH Auth Bypass Vulnerability

Proof-of-concept (PoC) exploit code has been made available for a recently disclosed and patched critical flaw impacting VMware Aria Operations for Networks (formerly vRealize Network Insight). The flaw, tracked as CVE-2023-34039, is rated 9.8 out of a maximum of 10 for severity and has been described as a case of authentication bypass due to a lack of unique cryptographic key generation. “A

The Hacker News
#vulnerability#mac#windows#ubuntu#linux#ddos#dos#git#backdoor#rce#vmware#auth#ssh#The Hacker News
CVE-2023-4736: patch 9.0.1833: [security] runtime file fixes · vim/vim@816fbcc

Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833.

Microsoft Windows Kernel Use-After-Free

Microsoft Windows Kernel renaming layered keys does not reference count security descriptors, leading to a use-after-free condition.

PlayTube 3.0.1 Information Disclosure

PlayTube version 3.0.1 suffers from an information leakage vulnerability.

Clcknshop 1.0.0 SQL Injection

Clcknshop version 1.0.0 suffers from a remote SQL injection vulnerability.

Clcknshop 1.0.0 Cross Site Scripting

Clcknshop version 1.0.0 suffers from a cross site scripting vulnerability.

CVE-2023-39582: Security issues - Chamilo LMS

SQL Injection vulnerability in Chamilo LMS v.1.11 thru v.1.11.20 allows a remote privileged attacker to obtain sensitive information via the import sessions functions.

CVE-2023-40980: Arbitrary file uploads exist · Issue #107 · wkeyuan/DWSurvey

File Upload vulnerability in DWSurvey DWSurvey-OSS v.3.2.0 and before allows a remote attacker to execute arbitrary code via the saveimage method and savveFile in the action/UploadAction.java file.

CVE-2023-36187: Security Advisory for Pre-Authentication Buffer Overflow on Some Routers, PSV-2020-0578

Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd.

CVE-2023-23763: Release notes - GitHub Enterprise Server 3.6 Docs

An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program.