Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2023-0570: online-tours-travels-management-system/user_operations_payment_operation_booking_id.md at main · linmoren/online-tours-travels-management-system

A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file user\operations\payment_operation.php. The manipulation of the argument booking_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219729 was assigned to this vulnerability.

CVE
#sql#vulnerability#web#windows#apple#php#chrome#webkit
A week in security (January 23—29)

Categories: News Tags: T-Mobile Tags: ransomware Tags: Microsoft Tags: TikTok Tags: privacy Tags: Data Privacy Day 2023 Tags: Data Privacy Week 2023 Tags: Malwarebytes 2023 State of Mobile Cybersecurity Tags: Riot Games Tags: VASTFLUX Tags: Grand Theft Auto 5 Tags: iPhone Tags: vRealize Tags: video game fish Tags: credit cart theft Tags: DuoLingo Tags: K-12 Tags: Vice Society Tags: Hive ransomware The most interesting security related news from the week of January 23-19. (Read more...) The post A week in security (January 23—29) appeared first on Malwarebytes Labs.

A Link to News Site Meduza Can (Technically) Land You in Russian Prison

Plus: Hive ransomware gang gets knocked offline, FBI confirms North Korea stole $100 million, and more.

Microsoft Urges Customers to Secure On-Premises Exchange Servers

Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment, such as enabling Windows Extended Protection and configuring certificate-based signing of PowerShell serialization payloads. "Attackers looking to exploit unpatched Exchange servers are not going to go away," the tech giant's Exchange Team said in a post. "There are too many

Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack

Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of a previously undocumented Golang-based data wiper dubbed SwiftSlicer. ESET attributed the attack to Sandworm, a nation-state group linked to Military Unit 74455 of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). "Once executed it deletes shadow

Critical RCE Lexmark Printer Bug Has Public Exploit

A nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.

PlugX Malware Sneaks Onto Windows PCs Through USB Devices

By Deeba Ahmed The new variant stood out among other malware because it can infect any attached removable USB device, e.g., floppy, flash, thumb drives, and any system the removable device is plugged into later. This is a post from HackRead.com Read the original post: PlugX Malware Sneaks Onto Windows PCs Through USB Devices

Threat Round up for January 20 to January 27

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 20 and Jan. 27. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key

Razer Synapse 3.7.0731.072516 Local Privilege Escalation

Razer Synapse version 3.7.0731.072516 suffers from a local privilege escalation due to a DLL hijacking vulnerability.

CVE-2022-47632: SySS GmbH - The Pentest Experts

Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.