Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Microsoft Brings Zero Trust to Hardware in Windows 11

A stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats.

DARKReading
#vulnerability#web#ios#mac#windows#google#microsoft#amazon#git#intel#perl#pdf#amd#bios#auth#zero_day
Blink1Control2 2.2.7 Weak Password Encryption

Blink1Control2 version 2.2.7 suffers from a weak password encryption vulnerability.

ProcessMaker Privilege Escalation

ProcessMaker versions prior to 3.5.4 were discovered to be susceptible to a remote privilege escalation vulnerability.

Buffalo TeraStation Network Attached Storage (NAS) 1.66 Authentication Bypass

Buffalo TeraStation Network Attached Storage (NAS) version 1.66 suffers from an authentication bypass vulnerability.

Trojan.Ransom.Ryuk.A MVID-2022-0640 Code Execution

Trojan.Ransom.Ryuk.A ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. Once loaded the exploit dll will check if the current directory is "C:\Windows\System32" and if not, we grab our process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.

Trojan-Dropper.Win32.Corty.10 MVID-2022-0639 Insecure Credential Storage

Trojan-Dropper.Win32.Corty.10 malware suffers from an insecure credential storage vulnerability.

Russian Sandworm Hackers Impersonate Ukrainian Telecoms to Distribute Malware

A threat cluster linked to the Russian nation-state actor tracked as Sandworm has continued its targeting of Ukraine with commodity malware by masquerading as telecom providers, new findings show. Recorded Future said it discovered new infrastructure belonging to UAC-0113 that mimics operators like Datagroup and EuroTransTelecom to deliver payloads such as Colibri loader and Warzone RAT. The

CVE-2022-38509: bug_report/SQLi-1.md at main · ptanly/bug_report

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the booking_id parameter at /admin/budget.php.

CVE-2022-29835: WDC-22014 - WD Discovery Desktop App Version 4.4.396 | Western Digital

WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. An attacker could use this weakness to create forged certificate signatures due to the use of a hashing algorithm that is not collision-free. This could thereby impact the confidentiality of user content. This issue affects: Western Digital WD Discovery WD Discovery Desktop App versions prior to 4.4.396 on Mac; WD Discovery Desktop App versions prior to 4.4.396 on Windows.