Aggregator
【安全圈】新型安卓银行特洛伊木马 BingoMod 盗取资金并清除设备
5 months 4 weeks ago
【安全圈】防不胜防:黑客可利用 AI 通过 HDMI 线远程窃取屏幕信息
5 months 4 weeks ago
【安全圈】美国一血液中心遭网络攻击 多地供血服务受到影响
5 months 4 weeks ago
近期值得关注的IOC(2024-08-04)
5 months 4 weeks ago
分享近期值得关注的IOC
Against XMPP+OMEMO
5 months 4 weeks ago
XMPP is a messaging protocol (among other things) that needs no introduction to any technical
How self care and assertiveness can help the remote worker
5 months 4 weeks ago
The benefits of remote working include better work-life balance and more work flexibility as well as
Security Affairs Malware Newsletter – Round 5
5 months 4 weeks ago
Security Affairs Malware Newsletter - Round 5 | Security Affairs newsletter Round 483 by Pierlui
Security Affairs Malware Newsletter – Round 5
5 months 4 weeks ago
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Unplugging PlugX: Sinkholing the PlugX USB worm botnet Introducing Gh0stGambit: A Dropper for Deploying Gh0st RAT Mandrake spyware sneaks onto Google Play again, flying under the radar for two years A Survey of Malware Detection Using […]
Pierluigi Paganini
CVE-2024-7470 | Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface vpn_template_style.php sslvpn_config_mod template/stylenum os command injection
5 months 4 weeks ago
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been rated as critical. This issue affects the function sslvpn_config_mod of the file /vpn/vpn_template_style.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection.
The identification of this vulnerability is CVE-2024-7470. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7469 | Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface list_vpn_web_custom.php sslvpn_config_mod template/stylenum os command injection
5 months 4 weeks ago
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been declared as critical. This vulnerability affects the function sslvpn_config_mod of the file /vpn/list_vpn_web_custom.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection.
This vulnerability was named CVE-2024-7469. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7468 | Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface list_service_manage.php sslvpn_config_mod template/stylenum os command injection
5 months 4 weeks ago
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-7468. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7467 | Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 3.90 Web Interface /vpn/list_ip_network.php sslvpn_config_mod template/stylenum os command injection
5 months 4 weeks ago
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90 and classified as critical. Affected by this issue is the function sslvpn_config_mod of the file /vpn/list_ip_network.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection.
This vulnerability is handled as CVE-2024-7467. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7466 | PMWeb 7.2.00 Web Application Firewall cross site scripting
5 months 4 weeks ago
A vulnerability has been found in PMWeb 7.2.00 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Web Application Firewall. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-7466. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
Security Affairs newsletter Round 483 by Pierluigi Paganini – INTERNATIONAL EDITION
5 months 4 weeks ago
Security Affairs Malware Newsletter - Round 5 | Security Affairs newsletter Round 483 by Pierlui
Security Affairs newsletter Round 483 by Pierluigi Paganini – INTERNATIONAL EDITION
5 months 4 weeks ago
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. US sued TikTok and ByteDance for violating children’s privacy laws Russia-linked APT used a car for sale as […]
Pierluigi Paganini
CVE-2024-7465 | TOTOLINK CP450 4.1.0cu.747_B20191224 /cgi-bin/cstecgi.cgi loginauth http_host buffer overflow
5 months 4 weeks ago
A vulnerability, which was classified as critical, was found in TOTOLINK CP450 4.1.0cu.747_B20191224. Affected is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow.
This vulnerability is traded as CVE-2024-7465. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7464 | TOTOLINK CP900 6.3c.566 Telnet Service setTelnetCfg telnet_enabled command injection
5 months 4 weeks ago
A vulnerability, which was classified as critical, has been found in TOTOLINK CP900 6.3c.566. This issue affects the function setTelnetCfg of the component Telnet Service. The manipulation of the argument telnet_enabled leads to command injection.
The identification of this vulnerability is CVE-2024-7464. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7463 | TOTOLINK CP900 6.3c.566 /cgi-bin/cstecgi.cgi UploadCustomModule File buffer overflow
5 months 4 weeks ago
A vulnerability classified as critical was found in TOTOLINK CP900 6.3c.566. This vulnerability affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow.
This vulnerability was named CVE-2024-7463. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-7462 | TOTOLINK N350RT 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi setWizardCfg ssid buffer overflow
5 months 4 weeks ago
A vulnerability classified as critical has been found in TOTOLINK N350RT 9.3.5u.6139_B20201216. This affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-7462. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com