Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Let

Critical Vulnerability in Azure Synapse Let Attackers Control other Customers’ Workspaces

12 May 2022

The Microsoft Azure Synapse service has been identified as unsafe to use, and Orca Security has issued a security advisory for …

Tags Attackers, Let, Security Pro, Vulnerability, Workspaces

Multiple QNAP Flaws Let attackers to Access and Read Sensitive Data

10 May 2022

NAS device maker QNAP released software updates for its network-attached storage (NAS) products on Friday. While this updated software …

Tags Access, Flaws, Let, QNAP, Read

Critical RCE Vulnerability in Google’s VirusTotal Platform Let Attackers Scans Capabilities

26 April 2022

There is a security vulnerability in the VirusTotal platform that has been discovered by researchers, and it has the potential to be …

Tags Attackers, Capabilities, Critical, Let, Platforms

Critical Bug in Everscale Wallet Could’ve Let Attackers Steal Cryptocurrencies

25 April 2022

A security vulnerability has been disclosed in the web version of the Ever Surf wallet that, if successfully weaponized, could allow an …

Tags Attackers, Bug, Critical, Cryptocurrencies, Let

JekyllBot:5 Flaws Let Attackers Take Control of Aethon TUG Hospital Robots

15 April 2022

As many as five security vulnerabilities have been addressed in Aethon Tug hospital robots that could enable remote attackers to seize …

Tags Attackers, Flaws, Hospitals, Let, Robots

Honda’s Keyless Access Bug Could Let Thieves Remotely Unlock and Start Vehicles

30 March 2022

A duo of researchers has released a proof-of-concept (PoC) demonstrating the ability for a malicious actor to remote lock, unlock, and even …

Tags Access, Bug, Honda, Let, Security Pro

Honda Bug Let Attackers Unlock and Start the Car

28 March 2022

Honda and Acura have recently been found to have a vulnerability that allows an attacker to remote start the engine and unlock your car …

Tags Attackers, Bug, Car, Honda, Let

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges and Inject Malicious Code

15 March 2022

QNAP, the maker of network-attached storage (NAS) appliances, has recently released a warning statement that its products might be …

Tags Administrator, Attackers, Escalation, Let, Privileges

Critical Vulnerabilities In APC Smart-UPS Devices Let Attackers Remotely Manipulate The Power

11 March 2022

The cybersecurity firm, Armis has recently discovered that Schneider Electric’s subsidiary, APC Smart-UPS devices, are vulnerable to …

Tags APC, Attackers, Critical, Devices, Let

New Linux Kernel Cgroups Vulnerability Could Let Attackers Escape Container

5 March 2022

Details have emerged about a now-patched high-severity vulnerability in the Linux kernel that could potentially be abused to escape a …

Tags Attackers, Cgroups, Containers, Escape, Let

Critical Magento 0-Day Let Attackers Execute Arbitrary Code

15 February 2022

Security updates for Adobe Commerce and Magento Open Source have been released by Adobe. At the end of this January, Sansec reported a …

Tags 0-Day, Attackers, Critical, Let, Magento

Health Sites Let Ads Track Visitors Without Telling Them

6 February 2022

In a recent study from researchers at Duke University and the patient privacy-focused group the Light Collective, 10 patient advocates who …

Tags Ads, Health, Let, Sites, Tracks

CoinDesk CMS Vulnerability Let Hackers Trade on Nonpublic Info

4 February 2022

CoinDesk is one of the longest-running and most prominent news sources that focuses specifically on cryptocurrency and blockchain …

Tags CMS, Info, Infosec, Let, Security Pro

ESET Antivirus Flaw Let Attackers to Escalate Privileges & Execute Arbitrary Code

4 February 2022

ESET has recently published patches to fix a local privilege escalation vulnerability detected in all the clients of its Windows products …

Tags Antivirus, Attackers, ESET, Flaws, Let
Post navigation
Older posts
Page1 Page2 … Page16 Next →
Cookie-Free

NVD

  • CVE-2022-1886 – Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. …26 May 2022
  • CVE-2022-29682 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-20809 – Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expresswa …26 May 2022
  • CVE-2022-29683 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-20821 – A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenti …26 May 2022
  • CVE-2022-29684 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »