Vulnerability Summary for the Week of March 3, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info n/a--n/a  Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via…

Comments Off on Vulnerability Summary for the Week of March 3, 2025

FBI Warns of Data Extortion Scam Targeting Corporate Executives

The Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3) has released an alert warning of a scam involving criminal actors masquerading as the “BianLian Group.” The cyber criminals target…

Comments Off on FBI Warns of Data Extortion Scam Targeting Corporate Executives

Vulnerability Summary for the Week of February 24, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info jupyterhub--ltiauthenticator  `jupyterhub-ltiauthenticator` is a JupyterHub authenticator for learning tools interoperability (LTI). LTI13Authenticator that was introduced in `jupyterhub-ltiauthenticator` 1.3.0 wasn't…

Comments Off on Vulnerability Summary for the Week of February 24, 2025

Vulnerability Summary for the Week of February 17, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info a1post--A1POST.BG Shipping for Woo  Cross-Site Request Forgery (CSRF) vulnerability in a1post A1POST.BG Shipping for Woo allows Privilege Escalation. This…

Comments Off on Vulnerability Summary for the Week of February 17, 2025

CISA and Partners Release Advisory on Ghost (Cring) Ransomware

Today, CISA—in partnership with the Federal Bureau of Investigation (FBI) and Multi-State Information Sharing and Analysis Center (MS-ISAC)—released a joint Cybersecurity Advisory, #StopRansomware: Ghost (Cring) Ransomware. This advisory provides network…

Comments Off on CISA and Partners Release Advisory on Ghost (Cring) Ransomware

#StopRansomware: Ghost (Cring) Ransomware

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware…

Comments Off on #StopRansomware: Ghost (Cring) Ransomware

Vulnerability Summary for the Week of February 10, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info ABB--System 800xA  A vulnerability exists in the VideONet product included in the listed System 800xA versions, where VideONet is…

Comments Off on Vulnerability Summary for the Week of February 10, 2025

Vulnerability Summary for the Week of February 3, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info .TUBE gTLD--.TUBE Video Curator  Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in .TUBE gTLD .TUBE…

Comments Off on Vulnerability Summary for the Week of February 3, 2025

CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices

CISA—in partnership with international and U.S. organizations—released guidance to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things…

Comments Off on CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices

Vulnerability Summary for the Week of January 27, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info 0xPolygonZero--plonky2  Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length is not…

Comments Off on Vulnerability Summary for the Week of January 27, 2025