124Articles
10Categories
2024-11-12Date
🚨
CISA Adds Five Known Exploited Vulnerabilities to CatalogCISA has added five new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2021-26086  Atlassian Jira Server and Data Center Path Traversal Vulnerability CVE-2014-2120  Cisco Adaptive Security Appliance (…
KEV
πŸ›
Microsoft November 2024 Patch Tuesday, (Tue, Nov 12th)
KEV
πŸ›
Citrix Releases Security Updates for NetScaler and Citrix Session Recording
πŸ›
CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities
πŸ›
CVE-2024-43530 Windows Update Stack Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43602 Azure CycleCloud Remote Code Execution Vulnerability
πŸ›
CVE-2024-43623 Windows NT OS Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43625 Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43626 Windows Telephony Service Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43627 Windows Telephony Service Remote Code Execution Vulnerability
πŸ›
CVE-2024-43628 Windows Telephony Service Remote Code Execution Vulnerability
πŸ›
CVE-2024-43630 Windows Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43631 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43634 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43637 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43638 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43643 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43644 Windows Client-Side Caching Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43645 Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability
πŸ›
CVE-2024-43646 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43447 Windows SMBv3 Server Remote Code Execution Vulnerability
πŸ›
CVE-2024-43449 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43450 Windows DNS Spoofing Vulnerability
πŸ›
CVE-2024-43451 NTLM Hash Disclosure Spoofing Vulnerability
πŸ›
CVE-2024-43452 Windows Registry Elevation of Privilege Vulnerability
πŸ›
CVE-2024-38255 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-38264 Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability
πŸ›
CVE-2024-43459 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-43462 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-48994 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-48995 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-48996 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-5535 OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread
πŸ›
CVE-2024-49042 Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability
πŸ›
CVE-2024-49043 Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability
πŸ›
CVE-2024-49044 Visual Studio Elevation of Privilege Vulnerability
πŸ›
CVE-2024-49046 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
πŸ›
CVE-2024-49049 Visual Studio Code Remote Extension Elevation of Privilege Vulnerability
πŸ›
CVE-2024-49056 Airlift.microsoft.com Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43613 Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43620 Windows Telephony Service Remote Code Execution Vulnerability
πŸ›
CVE-2024-43621 Windows Telephony Service Remote Code Execution Vulnerability
πŸ›
CVE-2024-43622 Windows Telephony Service Remote Code Execution Vulnerability
πŸ›
CVE-2024-43629 Windows DWM Core Library Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43633 Windows Hyper-V Denial of Service Vulnerability
πŸ›
CVE-2024-43635 Windows Telephony Service Remote Code Execution Vulnerability
πŸ›
CVE-2024-43636 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43640 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43641 Windows Registry Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43642 Windows SMB Denial of Service Vulnerability
πŸ›
CVE-2024-38203 Windows Package Library Manager Information Disclosure Vulnerability
πŸ›
CVE-2024-48993 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-48997 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-48998 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-48999 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49000 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49001 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49002 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49003 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49004 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49005 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49007 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49006 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49008 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49009 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49010 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49011 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49012 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49013 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49014 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49015 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49016 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49017 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49018 SQL Server Native Client Remote Code Execution Vulnerability
πŸ›
CVE-2024-49019 Active Directory Certificate Services Elevation of Privilege Vulnerability
πŸ›
CVE-2024-49021 Microsoft SQL Server Remote Code Execution Vulnerability
πŸ›
CVE-2024-49026 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2024-49027 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2024-49028 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2024-49029 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2024-49030 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2024-49031 Microsoft Office Graphics Remote Code Execution Vulnerability
πŸ›
CVE-2024-49032 Microsoft Office Graphics Remote Code Execution Vulnerability
πŸ›
CVE-2024-49033 Microsoft Word Security Feature Bypass Vulnerability
πŸ›
CVE-2024-49039 Windows Task Scheduler Elevation of Privilege Vulnerability
πŸ›
CVE-2024-49048 TorchGeo Remote Code Execution Vulnerability
πŸ›
CVE-2024-49050 Visual Studio Code Python Extension Remote Code Execution Vulnerability
πŸ›
CVE-2024-49051 Microsoft PC Manager Elevation of Privilege Vulnerability
πŸ›
CVE-2024-43498 .NET and Visual Studio Remote Code Execution Vulnerability
πŸ›
CVE-2024-43499 .NET and Visual Studio Denial of Service Vulnerability
πŸ›
CVE-2024-43624 Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
⚠️
Criminals Exploiting FBI Emergency Data Requests
⚠️
Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution
⚠️
Critical Patches Issued for Microsoft Products, November 12, 2024
⚠️
Microsoft Patch Tuesday, November 2024 Edition
⚠️
New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
⚠️
New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
⚠️
Fortinet Releases Security Updates for Multiple Products
⚠️
Microsoft Releases November 2024 Security Updates
⚠️
Adobe Releases Security Updates for Multiple Products
⚠️
CISA Releases Five Industrial Control Systems Advisories
⚠️
[FREE RESOURCE KIT] Stay Cyber Safe this Holiday Season with Our Free 2024 Resource Kit!
⚠️
Winter Fuel Payment scam targets UK citizens via SMS
⚠️
Toward greater transparency: Publishing machine-readable CSAF files
πŸ“‹
Ivanti Releases Security Updates for Multiple Products
πŸ“‹
ADV240001 Microsoft SharePoint Server Defense in Depth Update
πŸ“’
JCDC’s Collaborative Efforts Enhance Cybersecurity for the 2024 Olympic and Paralympic Games
πŸ”₯
5 Ways Behavioral Analytics is Revolutionizing Incident Response
πŸ”₯
Ahold Delhaize Cybersecurity Incident Impacts Giant Food, Hannaford
πŸ•΅οΈ
New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns
πŸ•΅οΈ
North Korean Hackers Target macOS Using Flutter-Embedded Malware
πŸ•΅οΈ
ISC Stormcast For Tuesday, November 12th, 2024 https://isc.sans.edu/podcastdetail/9218, (Tue, Nov 12th)
πŸ•΅οΈ
Nation-State Threat Actors Rely on Social Engineering First
πŸ•΅οΈ
Step-by-Step To Creating Your First Realistic Deepfake Video in a Few Minutes
πŸ•΅οΈ
CyberheistNews Vol 14 #46 [Eye Opener] Attackers Don't Hack, They Log In. Can You Stop Them?
πŸ•΅οΈ
GUEST ESSAY: The promise and pitfalls of using augmented reality– β€˜AR’ β€” in cybersecurity
πŸ•΅οΈ
6 Principles of Operational Technology Cybersecurity released by joint NSA initiative
πŸ•΅οΈ
Exceptional User Experience β€” Every Application, Every Transaction
🌐
New GoIssue Tool Targets GitHub Devs And Corporate Supply Chains
πŸŽ™οΈ
The AI Fix #24: Where are the alien AIs, and are we being softened up for superintelligence?
πŸ“‘
Snowflake hackers identified and charged with stealing 50 billion AT&T records
πŸ“‘
U.S. May Support Global Surveillance Treaty Hated by Everyone but Authoritarian Governments
πŸ“‘
How to save web pages permanently or find content from deleted sites | Kaspersky official blog
πŸ“‘
Beats by bot: The AI remix revolution