Skip to content
Security Without Compromise
  • Home
  • Cyber Security Services
    • Incident Response
    • Penetration Testing
    • Security Training
    • Secure Code Review
  • Cyber Security Solutions
    • Deception Technology
    • Threat Protection
    • Information Protection
    • Risk Analytics
  • Managed Security Services
    • NextGen Anti-Virus
    • Anti-Ransomware
    • Log Management
    • Threat Hunting as a Service (THaaS)
  • Resources
    • Datasheets & Tech Notes
    • Case Studies & White Papers
    • Blog
    • Video and Podcasts
    • News
  • Contact Us
Menu
  • Home
  • Cyber Security Services
    • Incident Response
    • Penetration Testing
    • Security Training
    • Secure Code Review
  • Cyber Security Solutions
    • Deception Technology
    • Threat Protection
    • Information Protection
    • Risk Analytics
  • Managed Security Services
    • NextGen Anti-Virus
    • Anti-Ransomware
    • Log Management
    • Threat Hunting as a Service (THaaS)
  • Resources
    • Datasheets & Tech Notes
    • Case Studies & White Papers
    • Blog
    • Video and Podcasts
    • News
  • Contact Us

Case Studies & White Papers

TXHunter Detects Reverse Shell Attacks

Complying with New York State Department of Financial Services 23 NYCRR 500

Protecting Companies from Ransomware

Threat Hunting: Machine-Assisted Incident Investigation

Retail Comes Under Attack

Penetration Testing a Cloud Environment

RSS VUNERABILITIES
  • CVE-2023-5345 October 3, 2023
    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
  • CVE-2023-5334 October 3, 2023
    The WP Responsive header image slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sp_responsiveslider' shortcode in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in […]
  • CVE-2023-3335 October 3, 2023
    Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator on Linux allows local users  to gain sensive information.This issue affects Hitachi Ops Center Administrator: before 10.9.3-00.
  • CVE-2023-3440 October 3, 2023
    Incorrect Default Permissions vulnerability in Hitachi JP1/Performance Management on Windows allows File Manipulation.This issue affects JP1/Performance Management - Manager: from 09-00 before 12-50-07; JP1/Performance Management - Base: from 09-00 through 10-50-*; JP1/Performance Management - Agent Option for Application Server: from 11-00 before 11-50-16; JP1/Performance Management - Agent Option for Enterprise Applications: from 09-00 before 12-00-14; […]
  • CVE-2023-3967 October 3, 2023
    Allocation of Resources Without Limits or Throttling vulnerability in Hitachi Ops Center Common Services on Linux allows DoS.This issue affects Hitachi Ops Center Common Services: before 10.9.3-00.
  • CVE-2023-43627 October 3, 2023
    Path traversal vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent authenticated attacker to alter critical information such as system files by sending a specially crafted request. They are affected when running in ST(Standalone) mode.
  • CVE-2023-41086 October 3, 2023
    Cross-site request forgery (CSRF) vulnerability exists in FURUNO SYSTEMS wireless LAN access point devices. If a user views a malicious page while logged in, unintended operations may be performed. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA […]
  • CVE-2023-39222 October 3, 2023
    OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware […]
  • CVE-2023-42771 October 3, 2023
    Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the affected product to download configuration files and/or log files, and upload configuration files and/or firmware. They are affected when running in ST(Standalone) mode.
  • CVE-2023-39429 October 3, 2023
    Cross-site scripting vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to inject an arbitrary script via a crafted configuration. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, […]
  • CVE-2023-36628 October 3, 2023
    A flaw exists in VASA which allows users with access to a vSphere/ESXi VMware admin on a FlashArray to gain root access through privilege escalation.
  • CVE-2023-28373 October 3, 2023
    A flaw exists in FlashArray Purity whereby an array administrator by configuring an external key manager can affect the availability of data on the system including snapshots protected by SafeMode.
  • CVE-2023-32572 October 3, 2023
    A flaw exists in FlashArray Purity wherein under limited circumstances, an array administrator can alter the retention lock of a pgroup and disable pgroup SafeMode protection.
  • CVE-2023-31042 October 2, 2023
    A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
  • CVE-2023-43980 October 2, 2023
    Presto Changeo testsitecreator up to v1.1.1 was discovered to contain a SQL injection vulnerability via the component disable_json.php.
  • CVE-2023-36627 October 2, 2023
    A flaw exists in FlashBlade Purity whereby a user with access to an administrative account on a FlashBlade that is configured with timezone-dependent snapshot schedules can configure a timezone to prevent the schedule from functioning properly.
  • CVE-2023-28372 October 2, 2023
    A flaw exists in FlashBlade Purity (OE) Version 4.1.0 whereby a user with privileges to extend an object’s retention period can affect the availability of the object lock.
  • CVE-2023-44012 October 2, 2023
    Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.
  • CVE-2023-44011 October 2, 2023
    An issue in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via a crafted script to the layout.master skin file at the Skin management component.
  • CVE-2023-43893 October 2, 2023
    Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the wakeup_mac parameter in the Wake-On-LAN (WoL) function. This vulnerability is exploited via a crafted payload.
LATEST POSTS
EVENTS
CONTACT US
info@ipresidium.com
Office: (949) 721-6612
Fax: (866) 205-2904
620 Newport Center Dr. STE 1100
Newport Beach, CA 92660
Career Opportunities
COPYRIGHT © iPRESIDIUM 2020 | Privacy Policy | Careers
Envelope Facebook Twitter Linkedin