Skip to content
Security Without Compromise
  • Home
  • Cyber Security Services
    • Incident Response
    • Penetration Testing
    • Security Training
    • Secure Code Review
  • Cyber Security Solutions
    • Deception Technology
    • Threat Protection
    • Information Protection
    • Risk Analytics
  • Managed Security Services
    • NextGen Anti-Virus
    • Anti-Ransomware
    • Log Management
    • Threat Hunting as a Service (THaaS)
  • Resources
    • Datasheets & Tech Notes
    • Case Studies & White Papers
    • Blog
    • Video and Podcasts
    • News
  • Contact Us
Menu
  • Home
  • Cyber Security Services
    • Incident Response
    • Penetration Testing
    • Security Training
    • Secure Code Review
  • Cyber Security Solutions
    • Deception Technology
    • Threat Protection
    • Information Protection
    • Risk Analytics
  • Managed Security Services
    • NextGen Anti-Virus
    • Anti-Ransomware
    • Log Management
    • Threat Hunting as a Service (THaaS)
  • Resources
    • Datasheets & Tech Notes
    • Case Studies & White Papers
    • Blog
    • Video and Podcasts
    • News
  • Contact Us

Case Studies & White Papers

TXHunter Detects Reverse Shell Attacks

Complying with New York State Department of Financial Services 23 NYCRR 500

Protecting Companies from Ransomware

Threat Hunting: Machine-Assisted Incident Investigation

Retail Comes Under Attack

Penetration Testing a Cloud Environment

RSS VUNERABILITIES
  • CVE-2023-27034 March 23, 2023
    PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.
  • CVE-2023-24295 March 23, 2023
    A stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 allows attackers to execute arbitrary code after opening a crafted PDF file.
  • CVE-2023-24787 March 23, 2023
    RESERVED churchcrm v4.5.3 was discovered to contain a SQL injection vulnerability via the Event parameter at /churchcrm/EventAttendance.php.
  • CVE-2020-24857 March 23, 2023
    Cross Site Scripting vulnerabilty found in IXPManager v.5.6.0 allows attackers to excute arbitrary code via the looking glass component.
  • CVE-2023-28334 March 23, 2023
    Authenticated users were able to enumerate other users' names via the learning plans page.
  • CVE-2023-28335 March 23, 2023
    The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.
  • CVE-2023-28331 March 23, 2023
    Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
  • CVE-2023-28333 March 23, 2023
    The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
  • CVE-2023-28332 March 23, 2023
    If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.
  • CVE-2023-28336 March 23, 2023
    Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
  • CVE-2023-28611 March 23, 2023
    Incorrect authorization in OMICRON StationGuard 1.10 through 2.20 and StationScout 1.30 through 2.20 allows an attacker to bypass intended access restrictions.
  • CVE-2023-1249 March 23, 2023
    A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
  • CVE-2023-0056 March 23, 2023
    An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
  • CVE-2023-0590 March 23, 2023
    A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
  • CVE-2023-28329 March 23, 2023
    Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
  • CVE-2023-28330 March 23, 2023
    Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
  • CVE-2023-1252 March 23, 2023
    A use-after-free flaw was found in the Linux kernel’s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not […]
  • CVE-2023-20861 March 23, 2023
    In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
  • CVE-2023-20859 March 23, 2023
    In Spring Vault, versions 3.0.x prior to 3.0.2 and versions 2.3.x prior to 2.3.3 and older versions, an application is vulnerable to insertion of sensitive information into a log file when it attempts to revoke a Vault batch token.
  • CVE-2023-1613 March 23, 2023
    A vulnerability has been found in Rebuild up to 3.2.3 and classified as problematic. This vulnerability affects unknown code of the file /feeds/post/publish. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch […]
LATEST POSTS
EVENTS
CONTACT US
info@ipresidium.com
Office: (949) 721-6612
Fax: (866) 205-2904
620 Newport Center Dr. STE 1100
Newport Beach, CA 92660
Career Opportunities
COPYRIGHT © iPRESIDIUM 2020 | Privacy Policy | Careers
Envelope Facebook Twitter Linkedin