Security CERT Global
- CVE-2023-0467 (wp_dark_mode)
- CVE-2023-0335 (wp_shamsi)
- CVE-2023-0441 (simply_gallery_blocks_with_lightbox)
- CVE-2023-0336 (ooohboi_steroids_for_elementor)
- CVE-2023-0395 (menu_shortcode)
- CVE-2023-0241 (pgadmin_4)
- CVE-2023-28844
- CVE-2023-24824
- CVE-2023-28845
- CVE-2022-47192
- CVE-2022-47188
- CVE-2022-47191
- CVE-2022-47189
- CVE-2023-26485
- CVE-2022-47190
- CVE-2023-28645
- Samba Releases Security Updates for Multiple Versions of Samba
- Mozilla Releases Security Update for Thunderbird 102.9.1
- CERTFR-2023-ALE-003 : Compromission de l’application 3CX Desktop App (31 mars 2023)
- CERTFR-2023-AVI-0278 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (31 mars 2023)
- CERTFR-2023-AVI-0277 : Multiples vulnérabilités dans le noyau Linux de SUSE (31 mars 2023)
- CERTFR-2023-AVI-0279 : Multiples vulnérabilités dans le noyau Linux de RedHat (31 mars 2023)
- CERTFR-2023-AVI-0275 : Multiples vulnérabilités dans GitLab (31 mars 2023)
- CERTFR-2023-AVI-0276 : Multiples vulnérabilités dans les produits IBM (31 mars 2023)
- CERT-SE:s veckobrev v.13
- Sårbarhet i VoIP-tjänsten 3CX utnyttjas för angrepp mot kunder
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- JVN: Hitachi Energy製IEC 61850 MMS-Serverにおけるリソースの不適切なシャットダウンまたはリリースの脆弱性
- ESB-2023.1905 - [Win][UNIX/Linux] GitLab: CVSS (Max): 3.8*
- ESB-2023.1904 - [Ubuntu] musl: CVSS (Max): 9.8
- CVE-2023-1745
- CVE-2023-25587
- CVE-2023-1742
- CVE-2023-1744
- CVE-2023-1741
- CVE-2023-1746
- CVE-2023-1743
- CVE-2023-1670
- CONPROSYS HMI System(CHS) vulnerable to SQL injection
- JTEKT ELECTRONIC Screen Creator Advance 2 vulnerable to improper restriction of operations within the bounds of a memory buffer
- JVN: セイコーソリューションズ製 SkyBridge MB-A100/A110/A200/A130 および SkySpider MB-R210 における複数の脆弱性
- JVN: HAProxy における HTTP リクエストスマグリングの脆弱性
- JVN: ジェイテクトエレクトロニクス製Screen Creator Advance 2におけるメモリバッファエラーの脆弱性
- JVN: コンテック製CONPROSYS HMI System(CHS)におけるSQLインジェクションの脆弱性
- ESB-2023.1903 - [Win][UNIX/Linux] Ruby: CVSS (Max): 7.5
- ESB-2023.1898 - [Debian] libmicrohttpd: CVSS (Max): 5.9
- ESB-2023.1900 - [Debian] joblib: CVSS (Max): 9.8
- ESB-2023.1901 - [Appliance] Hitachi Energy IEC 61850 MMS-Server: CVSS (Max): 5.9
- ESB-2023.1902 - [Win][UNIX/Linux] Ruby: CVSS (Max): None
SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts
Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known vulnerabilities and possible countermeasures is being collected and published since several years, however the methodical introduction of changes and/or software patches in many industrial networks is not always possible, so that some known flaws can be left untreated as they are not considered harmful in principle.
http://ewic.bcs.org/upload/pdf/ewic_icscsr2015_paper7.pdf
Tags: Automation,CyberSecurity,ICS,ICS Vulnerabilities,IIot,Industrial Networked Systems,Infrastructure,SCADA,Vulnerability Sequences,