logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • MadPot: AWS Honeypot to Disrupt Threat Actors
  • How AWS threat intelligence deters threat actors
  • Microsoft’s Response to Open-Source Vulnerabilities – CVE-2023-4863 and CVE-2023-5217
  • Exim patches three of six zero-day bugs disclosed last week
  • NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-44266 (wp_adminify) 2 October 2023
  • CVE-2023-44265 (popup_contact_form) 2 October 2023
  • CVE-2023-44264 (the_awesome_feed) 2 October 2023
  • CVE-2023-44242 (2j_slideshow) 2 October 2023
  • CVE-2023-44477 (cooked) 2 October 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Researcher releases PoC for macOS Ventura code execution bug (CVE-2022-26730)

Posted on 8 November 2022

From securityonline.info

CVE-2022-26730 PoC

Researcher from Hoyt LLC has shared more details about a now-patched security flaw in Apple macOS Ventura code execution that could potentially enable an attacker to arbitrary code execution.

Read more…

Posted in News

Post navigation

Previous post: The security dilemma of data sprawl
Next post: CISA, NSA and industry outline security responsibilities of software suppliers
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.