SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsJQ: Another Tool We Thought We Knew (2023.07.24)
https://isc.sans.edu/diary/JQ+Another+Tool+We+Thought+We+Knew/30060/
Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs (2023.07.23)
YARA Error Codes (2023.07.22)
https://isc.sans.edu/diary/YARA+Error+Codes/30054/
Shodan's API For The (Recon) Win! (2023.07.21)
https://isc.sans.edu/diary/Shodans+API+For+The+Recon+Win/30050/
Product: Ivanti Endpoint Manager Mobile (EPMM) MobileIronCVSS Score: 10.0** KEV since 2023-07-25 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35078ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8588NVD References: - https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability- https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078- https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078- https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerabilityCVE-2023-34034 - Spring Security's use of "**" as a pattern in configuration for WebFlux leads to pattern matching mismatch with Spring WebFlux, allowing a security bypass.Product: Spring Security Spring WebFluxCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34034ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8582NVD References: https://spring.io/security/cve-2023-34034CVE-2023-35311 - Microsoft Outlook Security Feature Bypass VulnerabilityProduct: Microsoft OutlookCVSS Score: 8.8** KEV since 2023-07-11 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35311MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311CVE-2023-35189 - Iagona ScrutisWeb versions 2.1.37 and prior allow unauthenticated users to upload malicious payloads and execute remote code.Product: Iagona ScrutisWebCVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35189NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-03CVE-2023-30153 - Payplug module for PrestaShop versions 3.6.0 to 3.7.1 allows remote attackers to execute arbitrary SQL commands via ajax.php front controller.Product: Payplug PrestaShopCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30153NVD References: - https://addons.prestashop.com/en/payment-card-wallet/8795--payplug-accept-customer-payments-wherever-they-are.html- https://security.friendsofpresta.org/module/2023/07/18/payplug.htmlCVE-2023-21974 - The vulnerability in Oracle Application Express (component: User Account) allows a low privileged attacker with HTTP network access to compromise the Application Express Team Calendar Plugin, potentially resulting in a takeover.Product: Oracle Application Express Team Calendar PluginCVSS Score: 9.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-21974NVD References: https://www.oracle.com/security-alerts/cpujul2023.htmlCVE-2023-21975 - The Application Express Customers Plugin product of Oracle Application Express has a vulnerability that allows a low privileged attacker to compromise the plugin and potentially impact additional products, resulting in a takeover of Application Express Customers Plugin.Product: Oracle Application Express Customers PluginCVSS Score: 9.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-21975NVD References: https://www.oracle.com/security-alerts/cpujul2023.htmlCVE-2023-30799 - MikroTik RouterOS versions 6.49.7 and below have a privilege escalation vulnerability allowing remote attackers to execute arbitrary code by escalating privileges from admin to super-admin on the Winbox or HTTP interface.Product: MikroTik RouterOSCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30799NVD References: - https://github.com/MarginResearch/FOISted- https://vulncheck.com/advisories/mikrotik-foistedCVE-2023-3638 - In GeoVision GV-ADR2701 cameras, an attacker could edit the login response to access the web application.Product: GeoVision GV-ADR2701 camerasCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-3638NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05CVE-2023-3466 - Reflected Cross-Site Scripting (XSS)Product: Citrix ADC and Citrix GatewayCVSS Score: 8.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-3466ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8580NVD References: https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467CVE-2023-3467 - Privilege Escalation to root administrator (nsroot)Product: Citrix ADC and Citrix Gateway CVSS Score: 8.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-3467ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8580NVD References: https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467CVE-2023-37289 - InfoDoc Document On-line Submission and Approval System is vulnerable to an unrestricted file upload vulnerability, allowing unauthenticated attackers to upload and execute arbitrary files, enabling them to execute arbitrary commands or disrupt services.Product: InfoDoc Document On-line Submission and Approval SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-37289NVD References: https://www.twcert.org.tw/tw/cp-132-7225-cef32-1.htmlCVE-2023-38203 - Adobe ColdFus…
*********** Sponsored By SNYK Limited ***********Snyk’s 5th annual State of Open Source Security report is here! Snyk surveyed hundreds of security and development teams to uncover the latest trends with open source security. Check out the full report to see how your organization stacks up against today’s open source security trends and key learnings for the future.
Tune in on Thursday, July 27 for the FREE Building Red Team Capability Solutions Forum 2023 - How can we empower security leaders and their teams to respond in minutes or even seconds? Hear directly from leaders who are using emerging innovations to close the time gap and inspire confidence as they move from reacting to anticipating. | Register now:
Join us on Wednesday, August 2 at 1:00pm ET for Focusing on The Right Cybersecurity Priorities - Matt Bromiley will lead the conversation as we dive into how security teams should be utilizing the most popular and common frameworks. | Register now:
Upcoming webcast on Thursday, August 17 at 1:00pm ET | How to Use Zero Trust to Secure Workloads in the Public Cloud - Register for this free virtual webcast to receive first free access to the accompanying whitepaper written by Dave Shackleford. | Register Now: