7 January 2022
?
13:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ QNAP: Get NAS Devices Off the Internet Now ❌

There are active ransomware and brute-force attacks being launched against internet-exposed, network-attached storage devices, the device maker warned.

πŸ“– Read

via "Threat Post".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep64: Log4Shell again, scammers keeping busy, and Apple Home bug [Podcast + Transcript] ⚠

We're back for 2022 - listen now!

πŸ“– Read

via "Naked Security".
13:47
⚠ Log4Shell-like security hole found in popular Java SQL database engine H2 ⚠

"It's Log4Shell, Jim, but not as we know it." How to find and fix a JNDI-based vuln in the H2 Database Engine.

πŸ“– Read

via "Naked Security".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Norton 360 wants to pay you a pittance to mine Ethereum cryptocurrency 🦿

The new opt-in feature turns your idle PC into a cryptominer, with Norton skimming 15% off the top, plus market fees.

πŸ“– Read

via "Tech Republic".
15:17
πŸ•΄ How to Proactively Limit Damage From BlackMatter Ransomware πŸ•΄

Logic flaw exists in malware that can be used to prevent it from encrypting remote shares, security vendor says.

πŸ“– Read

via "Dark Reading".
?
16:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FTC Settles with Financial Firm Following Mortgage File Breach πŸ”

A recently finalized settlement will require the company maintain proper data security safeguards and undergo periodic audits.

πŸ“– Read

via "".
16:21
❌ 3.7M FlexBooker Records Dumped on Hacker Forum ❌

Attackers are trading millions of records from a trio of pre-holiday breaches on an online forum.

πŸ“– Read

via "Threat Post".
?
16:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 1/7 πŸ”

A scientist pleads guilty to stealing trade secret data, a new proof-of-concept iPhone Trojan, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ The scariest security horror stories of 2021 πŸ“’

A crisis at Microsoft, the ransomware resurgence, and endless zero-days dominated headlines

πŸ“– Read

via "ITPro".
17:42
πŸ“’ FTC threatens legal action against companies failing to patch Log4Shell πŸ“’

The agency appears to be cracking down on the widespread security flaw as attack attempts remained high over the holiday period

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Microsoft issues out-of-band patch for Windows Server sign-in bug πŸ“’

The flaw, which causes a slow down in the user verification process, needs to be installed manually by IT admins

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Morgan Stanley agrees $60 million settlement in data breach lawsuit πŸ“’

The two separate data incidents occurred in 2016 and 2019 and concerned the investment bank's handling of legacy IT equipment

πŸ“– Read

via "ITPro".
17:42
πŸ“’ How to fix the Blue Screen of Death (BSOD) error in Windows 11 πŸ“’

Encountering Windows' dreaded BSOD error is never fun, but it's possible to diagnose the problem with a few simple steps

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Majority of Americans say ransomware attacks should be considered terrorism πŸ“’

Most also believe it should be made illegal to pay ransoms to hackers

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Google Cloud acquires Israeli security startup Siemplify πŸ“’

The SOAR specialist has been described as "the missing piece" for Google's Chronicle platform

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Researchers warn of spear-phishing exploit in Google Docs πŸ“’

Hackers have found a way to use Google's comment function to dupe victims into clicking on malicious links

πŸ“– Read

via "ITPro".
17:42
πŸ“’ A month in the life of a social engineer πŸ“’

With hackers finding more ingenious ways to exploit human flaws, we get inside the planning stages of a social engineering attack

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Sophos XGS 3300 review: Xstream firewall performance πŸ“’

A powerful firewall appliance combining hardware acceleration with a vast array of security measures

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Solving cyber security's diversity problem πŸ“’

Why failing to address a shortage of women in senior cyber security positions may open businesses up to greater threats

πŸ“– Read

via "ITPro".
17:42
πŸ“’ How to boot Windows 11 in Safe Mode πŸ“’

Unless you’re a complete Windows 11 novice, you’ll have come across Safe Mode before - but what exactly is it, and how do you access it in Windows 11?

πŸ“– Read

via "ITPro".
17:42
πŸ“’ China to introduce cyber security reviews for companies listing overseas πŸ“’

The country continues to gain oversight of its tech sector as it begins to implement laws proposed last year

πŸ“– Read

via "ITPro".
17:42
πŸ“’ IT Pro News In Review: Microsoft Y2K22 bug, RIP BlackBerry smartphones, Apple hits $3 trillion πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
17:42
πŸ“’ Google, Facebook fined €210 million for making it difficult for users to reject cookies πŸ“’

Data regulator CNIL gives companies three months to provide a system for refusing cookies that is as easy as single click consent

πŸ“– Read

via "ITPro".
17:48
πŸ•΄ IT/OT Convergence Is More Than a Catchy Phrase πŸ•΄

The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.

πŸ“– Read

via "Dark Reading".
17:48
πŸ•΄ Cerberus Sentinel Acquires True Digital Security πŸ•΄

US cybersecurity services firm expands security services and network monitoring capabilities.

πŸ“– Read

via "Dark Reading".
17:48
πŸ•΄ MSP Thrive Acquires InCare Technologies πŸ•΄

Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States.

πŸ“– Read

via "Dark Reading".
?
18:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyberattackers Hit Data of 80K Fertility Patients ❌

Fertility Centers of Illinois' security measures protected electronic medical records, but the attackers still got at extremely intimate data in admin files.

πŸ“– Read

via "Threat Post".
?
18:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NHS Warns of Attackers Targeting Log4j Flaws in VMware Horizon πŸ•΄

An unknown threat group has been observed attacking VMware Horizon servers running versions with Log4j vulnerabilities.

πŸ“– Read

via "Dark Reading".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ EoL Systems Stonewalling Log4j Fixes for Fed Agencies ❌

End of life, end of support, pandemic-induced shipping delays and remote work, scanning failures: It’s a recipe for a patching nightmare, federal cyberserurity CTO Matt Keller says.

πŸ“– Read

via "Threat Post".
8 January 2022
?
00:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Honda cars in flashback to 2002 – β€œCan’t Get You Out Of My Head” ⚠

Where were YOU on the night of 17 May 2002? And what about the day after that?

πŸ“– Read

via "Naked Security".
?
03:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Norton 360 Now Comes With a Cryptominer β™ŸοΈ

Norton 360, one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers' computers. Norton's parent firm says the cloud-based service that activates the program and enables customers to profit from the scheme -- in which the company keeps 15 percent of any currencies mined -- is "opt-in," meaning users have to agree to enable it. But many Norton users complain the mining program is difficult to remove, and reactions from longtime customers have ranged from unease and disbelief to, "Dude, where's my crypto?"

πŸ“– Read

via "Krebs on Security".
9 January 2022
?
10:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Simple Active Directory tweak helps block BlackMatter ransomware attacks πŸ“’

Security researchers reverse engineer the infamous ransomware strain and discover a way to stymie its file encryption process, even if it reaches a corporate network

πŸ“– Read

via "ITPro".
10 January 2022
?
09:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ The blame game: EU criticized for β€˜fragmented and slow’ approach to cyber-attack attribution πŸ—“οΈ

Cyber sanctions can send a powerful message – why aren’t they being used more widely?

πŸ“– Read

via "The Daily Swig".
?
11:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 URL parsing: A ticking time bomb of security exploits 🦿

The modern world would grind to a halt without URLs, but years of inconsistent parsing specifications have created an environment ripe for exploitation that puts countless businesses at risk.

πŸ“– Read

via "Tech Republic".
11:45
πŸ—“οΈ City of Grass Valley, California, suffers data breach – employee and citizen information exposed πŸ—“οΈ

Social Security numbers and medical information has been accessed, city confirms

πŸ“– Read

via "The Daily Swig".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22270 β€Ό

An implicit Intent hijacking vulnerability in Dialer prior to SMR Jan-2022 Release 1 allows unprivileged applications to access contact information.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-40026 β€Ό

There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2022-22268 β€Ό

Incorrect implementation of Knox Guard prior to SMR Jan-2022 Release 1 allows physically proximate attackers to temporary unlock the Knox Guard via Samsung DeX mode.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-45231 β€Ό

A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2022-22287 β€Ό

Abitrary file access vulnerability in Samsung Email prior to 6.1.60.16 allows attacker to read isolated data in sandbox.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-40004 β€Ό

The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-46054 β€Ό

A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2022-22272 β€Ό

Improper authorization in TelephonyManager prior to SMR Jan-2022 Release 1 allows attackers to get IMSI without READ_PRIVILEGED_PHONE_STATE permission

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-40038 β€Ό

There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2022-22823 β€Ό

build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-40032 β€Ό

The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2022-21667 β€Ό

soketi is an open-source WebSockets server. There is an unhandled case when reading POST requests which results in the server crashing if it could not read the body of a request. In the event that a POST request is sent to any endpoint of the server with an empty body, even unauthenticated with the Pusher Protocol, it will crash the server. All users that run the server are affected by this vulnerability and it's highly recommended to upgrade to the latest patch. There are no workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-40029 β€Ό

There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-46050 β€Ό

A Stack Overflow vulnerability exists in Binaryen 103 via the printf_common function.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2021-40000 β€Ό

The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2021-40021 β€Ό

The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2021-40014 β€Ό

The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2021-46147 β€Ό

An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. MassEditRegex allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2022-22824 β€Ό

defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2021-38921 β€Ό

IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210067.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2020-9057 β€Ό

Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-34086 β€Ό

In Ultimaker S3 3D printer, Ultimaker S5 3D printer, Ultimaker 3 3D printer S-line through 6.3 and Ultimaker 3 through 5.2.16, the local webserver hosts APIs vulnerable to CSRF. They do not verify incoming requests.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2022-22846 β€Ό

The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-40037 β€Ό

There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2022-22263 β€Ό

Unprotected dynamic receiver in SecSettings prior to SMR Jan-2022 Release 1 allows untrusted applications to launch arbitrary activity.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-40039 β€Ό

There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-40035 β€Ό

There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2022-22844 β€Ό

LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2020-9060 β€Ό

Z-Wave devices based on Silicon Labs 500 series chipsets using S2, including but likely not limited to the ZooZ ZST10 version 6.04, ZooZ ZEN20 version 5.03, ZooZ ZEN25 version 5.03, Aeon Labs ZW090-A version 3.95, and Fibaro FGWPB-111 version 4.3, are susceptible to denial of service and resource exhaustion via malformed SECURITY NONCE GET, SECURITY NONCE GET 2, NO OPERATION, or NIF REQUEST messages.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-46053 β€Ό

A Denial of Service vulnerability exists in Binaryen 103. The program terminates with signal SIGKILL.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-46165 β€Ό

Zoho ManageEngine Desktop Central before 10.0.662, during startup, launches an executable file from the batch files, but this file's path might not be properly defined.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2022-22265 β€Ό

An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-42392 β€Ό

The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-22569 β€Ό

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-44528 β€Ό

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-40022 β€Ό

The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-23568 β€Ό

The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-40001 β€Ό

The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable.

πŸ“– Read

via "National Vulnerability Database".
12:21
β€Ό CVE-2021-46163 β€Ό

Kentico Xperience 13.0.44 allows XSS via an XML document to the Media Libraries subsystem.

πŸ“– Read

via "National Vulnerability Database".
12:21
πŸ•΄ The Evolution of Patch Management: How and When It Got So Complicated πŸ•΄

In the wake of WannaCry and its ilk, the National Vulnerability Database arose to help security organizations track and prioritize vulnerabilities to patch. Part 1 of 3.

πŸ“– Read

via "Dark Reading".
12:26
β€Ό CVE-2022-22264 β€Ό

Improper sanitization of incoming intent in Dressroom prior to SMR Jan-2022 Release 1 allows local attackers to read and write arbitrary files without permission.

πŸ“– Read

via "National Vulnerability Database".
?
12:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Behind the scenes: A day in the life of a security auditing manager 🦿

Working with clients on finding vulnerabilities within their cybersecurity frameworks is the key part of a security manager's job. Here's how one security auditing manager gets it done.

πŸ“– Read

via "Tech Republic".
?
13:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Report: DDoS attacks increasing year on year as cybercriminals demand extortionate payouts πŸ—“οΈ

Crooks attempt to cash in by upping the ante

πŸ“– Read

via "The Daily Swig".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High ❌

Cyberattacks increased 50 percent YoY in 2021 and peaked in December due to a frenzy of Log4j exploits, researchers found.

πŸ“– Read

via "Threat Post".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22116 β€Ό

In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victimÒ€ℒs browser when they open the image URL.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-44586 β€Ό

An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-0156 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-0158 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-25052 β€Ό

The Button Generator WordPress plugin before 2.3.3 within the wow-company admin menu page allows to include() arbitrary file with PHP extension (as well as with data:// or http:// protocols), thus leading to CSRF RCE.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-22115 β€Ό

In Teedy, versions v1.5 through v1.9 are vulnerable to Stored Cross-Site Scripting (XSS) in the name of a created Tag. Since the Tag name is not being sanitized properly in the edit tag page, a low privileged attacker can store malicious scripts in the name of the Tag. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account Takeover of the administrator, and privileges escalation.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-24948 β€Ό

The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not validate the qvquery parameter of the tp_get_dl_post_info_ajax AJAX action, which could allow unauthenticated users to retrieve sensitive information, such as private and draft posts

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-25054 β€Ό

The WPcalc WordPress plugin through 2.1 does not sanitize user input into the 'did' parameter and uses it in a SQL statement, leading to an authenticated SQL Injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-44458 β€Ό

Linux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-25047 β€Ό

The 10Web Social Photo Feed WordPress plugin before 1.4.29 was affected by a reflected Cross-Site Scripting (XSS) vulnerability in the wdi_apply_changes admin page, allowing an attacker to perform such attack against any logged in users

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-43949 β€Ό

Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view private objects via a Broken Access Control vulnerability in the Custom Fields feature. The affected versions are before version 4.21.0.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-25043 β€Ό

The WOOCS WordPress plugin before 1.3.7.3 does not sanitise and escape the custom_prices parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-22121 β€Ό

In NocoDB, versions 0.81.0 through 0.83.8 are affected by CSV Injection vulnerability (Formula Injection). A low privileged attacker can create a new table to inject payloads in the table rows. When an administrator accesses the User Management endpoint and exports the data as a CSV file and opens it, the payload gets executed.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-0157 β€Ό

phoronix-test-suite is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-24862 β€Ό

The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-22114 β€Ό

In Teedy, versions v1.5 through v1.9 are vulnerable to Reflected Cross-Site Scripting (XSS). The Ò€œsearch term" search functionality is not sufficiently sanitized while displaying the results of the search, which can be leveraged to inject arbitrary scripts. These scripts are executed in a victimÒ€ℒs browser when they enter the crafted URL. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account Takeover of the administrator, by an unauthenticated attacker.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-24949 β€Ό

The "WP Search Filters" widget of The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not sanitise and escape the option parameter before using it in a SQL statement, which could lead to SQL injection

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-23218 β€Ό

When running with FIPS mode enabled, Mirantis Container Runtime 20.10.8 leaks memory during TLS Handshakes which could be abused to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-25051 β€Ό

The Modal Window WordPress plugin before 5.2.2 within the wow-company admin menu page allows to include() arbitrary file with PHP extension (as well as with data:// or http:// protocols), thus leading to CSRF RCE.

πŸ“– Read

via "National Vulnerability Database".
14:15
🦿 Weekly cyberattacks jumped by 50% in 2021, with a peak in December due largely to the Log4J exploit 🦿

Check Point Research said Africa had the highest amount with an average of 1,582 per week per organization. Here's how to combat the latest surge in attacks.

πŸ“– Read

via "Tech Republic".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Haveged 1.9.17 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Read

via "Packet Storm Security".
15:23
❌ URL Parsing Bugs Allow DoS, RCE, Spoofing & More ❌

Dangerous security bugs stemming from widespread inconsistencies among 16 popular third-party URL-parsing libraries could affect a wide swath of web applications.

πŸ“– Read

via "Threat Post".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-28679 β€Ό

A vulnerability in the showReports module of Zoho ManageEngine Applications Manager before build 14550 allows authenticated attackers to execute a SQL injection via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-0174 β€Ό

dolibarr is vulnerable to Business Logic Errors

πŸ“– Read

via "National Vulnerability Database".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” NCSC Outlines Tips to MItigate Commercial Surveillance πŸ”

The National Counterintelligence and Security Center (NCSC) on Friday warned about the risks posed by commercial spyware to smartphones.

πŸ“– Read

via "".
?
17:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI Warns FIN7 Campaign Delivers Ransomware via BadUSB πŸ•΄

An FBI warning says the FIN7 cybercrime group has sent packages containing malicious USB drives to US companies in an effort to spread ransomware.

πŸ“– Read

via "Dark Reading".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21666 β€Ό

Useful Simple Open-Source CMS (USOC) is a content management system (CMS) for programmers. Versions prior to Pb2.4Bfx3 allowed Sql injection in usersearch.php only for users with administrative privileges. Users should replace the file `admin/pages/useredit.php` with a newer version. USOC version Pb2.4Bfx3 contains a fixed version of `admin/pages/useredit.php`.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-29454 β€Ό

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-21408 β€Ό

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-0155 β€Ό

follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor

πŸ“– Read

via "National Vulnerability Database".
?
20:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25427 β€Ό

A Null pointer dereference vulnerability exits in MP4Box - GPAC version 0.8.0-rev177-g51a8ef874-master via the gf_isom_get_track_id function, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:14
β€Ό CVE-2022-21668 β€Ό

pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:14
β€Ό CVE-2021-35452 β€Ό

An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to a SEGV in slice.cc.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2022-21670 β€Ό

markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2022-21672 β€Ό

make-ca is a utility to deliver and manage a complete PKI configuration for workstations and servers. Starting with version 0.9 and prior to version 1.10, make-ca misinterprets Mozilla certdata.txt and treats explicitly untrusted certificates like trusted ones, causing those explicitly untrusted certificates trusted by the system. The explicitly untrusted certificates were used by some CAs already hacked. Hostile attackers may perform a MIM attack exploiting them. Everyone using the affected versions of make-ca should upgrade to make-ca-1.10, and run `make-ca -f -g` as the `root` user to regenerate the trusted store immediately. As a workaround, users may delete the untrusted certificates from /etc/pki/tls and /etc/ssl/certs manually (or by a script), but this is not recommended because the manual changes will be overwritten next time running make-ca to update the trusted anchor.

πŸ“– Read

via "National Vulnerability Database".
?
20:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Editing Crosswords Can Teach Us About Security Leadership πŸ•΄

When security leaders look for mistakes, they often find them before customers do.

πŸ“– Read

via "Dark Reading".
?
22:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36408 β€Ό

An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265.

πŸ“– Read

via "National Vulnerability Database".
22:15
β€Ό CVE-2021-36410 β€Ό

A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265.

πŸ“– Read

via "National Vulnerability Database".
22:15
β€Ό CVE-2021-36412 β€Ό

A heap-based buffer overflow vulnerability exists in MP4Box in GPAC 1.0.1 via the gp_rtp_builder_do_mpeg12_video function, which allows attackers to possibly have unspecified other impact via a crafted file in the MP4Box command,

πŸ“– Read

via "National Vulnerability Database".
22:15
β€Ό CVE-2021-36414 β€Ό

A heab-based buffer overflow vulnerability exists in MP4Box in GPAC 1.0.1 via media.c, which allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
22:15
β€Ό CVE-2021-36409 β€Ό

There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file or possibly have unspecified other impact.

πŸ“– Read

via "National Vulnerability Database".
22:15
β€Ό CVE-2021-36411 β€Ό

An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.

πŸ“– Read

via "National Vulnerability Database".
22:15
🦿 The rise of the CISO: The escalation in cyberattacks makes this role increasingly important 🦿

As the digital landscape has grown, the organizational need for cybersecurity and data protection has risen. A new study takes a look at where CISOs stand in businesses.

πŸ“– Read

via "Tech Republic".
22:18
⚠ JavaScript developer destroys own projects in supply chain β€œlesson” ⚠

Two popular open source JavaScript packages recently got "hacked" in a smbolic gesture by the original project creator.

πŸ“– Read

via "Naked Security".
22:18
⚠ Honda cars in flashback to 2002 – β€œCan’t Get You Out Of My Head” ⚠

Where were YOU on the night of 17 May 2002? And what about the day after that?

πŸ“– Read

via "Naked Security".
11 January 2022
?
08:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0144 β€Ό

shelljs is vulnerable to Improper Privilege Management

πŸ“– Read

via "National Vulnerability Database".
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Millions of Routers Exposed to RCE by USB Kernel Bug ❌

The high-severity RCE flaw is in the KCodes NetUSB kernel module, used by popular routers from Netgear, TP-Link, DLink, Western Digital, et al.

πŸ“– Read

via "Threat Post".
?
09:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ IP spoofing bug leaves Django REST applications open to DDoS, password-cracking attacks πŸ—“οΈ

Security researcher discovers how to send unlimited HTTP requests with the same client

πŸ“– Read

via "The Daily Swig".
?
10:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37195 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-45460 β€Ό

A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system ("backdoors") or cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-41769 β€Ό

A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-37197 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS is vulnerable to SQL injections. This could allow an attacker to execute arbitrary SQL statements.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-37196 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS unpacks specially crafted archive files to relative paths. This vulnerability could allow an attacker to store files in any folder accessible by the COMOS Web webservice.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-45034 β€Ό

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). The web server of the affected system allows access to logfiles and diagnostic data generated by a privileged user. An unauthenticated attacker could access the files by knowing the corresponding download links.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-45033 β€Ό

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). An undocumented debug port uses hard-coded default credentials. If this port is enabled by a privileged user, an attacker aware of the credentials could access an administrative debug shell on the affected device.

πŸ“– Read

via "National Vulnerability Database".
10:15
β€Ό CVE-2021-37198 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS uses a flawed implementation of CSRF prevention. An attacker could exploit this vulnerability to perform Cross-Site-Request-Forgery attacks.

πŸ“– Read

via "National Vulnerability Database".
?
11:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Multiple Node.js vulnerabilities fixed in flurry of new releases πŸ—“οΈ

Three medium-impact and one low severity bug have been patched

πŸ“– Read

via "The Daily Swig".
11:22
πŸ•΄ 5 Things to Know About Next-Generation SIEM πŸ•΄

NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.

πŸ“– Read

via "Dark Reading".
11:25
❌ Critical SonicWall NAC Vulnerability Stems from Apache Mods ❌

Researchers offer more detail on the bug, which can allow attackers to completely take over targets.

πŸ“– Read

via "Threat Post".
?
12:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44647 β€Ό

Lua 5.4.4 and 5.4.2 are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.

πŸ“– Read

via "National Vulnerability Database".
12:22
πŸ•΄ Why Security Awareness Training Should Begin in the C-Suite πŸ•΄

It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.

πŸ“– Read

via "Dark Reading".
12:26
❌ β€˜Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS ❌

The malware establishes initial access on targeted machines, then waits for additional code to execute.

πŸ“– Read

via "Threat Post".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ VMware Horizon under attack as China-based ransomware group targets Log4j vulnerability πŸ—“οΈ

Microsoft says cybercrime group is attempting to deploy NightSky ransomware

πŸ“– Read

via "The Daily Swig".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Faraday 3.19.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
?
13:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 9 ways that cybersecurity may change in 2022 🦿

As malicious bot activity increases and attacks surge against APIs, MFA will become more of a mandate and the CISO will take on a greater role, predicts Ping Identity CEO and founder Andre Durand.

πŸ“– Read

via "Tech Republic".
13:45
πŸ—“οΈ Growing cyber threats listed among greatest global risks in annual World Economic Forum report πŸ—“οΈ

Resilience, resilience, resilience

πŸ“– Read

via "The Daily Swig".
?
14:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Google Drive accounted for the most malware downloads from cloud storage sites in 2021 🦿

Google took over the top spot for malicious downloads from Microsoft OneDrive as attackers created free accounts, uploaded malware and shared documents with unsuspecting users, says Netskope.

πŸ“– Read

via "Tech Republic".
14:15
β€Ό CVE-2022-21669 β€Ό

PuddingBot is a group management bot. In version 0.0.6-b933652 and prior, the bot token is publicly exposed in main.py, making it accessible to malicious actors. The bot token has been revoked and new version is already running on the server. As of time of publication, the maintainers are planning to update code to reflect this change at a later date.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2020-28102 β€Ό

cscms v4.1 allows for SQL injection via the "js_del" function.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2020-28103 β€Ό

cscms v4.1 allows for SQL injection via the "page_del" function.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-0170 β€Ό

peertube is vulnerable to Improper Access Control

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-21671 β€Ό

@replit/crosis is a JavaScript client that speaks Replit's container protocol. A vulnerability that involves exposure of sensitive information exists in versions prior to 7.3.1. When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account). This was patched in version 7.3.1 by updating the address of the fallback WebSocket polling proxy to the new one. As a workaround, a user may specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`. More information about this workaround is available in the GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-43566 β€Ό

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

πŸ“– Read

via "National Vulnerability Database".
14:23
πŸ•΄ Businesses Suffered 50% More Cyberattack Attempts per Week in 2021 πŸ•΄

The rise β€” partly due to Log4j β€” helped boost cyberattack attempts to an all-time high in Q4 2021, new data shows.

πŸ“– Read

via "Dark Reading".
14:26
❌ FIN7 Mailing Malicious USB Sticks to Drop Ransomware ❌

The FBI warned that attackers are impersonating Health & Human Services and/or Amazon to mail BadUSB-poisoned USB devices to targets in transportation, insurance & defense.

πŸ“– Read

via "Threat Post".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Home routers with NetUSB support could have critical kernel hole ⚠

Got a router that supports USB access across the network? You might need a kernel update...

πŸ“– Read

via "Naked Security".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Remotely Exploitable NetUSB Flaw Puts Millions of Devices at Risk πŸ•΄

A vulnerability in a third-party component used by many networking firms puts consumer and small business routers at risk for remote exploitation.

πŸ“– Read

via "Dark Reading".
15:23
πŸ•΄ Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022 πŸ•΄

It's hard to have a crystal ball in the world of security, but if one were to make a safe prediction, it's this: Organizations will need to further integrate their cybersecurity and physical security functions throughout 2022 and beyond. So argues former chief psychologist for the US Secret Service, Dr. Marisa Randazzo, who now heads up Ontic's Center of Excellence.

πŸ“– Read

via "Dark Reading".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0129 β€Ό

Uncontrolled search path element vulnerability in McAfee TechCheck prior to 4.0.0.2 allows a local administrator to load their own Dynamic Link Library (DLL) gaining elevation of privileges to system user. This was achieved through placing the malicious DLL in the same directory that the process was run from.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2022-0173 β€Ό

radare2 is vulnerable to Out-of-bounds Read

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-38991 β€Ό

IBM AIX 7.0, 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the lscore command which could lead to code execution. IBM X-Force ID: 212953.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-29701 β€Ό

IBM Engineering Workflow Management 7.0, 7.0.1, and 7.0.2 as well as IBM Rational Team Concert 6.0.6 and 6.0.6.1 could allow an authneticated attacker to obtain sensitive information from build definitions that could aid in further attacks against the system. IBM X-Force ID: 200657.

πŸ“– Read

via "National Vulnerability Database".
?
16:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure πŸ•΄

Advisory explains how to detect, respond to, and mitigate cyberattacks from Russian state-sponsored hacking groups.

πŸ“– Read

via "Dark Reading".
16:53
πŸ•΄ Details Released on SonicWall Flaws in SMA Devices πŸ•΄

The most serious of the five vulnerabilities disclosed today can lead to unauthenticated remote code execution on affected devices.

πŸ“– Read

via "Dark Reading".
16:56
❌ WordPress Bugs Exploded in 2021, Most Exploitable ❌

Record-number WordPress plugin vulnerabilities are wicked exploitable even with low CVSS scores, leaving security teams blind to their risk.

πŸ“– Read

via "Threat Post".
?
17:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MacOS Bug Could Let Creeps Snoop On You ❌

The flaw could allow attackers to bypass Privacy preferences, giving apps with no right to access files, microphones or cameras the ability to record you or grab screenshots.

πŸ“– Read

via "Threat Post".
?
18:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43973 β€Ό

An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43974 β€Ό

An issue was discovered in SysAid ITIL 20.4.74 b10. The /enduserreg endpoint is used to register end users anonymously, but does not respect the server-side setting that determines if anonymous users are allowed to register new accounts. Configuring the server-side setting to disable anonymous user registration only hides the client-side registration form. An attacker can still post registration data to create new accounts without prior authentication.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43053 β€Ό

The Realm Server component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a difficult to exploit vulnerability that allows an unauthenticated attacker with network access to obtain the cluster secret of another application connected to the realm server. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.7.2 and below, TIBCO FTL - Developer Edition: versions 6.7.2 and below, and TIBCO FTL - Enterprise Edition: versions 6.7.2 and below.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43054 β€Ό

The eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability that allows a low privileged attacker with network access to generate API tokens that can access any other channel with arbitrary permissions. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.7.2 and below, TIBCO eFTL - Developer Edition: versions 6.7.2 and below, and TIBCO eFTL - Enterprise Edition: versions 6.7.2 and below.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-34704 β€Ό

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43971 β€Ό

A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43052 β€Ό

The Realm Server component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains an easily exploitable vulnerability that allows authentication bypass due to a hard coded secret used in the default realm server of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.7.2 and below, TIBCO FTL - Developer Edition: versions 6.7.2 and below, and TIBCO FTL - Enterprise Edition: versions 6.7.2 and below.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43972 β€Ό

An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-1573 β€Ό

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
18:16
β€Ό CVE-2021-43055 β€Ό

The eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability that allows clients to inherit the permissions of the client that initially connected on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.7.2 and below, TIBCO eFTL - Developer Edition: versions 6.7.2 and below, and TIBCO eFTL - Enterprise Edition: versions 6.7.2 and below.

πŸ“– Read

via "National Vulnerability Database".
?
19:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ β€˜Wormable’ Flaw Leads January 2022 Patch Tuesday β™ŸοΈ

Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is "wormable," meaning no human interaction would be required for an attack to spread from one vulnerable Windows box to another.

πŸ“– Read

via "Krebs on Security".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Apps Replace Web as Source for Most Malware Downloads πŸ•΄

Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows.

πŸ“– Read

via "Dark Reading".
?
20:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ FBI warns of hackers mailing malicious USB sticks to businesses πŸ“’

The FIN7 cyber crime group is alleged to be behind the months-long wave of attacks against the defence, transportation, and insurance industries

πŸ“– Read

via "ITPro".
20:17
β€Ό CVE-2022-21897 β€Ό

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21916.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21842 β€Ό

Microsoft Word Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21902 β€Ό

Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21896.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21895 β€Ό

Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21864 β€Ό

Windows UI Immersive Server API Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21912 β€Ό

DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21898.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21919 β€Ό

Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21904 β€Ό

Windows GDI Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21848 β€Ό

Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21873 β€Ό

Tile Data Repository Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21913 β€Ό

Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21839 β€Ό

Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21960 β€Ό

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21962 β€Ό

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21963.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21910 β€Ό

Microsoft Cluster Port Driver Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21907 β€Ό

HTTP Protocol Stack Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21914 β€Ό

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21885.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21906 β€Ό

Windows Defender Application Control Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21970 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21954.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2022-21894 β€Ό

Secure Boot Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21899 β€Ό

Windows Extensible Firmware Interface Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21847 β€Ό

Windows Hyper-V Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21871 β€Ό

Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21898 β€Ό

DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21912.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21900 β€Ό

Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21905.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21929 β€Ό

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21930, CVE-2022-21931.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21963 β€Ό

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21887 β€Ό

Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21882.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21875 β€Ό

Windows Storage Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21964 β€Ό

Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21911 β€Ό

.NET Framework Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21930 β€Ό

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21931.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21880 β€Ό

Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21915.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21891 β€Ό

Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21896 β€Ό

Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21902.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21834 β€Ό

Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-21893 β€Ό

Remote Desktop Protocol Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:24
πŸ•΄ Kiteworks Acquires Email Encryption Leader totemo πŸ•΄

Further closes intelligence gap inhibiting companies from tracking and controlling private content communications.

πŸ“– Read

via "Dark Reading".
20:24
πŸ•΄ Microsoft Kicks Off 2022 With 96 Security Patches πŸ•΄

Nine of the Microsoft patches released today are classified as critical, 89 are Important, and six are publicly known.

πŸ“– Read

via "Dark Reading".
?
21:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Let's Play! Raising the Stakes for Threat Modeling With Card Games πŸ•΄

On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.

πŸ“– Read

via "Dark Reading".
?
22:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0087 β€Ό

keystone is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
12 January 2022
?
02:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Who is the Network Access Broker β€˜Wazawaka?’ β™ŸοΈ

In a great many ransomware attacks, the criminals who pillage the victim's network are not the same crooks who gained the initial access to the victim organization. More commonly, the infected PC or stolen VPN credentials the gang used to break in were purchased from a cybercriminal middleman known as an initial access broker. This post examines some of the clues left behind by Wazawaka, the handle chosen by a major access broker in the Russian-speaking cybercrime scene.

πŸ“– Read

via "Krebs on Security".
?
03:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0159 β€Ό

orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
03:16
β€Ό CVE-2022-0179 β€Ό

snipe-it is vulnerable to Improper Access Control

πŸ“– Read

via "National Vulnerability Database".
?
09:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Moodle e-learning platform patches session hijack bug that led to pre-auth RCE πŸ—“οΈ

Researchers disclose second critical flaw in authentication plugin

πŸ“– Read

via "The Daily Swig".
?
10:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3852 β€Ό

growi is vulnerable to Authorization Bypass Through User-Controlled Key

πŸ“– Read

via "National Vulnerability Database".
10:25
❌ Phishers Rip Off High-Profile EA Gamers ❌

Electronic Arts blamed β€œhuman error” after attackers compromised customer support and took over and drained some of the top FIFA Ultimate Team player accounts.

πŸ“– Read

via "Threat Post".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cisco Talos discovers a new malware campaign using the public cloud to hide its tracks 🦿

The campaign was first detected in October and is using services like AWS and Azure to hide its tracks and evade detection.

πŸ“– Read

via "Tech Republic".
11:19
πŸ—“οΈ Firefox fixes fullscreen notification bypass bug that could have led to convincing phishing campaigns πŸ—“οΈ

Flurry of issues patched in web browser’s latest advisory

πŸ“– Read

via "The Daily Swig".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4080 β€Ό

crater is vulnerable to Unrestricted Upload of File with Dangerous Type

πŸ“– Read

via "National Vulnerability Database".
12:17
β€Ό CVE-2021-44648 β€Ό

GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals to 12.

πŸ“– Read

via "National Vulnerability Database".
12:17
β€Ό CVE-2021-44649 β€Ό

Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.

πŸ“– Read

via "National Vulnerability Database".
12:17
β€Ό CVE-2021-44650 β€Ό

Zoho ManageEngine M365 Manager Plus before Build 4419 allows remote command execution when updating proxy settings through the Admin ProxySettings and Tenant ProxySettings components.

πŸ“– Read

via "National Vulnerability Database".
12:20
⚠ Home routers with NetUSB support could have critical kernel hole ⚠

Got a router that supports USB access across the network? You might need a kernel update...

πŸ“– Read

via "Naked Security".
12:20
⚠ JavaScript developer destroys own projects in supply chain β€œlesson” ⚠

Two popular open source JavaScript packages recently got "hacked" in a symbolic gesture by the original project creator.

πŸ“– Read

via "Naked Security".
12:23
πŸ•΄ Patch Management Today: A Risk-Based Strategy to Defeat Cybercriminals πŸ•΄

By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.

πŸ“– Read

via "Dark Reading".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Patch Tuesday: Web security issues in the spotlight in Microsoft’s bumper January update πŸ—“οΈ

β€˜Wormable’ flaw in HTTP Protocol Stack causes concern

πŸ“– Read

via "The Daily Swig".
12:55
πŸ›  Proxmark3 4.14831 πŸ› 

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed Frostbit.

πŸ“– Read

via "Packet Storm Security".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Cybersecurity conferences 2022: A rundown of online, in person, and β€˜hybrid’ events πŸ—“οΈ

With many events choosing to retain virtual elements forced on them by the pandemic, there’s now an abundance of online content to choose from

πŸ“– Read

via "The Daily Swig".
13:49
⚠ Wormable Windows HTTP hole – what you need to know ⚠

One bug in the January 2022 Patch Tuesday list is getting lots of attention: "HTTP Protocol Stack Remote Code Execution Vulnerability".

πŸ“– Read

via "Naked Security".
?
14:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44651 β€Ό

Zoho ManageEngine CloudSecurityPlus before Build 4117 allows remote code execution through the updatePersonalizeSettings component due to an improper security patch for CVE-2021-40175.

πŸ“– Read

via "National Vulnerability Database".
14:17
β€Ό CVE-2021-44652 β€Ό

Zoho ManageEngine O365 Manager Plus before Build 4416 allows remote code execution via BCP file overwrite through the ChangeDBAPI component.

πŸ“– Read

via "National Vulnerability Database".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 US government urges organizations to prepare for Russian-sponsored cyber threats 🦿

Though the feds don't cite any specific threat, a joint advisory from CISA, the FBI and the NSA offers advice on how to detect and mitigate cyberattacks sponsored by Russia.

πŸ“– Read

via "Tech Republic".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Critical Infrastructure Security and a Case for Optimism in 2022 πŸ•΄

The new US infrastructure law will fund new action to improve cybersecurity across rail, public transportation, the electric grid, and manufacturing.

πŸ“– Read

via "Dark Reading".
15:24
❌ New York AG Warns 17 Firms of Credential Attacks ❌

Sponsored: Password security is highlighted in attorney general warning to New York state businesses.

πŸ“– Read

via "Threat Post".
?
16:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0015 β€Ό

A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-45388 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-45608. Reason: This candidate is a reservation duplicate of CVE-2021-45608. Notes: All CVE users should reference CVE-2021-45608 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-43436 β€Ό

MartDevelopers Inc iResturant v1.0 allows Stored XSS by placing a payload in the username field during a login attempt. When an administrator looks at the log of failed logins, the XSS payload will be executed.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-45411 β€Ό

In Sourcecodetester Printable Staff ID Card Creator System 1.0 after compromising the database via SQLi, an attacker can log in and leverage an arbitrary file upload vulnerability to obtain remote code execution.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-45445 β€Ό

Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 has an Infinite Loop.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-28377 β€Ό

ChronoForums 2.0.11 allows av Directory Traversal to read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-28376 β€Ό

ChronoForms 7.0.7 allows fname Directory Traversal to read arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0012 β€Ό

An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0013 β€Ό

A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0014 β€Ό

An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-38892 β€Ό

IBM Planning Analytics 2.0 and IBM Planning Analytics Workspace 2.0 DQM API allows submitting of all control requests in unauthenticated sessions. This allows a remote threat actor who can access (without previous authentication) a valid PA endpoint to read and write files to the IBM Planning Analytics system. Depending on file system permissions up to path traversal and possibly remote code execution. IBM X-Force ID: 209511.

πŸ“– Read

via "National Vulnerability Database".
16:24
πŸ•΄ Flashpoint Acquires Risk Based Security πŸ•΄

Flashpoint plans to integrate Risk Based Security data and technology into its platform to boost threat intelligence and vulnerability management.

πŸ“– Read

via "Dark Reading".
?
16:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Stolen TikTok Videos, Bent on Fraud, Invade YouTube Shorts ❌

Scammers easily game YouTube Shorts with viral TikTok content, bilking both creators and users.

πŸ“– Read

via "Threat Post".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21676 β€Ό

Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix has been released for each major branch, namely `4.1.2` for the `4.x.x` branch, `5.2.1` for the `5.x.x` branch, and `6.1.1` for the `6.x.x` branch. There is no known workaround except upgrading to a safe version.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-42561 β€Ό

An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23116 β€Ό

Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-42558 β€Ό

An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23109 β€Ό

Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-20615 β€Ό

Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23108 β€Ό

Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-21675 β€Ό

Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA "Zip Slip"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victimΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s machine. The impact of a Zip Slip vulnerability would allow an attacker to create or overwrite existing files on the filesystem. In the context of a web application, a web shell could be placed within the application directory to achieve code execution. All users should upgrade to BCV v2.11.0 when possible to receive a patch. There are no recommended workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-20613 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23113 β€Ό

Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-20618 β€Ό

A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-36417 β€Ό

A heap-based buffer overflow vulnerability exists in GPAC v1.0.1 in the gf_isom_dovi_config_get function in MP4Box, which causes a denial of service or execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-42559 β€Ό

An issue was discovered in CALDERA 2.8.1. It contains multiple startup "requirements" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23106 β€Ό

Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-43960 β€Ό

** DISPUTED ** Lorensbergs Connect2 3.13.7647.20190 is affected by an XSS vulnerability. Exploitation requires administrator privileges and is performed through the Wizard editor of the application. The attack requires an administrator to go into the Wizard editor and enter an XSS payload within the Page title, Page Instructions, Text before, Text after, or Text on side box. Once this has been done, the administrator must click save and finally wait until any user of the application performs a booking for rental items in the booking area of the application, where the XSS triggers. NOTE: another perspective is that the administrator may require JavaScript to customize any aspect of the page rendering. There is no effective way for the product to defend users in the face of a malicious administrator.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23112 β€Ό

A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23107 β€Ό

Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2022-23110 β€Ό

Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-42560 β€Ό

An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.).

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-45449 β€Ό

Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the userÒ€ℒs local files.

πŸ“– Read

via "National Vulnerability Database".
18:25
❌ Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft ❌

Most Windows versions are at risk of remote, unprivileged attackers abusing RDP from the inside to hijack smart cards and get unauthorized file system access.

πŸ“– Read

via "Threat Post".
18:25
❌ Amazon, Azure Clouds Host RAT-ty Trio in Infostealing Campaign ❌

A cloudy campaign delivers commodity remote-access trojans to steal information and execute code.

πŸ“– Read

via "Threat Post".
?
19:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Research Reveals Public-Sector IAM Weaknesses and Priorities πŸ•΄

Auth0 Public Sector Index shows that governments are struggling to provide trustworthy online citizen services.

πŸ“– Read

via "Dark Reading".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Oxeye Introduce Open Source Payload Deobfuscation Tool πŸ•΄

Ox4Shell exposes hidden payloads thatare actively being used to confuse security protection tools and security teams.

πŸ“– Read

via "Dark Reading".
?
20:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37529 β€Ό

A double-free vulnerability exists in fig2dev through 3.28a is affected by: via the free_stream function in readpics.c, which could cause a denial of service (context-dependent).

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-40565 β€Ό

A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-40566 β€Ό

A Segmentation fault casued by heap use after free vulnerability exists in Gpac through 1.0.1 via the mpgviddmx_process function in reframe_mpgvid.c when using mp4box, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-37530 β€Ό

A denial of service vulnerabiity exists in fig2dev through 3.28a due to a segfault in the open_stream function in readpics.c.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-40559 β€Ό

A null pointer deference vulnerability exists in gpac through 1.0.1 via the naludmx_parse_nal_avc function in reframe_nalu, which allows a denail of service.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-43860 β€Ό

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-40564 β€Ό

A Segmentation fault caused by null pointer dereference vulnerability eists in Gpac through 1.0.2 via the avc_parse_slice function in av_parsers.c when using mp4box, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-40563 β€Ό

A Segmentation fault exists casued by null pointer dereference exists in Gpac through 1.0.1 via the naludmx_create_avc_decoder_config function in reframe_nalu.c when using mp4box, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-40562 β€Ό

A Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
?
22:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Wormable Windows HTTP hole – what you need to know ⚠

One bug in the January 2022 Patch Tuesday list is getting lots of attention: "HTTP Protocol Stack Remote Code Execution Vulnerability".

πŸ“– Read

via "Naked Security".
13 January 2022
?
03:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0197 β€Ό

phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2022-0196 β€Ό

phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
?
10:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-30307 β€Ό

Possible denial of service due to improper validation of DNS response when DNS client requests with PTR, NAPTR or SRV query type in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30319 β€Ό

Possible integer overflow due to improper validation of command length parameters while processing WMI command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30301 β€Ό

Possible denial of service due to out of memory while processing RRC and NAS OTA message in Snapdragon Auto, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30330 β€Ό

Possible null pointer dereference due to improper validation of APE clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30300 β€Ό

Possible denial of service due to incorrectly decoding hex data for the SIB2 OTA message and assigning a garbage value to choice when processing the SRS configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30285 β€Ό

Improper validation of memory region in Hypervisor can lead to incorrect region mapping in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30314 β€Ό

Lack of validation for third party application accessing the service can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30313 β€Ό

Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30308 β€Ό

Possible buffer overflow while printing the HARQ memory partition detail due to improper validation of buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30311 β€Ό

Possible heap overflow due to lack of index validation before allocating and writing to heap buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30287 β€Ό

Possible assertion due to improper validation of symbols configured for PDCCH monitoring in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:18
β€Ό CVE-2021-30353 β€Ό

Improper validation of function pointer type with actual function signature can lead to assertion in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:25
πŸ•΄ Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw πŸ•΄

In this Tech Tip, SANS Institute’s Johannes Ullrich suggests using PowerShell to identify Windows systems affected by the newly disclosed vulnerability in http.sys.

πŸ“– Read

via "Dark Reading".
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe Cloud Abused to Steal Office 365, Gmail Credentials ❌

Threat actors are creating accounts within the Adobe Cloud suite and sending images and PDFs that appear legitimate to target Office 365 and Gmail users, researchers from Avanan discovered.

πŸ“– Read

via "Threat Post".
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking πŸ•΄

The vulnerability was patched this week in Microsoft's set of security updates for January 2022.

πŸ“– Read

via "Dark Reading".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Generation cyber: How diversity and ageism can impact the IT workforce πŸ—“οΈ

Report claims generational attitudes can help or hinder the industry

πŸ“– Read

via "The Daily Swig".
12:17
β€Ό CVE-2021-23514 β€Ό

This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server.

πŸ“– Read

via "National Vulnerability Database".
12:17
β€Ό CVE-2021-45806 β€Ό

jpress v4.2.0 admin panel provides a function through which attackers can modify the template and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
12:25
❌ New GootLoader Campaign Targets Accounting, Law Firms ❌

GootLoader hijacks WordPress sites to lure professionals to download malicious sample contract templates.

πŸ“– Read

via "Threat Post".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript] ⚠

Latest episode -listen to it or read it now!

πŸ“– Read

via "Naked Security".
12:55
πŸ•΄ Redefining the CISO-CIO Relationship πŸ•΄

While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.

πŸ“– Read

via "Dark Reading".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ GitLab shifts left to patch high-impact vulnerabilities πŸ—“οΈ

HackerOne bug bounty reports triaged

πŸ“– Read

via "The Daily Swig".
?
14:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Clam AntiVirus Toolkit 0.104.2 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
14:18
β€Ό CVE-2021-23824 β€Ό

This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:18
β€Ό CVE-2022-23131 β€Ό

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

πŸ“– Read

via "National Vulnerability Database".
14:18
β€Ό CVE-2022-23132 β€Ό

During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level

πŸ“– Read

via "National Vulnerability Database".
14:18
β€Ό CVE-2022-23133 β€Ό

An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.

πŸ“– Read

via "National Vulnerability Database".
14:18
β€Ό CVE-2021-40327 β€Ό

Trusted Firmware-M (TF-M) 1.4.0, when Profile Small is used, has incorrect access control. NSPE can access a secure key (held by the Crypto service) based solely on knowledge of its key ID. For example, there is no authorization check associated with the relationship between a caller and a key owner.

πŸ“– Read

via "National Vulnerability Database".
14:18
β€Ό CVE-2022-23134 β€Ό

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

πŸ“– Read

via "National Vulnerability Database".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 New study reveals phishing simulations might not be effective in training users 🦿

A new study at unprecedented scale revealed that embedded phishing training in simulations run by organizations doesn't work well. Yet crowd-sourcing phishing detection is.

πŸ“– Read

via "Tech Republic".
14:56
❌ US Military Ties Prolific MuddyWater Cyberespionage APT to Iran ❌

US Cyber Command linked the group to Iranian intelligence and detailed its multi-pronged, increasingly sophisticated suite of malware tools.

πŸ“– Read

via "Threat Post".
?
15:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Cybercriminals Are Cashing in on the Culture of 'Yes' πŸ•΄

The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.

πŸ“– Read

via "Dark Reading".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Vulnerabilities Highlight Risks of Trust in Public Cloud πŸ•΄

Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.

πŸ“– Read

via "Dark Reading".
?
16:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22123 β€Ό

In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article title. An authenticated attacker can inject arbitrary javascript code that will execute on a victimÒ€ℒs server.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-40567 β€Ό

Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-40570 β€Ό

The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-40568 β€Ό

A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-22125 β€Ό

In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article tag. An authenticated admin attacker can inject arbitrary javascript code that will execute on a victimÒ€ℒs server.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-22124 β€Ό

In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the profile image. An authenticated attacker can upload a carefully crafted SVG file that will trigger arbitrary javascript to run on a victimÒ€ℒs browser.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-39056 β€Ό

The IBM i 7.1, 7.2, 7.3, and 7.4 Extended Dynamic Remote SQL server (EDRSQL) could allow a remote authenticated user to send a specially crafted request and cause a denial of service. IBM X-Force ID: 214537.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-40813 β€Ό

A cross-site scripting (XSS) vulnerability in the "Zip content" feature in Element-IT HTTP Commander 3.1.9 allows remote authenticated users to inject arbitrary web script or HTML via filenames.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-40571 β€Ό

The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-40569 β€Ό

The binary MP4Box in Gpac through 1.0.1 has a double-free vulnerability in the iloc_entry_del funciton in box_code_meta.c, which allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-22122 β€Ό

In Mattermost Focalboard, versions prior to v0.7.5, v0.8.4, v0.9.5, v0.10.1 and v0.11.0-rc1; as used respectively in Mattermost, versions prior to v5.37.6, v5.39.3, v6.0.4, v6.1.1 and v6.2.0, are vulnerable to Insufficient Session Expiration. When a user initiates a logout, their session is not invalidated properly. In addition, user sessions are stored in the browserÒ€ℒs local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, to completely take over a victim account.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-21678 β€Ό

Discourse is an open source discussion platform. Prior to version 2.8.0.beta11 in the `tests-passed` branch, version 2.8.0.beta11 in the `beta` branch, and version 2.7.13 in the `stable` branch, the bios of users who made their profiles private were still visible in the `<meta>` tags on their users' pages. The problem is patched in `tests-passed` version 2.8.0.beta11, `beta` version 2.8.0.beta11, and `stable` version 2.7.13 of Discourse.

πŸ“– Read

via "National Vulnerability Database".
?
18:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ North Korean APTs Stole ~$400M in Crypto in 2021 ❌

Meanwhile, EtherumMax got sued over an alleged pump-and-dump scam after using celebs like Floyd Mayweather Jr. & Kim Kardashian to promote EMAX Tokens.

πŸ“– Read

via "Threat Post".
?
18:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” US Chamber of Commerce Calls for National Privacy Legislation πŸ”

Yet another industry group - the U.S. Chamber of Commerce - has called on Congress to pass comprehensive privacy legislation.

πŸ“– Read

via "".
?
19:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fighting Back Against Pegasus, Other Advanced Mobile Malware πŸ•΄

Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.

πŸ“– Read

via "Dark Reading".
19:26
πŸ•΄ How to Protect Your Phone from Pegasus and Other APTs πŸ•΄

The good news is that you can take steps to avoid advanced persistent threats. The bad news is that it might cost you iMessage. And FaceTime.

πŸ“– Read

via "Dark Reading".
19:26
πŸ•΄ BlueNoroff Threat Group Targets Cryptocurrency Startups πŸ•΄

A series of attacks against small and medium-sized businesses has led to major cryptocurrency losses for the victims.

πŸ“– Read

via "Dark Reading".
?
20:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-34875 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14827.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34879 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14832.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34942 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15041.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34874 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14736.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-45058 β€Ό

Adobe InDesign version 16.4 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious JPEG file.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34882 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14835.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34919 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14897.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34892 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14845.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34899 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14866.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34907 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14880.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34893 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14846.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-45056 β€Ό

Adobe InCopy version 16.4 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34937 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14915.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-43765 β€Ό

AEM's Cloud Service offering, as well as version 6.5.10.0 (and below) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victimÒ€ℒs browser when they browse to the page containing the vulnerable field.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34904 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14877.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34912 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14885.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2022-22991 β€Ό

A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34900 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14867.

πŸ“– Read

via "National Vulnerability Database".
20:18
β€Ό CVE-2021-34888 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14841.

πŸ“– Read

via "National Vulnerability Database".
20:19
β€Ό CVE-2021-34914 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. Crafted data in a DGN file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14892.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-34980 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. When parsing the SOAP_LOGIN_TOKEN environment variable, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14107.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-40722 β€Ό

AEM Forms Cloud Service offering, as well as version 6.5.10.0 (and below) are affected by an XML External Entity (XXE) injection vulnerability that could be abused by an attacker to achieve RCE.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-34993 β€Ό

This vulnerability allows remote attackers to bypass authentication on affected installations of Commvault CommCell 11.22.22. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CVSearchService service. The issue results from the lack of proper validation prior to authentication. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-13706.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-34910 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14883.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34902 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14875.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34884 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14837.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34944 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15052.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-45057 β€Ό

Adobe InDesign version 16.4 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious JPEG2000 file.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34935 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14913.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34927 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14905.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34908 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14881.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-43764 β€Ό

AEM's Cloud Service offering, as well as version 6.5.10.0 (and below) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victimÒ€ℒs browser when they browse to the page containing the vulnerable field.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34916 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14894.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34978 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34885 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14838.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-45054 β€Ό

Adobe InCopy version 16.4 (and earlier) is affected by a use-after-free vulnerability in the processing of a JPEG2000 file that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34911 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14884.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34917 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14895.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34934 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14912.

πŸ“– Read

via "National Vulnerability Database".
20:24
β€Ό CVE-2021-34901 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14874.

πŸ“– Read

via "National Vulnerability Database".
20:27
❌ Microsoft Yanks Buggy Windows Server Updates ❌

Since their release on Patch Tuesday, the updates have been breaking Windows, causing spontaneous boot loops on Windows domain controller servers, breaking Hyper-V and making ReFS volume systems unavailable.

πŸ“– Read

via "Threat Post".
20:30
β€Ό CVE-2021-34877 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14829.

πŸ“– Read

via "National Vulnerability Database".
20:30
β€Ό CVE-2022-22989 β€Ό

My Cloud OS 5 was vulnerable to a pre-authenticated stack overflow vulnerability on the FTP service. Addressed the vulnerability by adding defenses against stack overflow issues.c

πŸ“– Read

via "National Vulnerability Database".
20:30
β€Ό CVE-2021-34933 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14911.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2021-34997 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the AppStudioUploadHandler class. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE. Was ZDI-CAN-13894.

πŸ“– Read

via "National Vulnerability Database".
?
22:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0178 β€Ό

snipe-it is vulnerable to Improper Access Control

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2021-45760 β€Ό

GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_list_last(). This vulnerability allows attackers to cause a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
14 January 2022
?
08:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23218 β€Ό

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
08:19
β€Ό CVE-2021-42551 β€Ό

Cross-site Scripting (XSS) vulnerability in the search functionality of AlCoda NetBiblio WebOPAC allows an unauthenticated user to craft a reflected Cross-Site Scripting attack. This issue affects: AlCoda NetBiblio WebOPAC versions prior to 4.0.0.320; versions later than 4.0.0.328. This issue does not affect: AlCoda NetBiblio WebOPAC version 4.0.0.335 and later versions.

πŸ“– Read

via "National Vulnerability Database".
08:19
β€Ό CVE-2022-23222 β€Ό

kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.

πŸ“– Read

via "National Vulnerability Database".
08:19
β€Ό CVE-2022-23219 β€Ό

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
08:19
β€Ό CVE-2022-20698 β€Ό

A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
?
10:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-33962 β€Ό

China Mobile An Lianbao WF-1 router v1.0.1 is affected by an OS command injection vulnerability in the web interface /api/ZRUsb/pop_usb_device component.

πŸ“– Read

via "National Vulnerability Database".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript] ⚠

Latest episode -listen to it or read it now!

πŸ“– Read

via "Naked Security".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Three Plugins with Same Bug Put 84K WordPress Sites at Risk ❌

Researchers discovered vulnerabilities that can allow for full site takeover in login and e-commerce add-ons for the popular website-building platform.

πŸ“– Read

via "Threat Post".
11:50
⚠ REvil ransomware crew allegedly busted in Russia, says FSB ⚠

The Russian Federal Security Bureau has just published a report about the investigation and arrest of the infamous "REvil" ransomware crew.

πŸ“– Read

via "Naked Security".
11:56
❌ Russian Security Takes Down REvil Ransomware Gang ❌

The country's FSB said that it raided gang hideouts; seized currency, cars and personnel; and neutralized REvil's infrastructure.

πŸ“– Read

via "Threat Post".
?
12:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Apache Software Foundation warns its patching efforts are being undercut by use of end-of-life software πŸ—“οΈ

Non-profit shares metrics in its latest annual security review of 350-plus projects

πŸ“– Read

via "The Daily Swig".
12:21
β€Ό CVE-2022-0213 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
12:27
πŸ•΄ What's Next for Patch Management: Automation πŸ•΄

The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.

πŸ“– Read

via "Dark Reading".
?
13:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites ❌

As Moscow moves troops and threatens military action, about 70 Ukrainian government sites were hit. β€œBe afraid” was scrawled on the Foreign Ministry site.

πŸ“– Read

via "Threat Post".
?
13:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Researcher discloses alleged zero-day vulnerabilities in NUUO NVRmini2 recording device πŸ—“οΈ

Exploit code has also been released for flaws that supposedly date back to 2016

πŸ“– Read

via "The Daily Swig".
14:01
❌ Real Big Phish: Mobile Phishing & Managing User Fallibility ❌

Phishing is more successful than ever. Daniel Spicer, CSO of Ivanti, discusses emerging trends in phishing, and using zero-trust security to patch the human vulnerabilities underpinning the spike.

πŸ“– Read

via "Threat Post".
14:01
❌ Critical Cisco Contact Center Bug Threatens Customer-Service Havoc ❌

Attackers could access and modify agent resources, telephone queues and other customer-service systems – and access personal information on companies’ customers.

πŸ“– Read

via "Threat Post".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-32650 β€Ό

October CMS is a self-hosted content management system (CMS) platform based on the Laravel PHP Framework. Prior to versions 1.0.473 and 1.1.6, an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates.The issue has been patched in Build 473 (v1.0.473) and v1.1.6. Those unable to upgrade may apply the patch to their installation manually as a workaround.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-32649 β€Ό

October CMS is a self-hosted content management system (CMS) platform based on the Laravel PHP Framework. Prior to versions 1.0.473 and 1.1.6, an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup. The issue has been patched in Build 473 (v1.0.473) and v1.1.6. Those unable to upgrade may apply the patch to their installation manually as a workaround.

πŸ“– Read

via "National Vulnerability Database".
?
14:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 7 obstacles that organizations face migrating legacy data to the cloud 🦿

Some of the major obstacles center on concerns about compliance, fears about security and infrastructure and uncertainty about budget requirements, says Archive360.

πŸ“– Read

via "Tech Republic".
14:56
❌ Top Illicit Carding Marketplace UniCC Abruptly Shuts Down   ❌

UniCC controlled 30 percent of the stolen payment-card data market; leaving analysts eyeing what’s next.

πŸ“– Read

via "Threat Post".
14:56
πŸ•΄ White House Meets With Software Firms and Open Source Orgs on Security πŸ•΄

The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.

πŸ“– Read

via "Dark Reading".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security: Linux full-disk encryption bug fixed – patch now! ⚠

Imagine if someone who didn't have your password could sneakily modify data that was encrypted with it.

πŸ“– Read

via "Naked Security".
15:27
πŸ•΄ Maryland Dept. of Health Responds to Ransomware Attack πŸ•΄

An attack discovered on Dec. 4, 2021, forced the Maryland Department of Health to take some of its systems offline.

πŸ“– Read

via "Dark Reading".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Russia arrests REvil ransomware gang members at request of US officials 🦿

Russia's Federal Security Service said that 14 people were arrested and millions in currency has been seized.

πŸ“– Read

via "Tech Republic".
16:50
β€Ό CVE-2020-13715 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13721 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13042 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-12945 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13742 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13741 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13049 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13743 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13080 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13747 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-12918 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13047 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-12953 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-12908 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13072 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13016 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13012 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13014 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-12948 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:50
β€Ό CVE-2020-13083 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-12950 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13739 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13085 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13058 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-12942 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13736 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-12949 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13053 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2021-36734 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13720 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13020 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13735 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13045 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13022 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13752 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13075 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13077 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13746 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13738 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:54
β€Ό CVE-2020-13733 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-12947 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-13731 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-13076 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-13084 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2021-36736 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-12958 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
πŸ” Friday Five 1/14 πŸ”

Russia cracks down on the REvil ransomware gang, $400 million in cryptocurrency stolen, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
17:00
β€Ό CVE-2020-13021 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-13748 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-13032 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:00
β€Ό CVE-2020-13028 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-12937 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2022-21677 β€Ό

Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13723 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13031 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13065 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13051 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13089 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13719 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2022-21680 β€Ό

Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13716 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13027 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-12952 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13052 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:03
β€Ό CVE-2020-13063 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-39622 β€Ό

In GBoard, there is a possible way to bypass Factory Reset Protection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-192663648

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-46021 β€Ό

An Use-After-Free vulnerability in rec_record_destroy() at rec-record.c of GNU Recutils v1.8.90 can lead to a segmentation fault or application crash.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-45060 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44741 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44711 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-43752 β€Ό

Adobe Illustrator versions 25.4.2 (and earlier) and 26.0.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-45778 β€Ό

A NULL pointer dereference in setnmap() at cmds.c of GNU Inetutils v2.2.16-cf091 can lead to a segmentation fault or application crash.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-39684 β€Ό

In target_init of gs101/abl/target/slider/target.c, there is a possible allocation of RWX memory due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-203250788References: N/A

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-46019 β€Ό

An untrusted pointer dereference in rec_db_destroy() at rec-db.c of GNU Recutils v1.8.90 can lead to a segmentation fault or application crash.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-23566 β€Ό

The package nanoid before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-45064 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-38126 β€Ό

Potential vulnerabilities have been identified in Micro Focus ArcSight Enterprise Security Manager, affecting versions 7.4.x and 7.5.x. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44712 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Access of Memory Location After End of Buffer vulnerability that could lead to application denial-of-service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44707 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44715 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-39623 β€Ό

In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-39634 β€Ό

In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2022-0130 β€Ό

Tenable.sc versions 5.14.0 through 5.19.1 were found to contain a remote code execution vulnerability which could allow a remote, unauthenticated attacker to execute code under special circumstances. An attacker would first have to stage a specific file type in the web server root of the Tenable.sc host prior to remote exploitation.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-45773 β€Ό

A NULL pointer dereference in CS104_IPAddress_setFromString at src/iec60870/cs104/cs104_slave.c of lib60870 commit 0d5e76e can lead to a segmentation fault or application crash.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-39681 β€Ό

In delete_protocol of main.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200251074References: N/A

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-23138 β€Ό

WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-39626 β€Ό

In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-0959 β€Ό

In jit_memory_region.cc, there is a possible bypass of memory restrictions due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-200284993

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-21137 β€Ό

Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-45775 β€Ό

GNU Inetutils 2.2.16-cf091 was discovered to contain an infinite loop in domacro at domacro.c.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-45769 β€Ό

A NULL pointer dereference in AcseConnection_parseMessage at src/mms/iso_acse/acse.c of libiec61850 v1.5.0 can lead to a segmentation fault or application crash.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-45779 β€Ό

A NULL pointer dereference in unsetcmd() at inetutils/telnet/commands.c of GNU Inetutils v2.2.16-cf091 can lead to a segmentation fault or application crash.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-23157 β€Ό

WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-39621 β€Ό

In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-45068 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-45763 β€Ό

GPAC v1.1.0 was discovered to contain an invalid call in the function gf_node_changed(). This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-44743 β€Ό

Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-1035 β€Ό

In setLaunchIntent of BluetoothDevicePickerPreferenceController.java, there is a possible way to invoke an arbitrary broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-12Android ID: A-195668284

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-22290 β€Ό

Incorrect download source UI in Downloads in Samsung Internet prior to 16.0.6.23 allows attackers to perform domain spoofing via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-28506 β€Ό

An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-28500 β€Ό

An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA APIÒ€ℒs by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-39627 β€Ό

In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-42067 β€Ό

In SAP NetWeaver AS for ABAP and ABAP Platform - versions 701, 702, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 786, an attacker authenticated as a regular user can use the S/4 Hana dashboard to reveal systems and services which they would not normally be allowed to see. No information alteration or denial of service is possible.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-46195 β€Ό

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

πŸ“– Read

via "National Vulnerability Database".
18:24
β€Ό CVE-2021-44703 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a stack buffer overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2021-20612 β€Ό

Lack of administrator control over security vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.14 and prior, FX3U-ENET-L Firmware version 1.14 and prior and FX3U-ENET-P502 Firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product or other unspecified effects by sending specially crafted packets to an unnecessary opening of TCP port. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2021-44739 β€Ό

Acrobat Reader DC ActiveX Control versions 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2021-39618 β€Ό

In multiple methods of EuiccNotificationManager.java, there is a possible way to install existing packages without user consent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196855999

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2021-39630 β€Ό

In executeRequest of OverlayManagerService.java, there is a possible way to control fabricated overlays from adb shell due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-202768292

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2021-44704 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
?
18:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Cybersecurity Measures CTOs Are Actually Implementing πŸ•΄

Companies look to multifactor authentication and identity and access management to block attacks, but hedge their bets with disaster recovery.

πŸ“– Read

via "Dark Reading".
?
19:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russia Takes Down REvil Ransomware Operation, Arrests Key Members πŸ•΄

Timing of the move has evoked at least some skepticism from security experts about the country's true motives.

πŸ“– Read

via "Dark Reading".
?
20:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ At Request of U.S., Russia Rounds Up 14 REvil Ransomware Affiliates β™ŸοΈ

The Russian government said today it arrested 14 people accused of working for "REvil," a particularly aggressive ransomware group that has extorted hundreds of millions of dollars from victim organizations. The Russian Federal Security Service (FSB) said the actions were taken in response to a request from U.S. officials, but many experts believe the crackdown is part of an effort to reduce tensions over Russian President Vladimir Putin's decision to station 100,000 troops along the nation's border with Ukraine.

πŸ“– Read

via "Krebs on Security".
20:19
β€Ό CVE-2021-46168 β€Ό

Spin v6.5.1 was discovered to contain an out-of-bounds write in lex() at spinlex.c.

πŸ“– Read

via "National Vulnerability Database".
20:19
β€Ό CVE-2021-46169 β€Ό

Modex v2.11 was discovered to contain an Use-After-Free vulnerability via the component tcache.

πŸ“– Read

via "National Vulnerability Database".
20:19
β€Ό CVE-2021-46171 β€Ό

Modex v2.11 was discovered to contain a NULL pointer dereference in set_create_id() at xtract.c.

πŸ“– Read

via "National Vulnerability Database".
20:19
β€Ό CVE-2021-46170 β€Ό

An issue was discovered in JerryScript commit a6ab5e9. There is an Use-After-Free in lexer_compare_identifier_to_string in js-lexer.c file.

πŸ“– Read

via "National Vulnerability Database".
15 January 2022
?
00:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Microsoft takes aim at critical RCE flaws with "massive" Patch Tuesday update πŸ“’

Microsoft has kicked off 2022 with a score of security fixes for critical-rated vulnerabilities in some of the most widely used products used by businesses around the world

πŸ“– Read

via "ITPro".
00:15
πŸ“’ Cyber attacks on corporate networks increased 50% in 2021 πŸ“’

Check Point data reveals an upward trend of malicious activity since mid-2020

πŸ“– Read

via "ITPro".
00:15
πŸ“’ Google Drive accounted for the most malware downloads in 2021 πŸ“’

NetSkope research malware downloaded via cloud apps is now more prevalent than web-delivered malware

πŸ“– Read

via "ITPro".
00:15
πŸ“’ QNAP warns of ransomware targeting internet-facing NAS products πŸ“’

The manufacturer has provided a guide to securing vulnerable products amid ongoing attacks

πŸ“– Read

via "ITPro".
00:15
πŸ“’ Open source in open rebellion - can Google bring peace to the developer community? πŸ“’

A recent White House gathering exposes divisions between the open source community and the private companies that exploit it

πŸ“– Read

via "ITPro".
00:15
πŸ“’ US gov issues fresh warning over Russian threat to critical infrastructure πŸ“’

The FBI, NSA and CISA have urged network defenders to be on "heightened alert" for Russian cyber attacks

πŸ“– Read

via "ITPro".
00:16
πŸ“’ NetUSB flaw exposes millions of routers to remote code execution πŸ“’

The vulnerability impacts devices from Netgear, TP-Link, D-Link, and Western Digital

πŸ“– Read

via "ITPro".
00:16
πŸ“’ Five giveaways that show an email is a phishing attack πŸ“’

One of the biggest problems in cyber security is the phishing email

πŸ“– Read

via "ITPro".
00:16
πŸ“’ Ransomware is being rewritten in Go for joint attacks on Windows, Linux users πŸ“’

The Google-created programming language has become increasingly popular in the malware community for its speed and effectiveness in targeting more users with the same code base

πŸ“– Read

via "ITPro".
00:16
πŸ“’ Ukraine government and embassies hit by "massive" cyber attacks πŸ“’

Russia is said to be most-likely behind the attacks as tensions between the two countries increases

πŸ“– Read

via "ITPro".
00:16
πŸ“’ How to build a zero trust model πŸ“’

Threats are becoming greater and more diverse, but having a zero trust architecture could help your business defend its infrastructure

πŸ“– Read

via "ITPro".
00:16
πŸ“’ Nearly half of all Log4j downloads remain critically vulnerable πŸ“’

The findings come as the US threatens legal action against those who fail to patch to the latest versions of the popular Java library

πŸ“– Read

via "ITPro".
00:16
πŸ“’ El Salvador becomes latest target of Pegasus spyware πŸ“’

The list of nations with access to Pegasus is growing, with evidence pointing to potential links between 35 confirmed Pegasus cases and the Salvadoran government

πŸ“– Read

via "ITPro".
?
03:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23094 β€Ό

Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.

πŸ“– Read

via "National Vulnerability Database".
03:20
β€Ό CVE-2021-24044 β€Ό

By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.

πŸ“– Read

via "National Vulnerability Database".
?
14:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44049 β€Ό

CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory.

πŸ“– Read

via "National Vulnerability Database".
14:50
β€Ό CVE-2022-23178 β€Ό

An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.

πŸ“– Read

via "National Vulnerability Database".
14:50
β€Ό CVE-2022-23095 β€Ό

Open Design Alliance Drawings SDK before 2022.12.1 mishandles the loading of JPG files. Unchecked input data from a crafted JPG file leads to memory corruption. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-33828 β€Ό

The files_antivirus component before 1.0.0 for ownCloud mishandles the protection mechanism by which malicious files (that have been uploaded to a public share) are supposed to be deleted upon detection.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-44537 β€Ό

ownCloud owncloud/client before 2.9.2 allows Resource Injection by a server into the desktop client via a URL, leading to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2021-33827 β€Ό

The files_antivirus component before 1.0.0 for ownCloud allows OS Command Injection via the administration settings.

πŸ“– Read

via "National Vulnerability Database".
16 January 2022
?
16:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0235 β€Ό

node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor

πŸ“– Read

via "National Vulnerability Database".
?
20:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4170 β€Ό

calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
17 January 2022
?
03:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23303 β€Ό

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

πŸ“– Read

via "National Vulnerability Database".
03:22
β€Ό CVE-2022-23304 β€Ό

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

πŸ“– Read

via "National Vulnerability Database".
?
10:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3853 β€Ό

chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
10:23
β€Ό CVE-2021-3857 β€Ό

chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Romance scammer who targeted 670 women gets 28 months in jail ⚠

Found love online? Sending them money? Friends and family warning you it could be a scam? Don't be too quick to dismiss their concerns...

πŸ“– Read

via "Naked Security".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mastering the Art of Cloud Tagging Using Data Science πŸ•΄

Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.

πŸ“– Read

via "Dark Reading".
12:19
πŸ—“οΈ White House tackles β€˜unique security challenges’ faced by open source ecosystem during dedicated virtual summit πŸ—“οΈ

Silicon Valley giants joined government officials to thrash out remedies to software supply chain woes

πŸ“– Read

via "The Daily Swig".
12:23
β€Ό CVE-2021-25025 β€Ό

The EventCalendar WordPress plugin before 1.1.51 does not have proper authorisation and CSRF checks in the add_calendar_event AJAX actions, allowing users with a role as low as subscriber to create events

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25024 β€Ό

The EventCalendar WordPress plugin before 1.1.51 does not escape some user input before outputting it back in attributes, leading to Reflected Cross-SIte Scripting issues

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25061 β€Ό

The WP Booking System WordPress plugin before 2.0.15 was affected by a reflected xss in wp-booking-system on the wpbs-calendars admin page.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2022-0253 β€Ό

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-24909 β€Ό

The ACF Photo Gallery Field WordPress plugin before 1.7.5 does not sanitise and escape the post parameter in the includes/acf_photo_gallery_metabox_edit.php file before outputing back in an attribute, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25005 β€Ό

The SEUR Oficial WordPress plugin before 1.7.0 does not sanitize and escape some of its settings allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-4164 β€Ό

calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-24838 β€Ό

The AnyComment WordPress plugin through 0.2.17 has an API endpoint which passes user input via the redirect parameter to the wp_redirect() function without being validated first, leading to an Open Redirect issue, which according to the vendor, is a feature.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25036 β€Ό

The All in One SEO WordPress plugin before 4.1.5.3 is affected by a Privilege Escalation issue, which was discovered during an internal audit by the Jetpack Scan team, and may grant bad actors access to protected REST API endpoints they shouldnΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t have access to. This could ultimately enable users with low-privileged accounts, like subscribers, to perform remote code execution on affected sites.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2022-0240 β€Ό

mruby is vulnerable to NULL Pointer Dereference

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25037 β€Ό

The All in One SEO WordPress plugin before 4.1.5.3 is affected by an authenticated SQL injection issue, which was discovered during an internal audit by the Jetpack Scan team, and could grant attackers access to privileged information from the affected siteÒ€ℒs database (e.g., usernames and hashed passwords).

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25046 β€Ό

The Modern Events Calendar Lite WordPress plugin before 6.2.0 alloed any logged-in user, even a subscriber user, may add a category whose parameters are incorrectly escaped in the admin panel, leading to stored XSS.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-3862 β€Ό

icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25067 β€Ό

The Landing Page Builder WordPress plugin before 1.4.9.6 was affected by a reflected XSS in page-builder-add on the ulpb_post admin page.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-25065 β€Ό

The Smash Balloon Social Post Feed WordPress plugin before 4.1.1 was affected by a reflected XSS in custom-facebook-feed in cff-top admin page.

πŸ“– Read

via "National Vulnerability Database".
?
14:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0256 β€Ό

pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-0257 β€Ό

pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-0258 β€Ό

pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command

πŸ“– Read

via "National Vulnerability Database".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Celebrations over REvil ransomware arrests in Russia may be premature πŸ—“οΈ

β€˜It’s not clear whether the developers or lower-level criminals were arrested’, threat intel experts tell The Daily Swig

πŸ“– Read

via "The Daily Swig".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-38965 β€Ό

IBM FileNet Content Manager 5.5.4, 5.5.6, and 5.5.7 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 212346.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-33040 β€Ό

managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
?
20:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22703 β€Ό

In Stormshield SSO Agent 2.x before 2.1.1 and 3.x before 3.0.2, the cleartext user password and PSK are contained in the log file of the .exe installer.

πŸ“– Read

via "National Vulnerability Database".
18 January 2022
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0245 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat prior to 2.0.

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-44757 β€Ό

Zoho ManageEngine Desktop Central before 10.1.2137.9 and Desktop Central MSP before 10.1.2137.9 allow attackers to bypass authentication, and read sensitive information or upload an arbitrary ZIP archive to the server.

πŸ“– Read

via "National Vulnerability Database".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Researchers discover β€˜extremely easy’ 2FA bypass in Box cloud management software πŸ—“οΈ

Breaking the Box

πŸ“– Read

via "The Daily Swig".
11:29
❌ Organizations Face a β€˜Losing Battle’ Against Vulnerabilities ❌

Companies must take more β€˜innovative and proactive’ approaches to security in 2022 to combat threats that emerged last year, researchers said.

πŸ“– Read

via "Threat Post".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Reasons Why M&A Is the Engine Driving Cybersecurity πŸ•΄

Consistent acquisition of key technologies and talent is a proven strategy for growth.

πŸ“– Read

via "Dark Reading".
12:07
πŸ•΄ How to Avoid Putting Data At Risk During the Great Resignation πŸ•΄

Never before have companies offboarded employees at this pace, making it more likely that some processes, from protecting data to revoking the employee's access, will slip through the cracks.

πŸ“– Read

via "Dark Reading".
12:19
🦿 DHL takes top spot as most imitated brand in phishing attacks 🦿

For the final quarter of 2021, DHL surpassed Microsoft as the brand most spoofed in phishing campaigns, says Check Point Research.

πŸ“– Read

via "Tech Republic".
12:23
β€Ό CVE-2021-38783 β€Ό

There is a Out-of-Bound Write in the Allwinner R818 SoC Android Q SDK V1.0 camera driver "/dev/cedar_dev" through iotcl cmd IOCTL_SET_PROC_INFO and IOCTL_COPY_PROC_INFO, which could cause a system crash or EoP.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-22566 β€Ό

An incorrect setting of UXN bits within mmu_flags_to_s1_pte_attr lead to privileged executable pages being mapped as executable from an unprivileged context. This can be leveraged by an attacker to bypass executability restrictions of kernel-mode pages from user-mode. An incorrect setting of PXN bits within mmu_flags_to_s1_pte_attr lead to unprivileged executable pages being mapped as executable from a privileged context. This can be leveraged by an attacker to bypass executability restrictions of user-mode pages from kernel-mode. Typically this allows a potential attacker to circumvent a mitigation, making exploitation of potential kernel-mode vulnerabilities easier. We recommend updating kernel beyond commit 7d731b4e9599088ac3073956933559da7bca6a00 and rebuilding.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-33965 β€Ό

China Mobile An Lianbao WF-1 V1.0.1 router provides a web interface /api/ZRMesh/set_ZRMesh which receives parameters by POST request, and the parameter mesh_enable and mesh_device have a command injection vulnerability. An attacker can use the vulnerability to execute remote commands.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-38694 β€Ό

SoftVibe SARABAN for INFOMA 1.1 allows SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-38785 β€Ό

There is a NULL pointer deference in the Allwinner R818 SoC Android Q SDK V1.0 camera driver /dev/cedar_dev that could use the ioctl cmd IOCTL_GET_IOMMU_ADDR to cause a system crash.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-38784 β€Ό

There is a NULL pointer dereference in the syscall open_exec function of Allwinner R818 SoC Android Q SDK V1.0 that could executable a malicious file to cause a system crash.

πŸ“– Read

via "National Vulnerability Database".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Chrome to bolster CSRF protections with CORS preflight checks on private network requests πŸ—“οΈ

Phased rollout begins from Chrome 98 with DevTools warnings of failed preflight requests

πŸ“– Read

via "The Daily Swig".
12:59
❌ Critical ManageEngine Desktop Server Bug Opens Orgs to Malware ❌

Zoho's comprehensive endpoint-management platform suffers from an authentication-bypass bug (CVE-2021-44757) that could lead to remote code execution.

πŸ“– Read

via "Threat Post".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Toon: Nowhere to Hide πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
?
14:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-38695 β€Ό

SoftVibe SARABAN for INFOMA 1.1 is vulnerable to stored cross-site scripting (XSS) that allows users to store scripts in certain fields (e.g. subject, description) of the document form.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-38697 β€Ό

SoftVibe SARABAN for INFOMA 1.1 allows Unauthenticated unrestricted File Upload, that allows attackers to upload files with any file extension which can lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-0262 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.7.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-23302 β€Ό

JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-0260 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.2.7.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-0261 β€Ό

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-23307 β€Ό

CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-38696 β€Ό

SoftVibe SARABAN for INFOMA 1.1 has Incorrect Access Control vulnerability, that allows attackers to access signature files on the application without any authentication.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-4146 β€Ό

Business Logic Errors in GitHub repository pimcore/pimcore prior to 10.2.6.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-41550 β€Ό

Leostream Connection Broker 9.0.40.17 allows administrator to upload and execute Perl code.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-23305 β€Ό

By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-44217 β€Ό

In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-41551 β€Ό

Leostream Connection Broker 9.0.40.17 allows administrators to conduct directory traversal attacks by uploading z ZIP file that contains a symbolic link.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2022-0263 β€Ό

Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore prior to 10.2.7.

πŸ“– Read

via "National Vulnerability Database".
14:30
❌ β€˜White Rabbit’ Ransomware May Be New FIN8 Tool ❌

It's a double-extortion play that uses the command-line password β€˜KissMe’ to hide its nasty acts and adorns its ransom note with cutesy ASCII bunny art.

πŸ“– Read

via "Threat Post".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security: Apple Safari leaks private data via database API – what you need to know ⚠

There's a tiny data leakage bug in the WebKit browser engine... but it could act as a "supercookie" identifier for your browsing

πŸ“– Read

via "Naked Security".
14:52
⚠ Romance scammer who targeted 670 women gets 28 months in jail ⚠

Found love online? Sending them money? Friends and family warning you it could be a scam? Don't be too quick to dismiss their concerns...

πŸ“– Read

via "Naked Security".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Search for Vulnerabilities Drives 10x Increase in Bug Reports πŸ•΄

Cross-site scripting and broken access controls continued to be the top classes of vulnerabilities researchers discovered, according to Bugcrowd's annual vulnerability report.

πŸ“– Read

via "Dark Reading".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41807 β€Ό

Lack of rate limiting in M-Files Server and M-Files Web products with versions before 21.12.10873.0 in certain type of user accounts allows unlimited amount of attempts and therefore makes brute-forcing login accounts easier.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-0125 β€Ό

An issue has been discovered in GitLab affecting all versions starting from 12.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not verifying that a maintainer of a project had the right access to import members from a target project.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-14110 β€Ό

AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-0232 β€Ό

The User Registration, Login & Landing Pages WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the loader_text parameter found in the ~/includes/templates/landing-page.php file which allows attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.2.7. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-0093 β€Ό

An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab allows a user with an expired password to access sensitive information through RSS feeds.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-34406 β€Ό

NVIDIA Tegra kernel driver contains a vulnerability in NVHost, where a specific race condition can lead to a null pointer dereference, which may lead to a system reboot.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-46005 β€Ό

Sourcecodester Car Rental Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via vehicalorcview parameter.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-34401 β€Ό

NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVGPU_IOCTL_CHANNEL_SET_ERROR_NOTIFIER, where improper access control may lead to code execution, compromised integrity, or denial of service.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-41809 β€Ό

SSRF vulnerability in M-Files Server products with versions before 22.1.11017.1, in a preview function allowed making queries from the server with certain document types referencing external entities.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-0090 β€Ό

An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab is configured in a way that it doesn't ignore replacement references with git sub-commands, allowing a malicious user to spoof the contents of their commits in the UI.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-0172 β€Ό

An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.3. Under certain conditions it was possible to bypass the IP restriction for public projects through GraphQL allowing unauthorised users to read titles of issues, merge requests and milestones.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2021-46012 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-0236 β€Ό

The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2021-4083 β€Ό

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-0151 β€Ό

An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not correctly handling requests to delete existing packages which could result in a Denial of Service under specific conditions.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-0210 β€Ό

The Random Banner WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the category parameter found in the ~/include/models/model.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 4.1.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-22690 β€Ό

Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-22691 β€Ό

The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2021-43353 β€Ό

The Crisp Live Chat WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the crisp_plugin_settings_page function found in the ~/crisp.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 0.31.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-0244 β€Ό

An issue has been discovered in GitLab CE/EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group was due to incorrect handling of file.

πŸ“– Read

via "National Vulnerability Database".
?
16:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cybercriminals Actively Target VMware vSphere with Cryptominers ❌

VMware's container-based application development environment has become attractive to cyberattackers.

πŸ“– Read

via "Threat Post".
17:08
πŸ•΄ Europol Shuts Down Popular Cybercriminal VPN Service πŸ•΄

VPNLab was used to support criminal activity, including ransomware campaigns and other attacks, Europol officials report.

πŸ“– Read

via "Dark Reading".
17:19
🦿 5 tools helping companies more effectively manage cybersecurity in 2022 🦿

As more companies focus on digital adoption goals in 2022, finding security tools to detect malicious activity is top-of-mind for executives.

πŸ“– Read

via "Tech Republic".
17:29
❌ The Log4j Vulnerability Puts Pressure on the Security World ❌

It's time to sound the alarm for Log4Shell. Saryu Nayyar, CEO at Gurucul, discusses what actions you should be taking.

πŸ“– Read

via "Threat Post".
17:38
πŸ•΄ Kovrr Translates Cyber Risk into Business Impact with its Quantum Platform πŸ•΄

On-demand cyber risk quantification platform enables C-suite to prioritize and justify cybersecurity investments through financial quantification.

πŸ“– Read

via "Dark Reading".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44840 β€Ό

An issue was discovered in Delta RM 1.2. Using an privileged account, it is possible to edit, create, and delete risk labels, such as Criticality and Priority Indication labels. By using the /core/table/query endpoint, and by using a POST request and indicating the affected label with tableUid parameter and the operation with datas[query], it is possible to edit, create, and delete the following labels: Priority Indication, Quality Evaluation, Progress Margin and Priority. Furthermore, it is also possible to export Criticality labels with an unprivileged user.

πŸ“– Read

via "National Vulnerability Database".
18:24
β€Ό CVE-2021-44836 β€Ό

An issue was discovered in Delta RM 1.2. The /risque/risque/workflow/reset endpoint is lacking access controls, and it is possible for an unprivileged user to reopen a risk with a POST request, using the risqueID parameter to identify the risk to be re-opened.

πŸ“– Read

via "National Vulnerability Database".
18:24
β€Ό CVE-2021-44838 β€Ό

An issue was discovered in Delta RM 1.2. Using the /risque/risque/ajax-details endpoint, with a POST request indicating the risk to access with the id parameter, it is possible for users to access risks of other companies.

πŸ“– Read

via "National Vulnerability Database".
18:24
β€Ό CVE-2021-44839 β€Ό

An issue was discovered in Delta RM 1.2. It is possible to request a new password for any other account using the account ID. Using the /listes/DTsendmaildata/adm_utilisateur/send-mail.json endpoint, a user can send a JSON array with user IDs that will have their passwords reset (and new ones sent to their respective e-mail addresses).

πŸ“– Read

via "National Vulnerability Database".
18:24
β€Ό CVE-2022-21696 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.

πŸ“– Read

via "National Vulnerability Database".
18:38
πŸ•΄ Kaspersky Announces Takedown Service πŸ•΄

Service facilitates the removal of malicious and phishing domains.

πŸ“– Read

via "Dark Reading".
?
19:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Take 'Urgent' Steps to Secure Systems From Damaging Attacks, CISA Says πŸ•΄

CISA issues alert for senior leadership of US organizations amid rising tensions between Russia and Ukraine.

πŸ“– Read

via "Dark Reading".
19:38
πŸ•΄ End Users Remain Organizations' Biggest Security Risk πŸ•΄

Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.

πŸ“– Read

via "Dark Reading".
?
19:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Will 2022 Be the Year of the Software Bill of Materials? ❌

Praise be & pass the recipe for the software soup: There's too much scrambling to untangle vulnerabilities and dependencies, say a security experts roundtable.

πŸ“– Read

via "Threat Post".
20:08
πŸ•΄ Researchers Explore Hacking VirusTotal to Find Stolen Credentials πŸ•΄

VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.

πŸ“– Read

via "Dark Reading".
?
20:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21688 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23408 β€Ό

wolfSSL 5.x before 5.1.1 uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS 1.1 or 1.2 or DTLS 1.1 or 1.2. This occurs because of misplaced memory initialization in BuildMessage in internal.c.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-21673 β€Ό

Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-21689 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-21693 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-21695 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-21691 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.

πŸ“– Read

via "National Vulnerability Database".
20:38
πŸ•΄ Cloud Identity Startup Permiso Launches With $10M Seed πŸ•΄

Permiso's co-founders say the No. 1 problem in the cloud is identity, and their platform is designed to tackle the notoriously difficult challenge of monitoring the activity of those identities.

πŸ“– Read

via "Dark Reading".
20:38
πŸ•΄ Microsoft Details Recent Damaging Malware Attacks on Ukrainian Organizations πŸ•΄

"WhisperGate" malware was used to overwrite Master Boot Record and other files to render systems inoperable at several organizations in Ukraine, Microsoft says.

πŸ“– Read

via "Dark Reading".
?
22:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21692 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2022-21700 β€Ό

Micronaut is a JVM-based, full stack Java framework designed for building JVM web applications with support for Java, Kotlin and the Groovy language. In affected versions sending an invalid Content Type header leads to memory leak in DefaultArgumentConversionContext as this type is erroneously used in static state. ### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state. ### Patches The problem is patched in Micronaut 3.2.7 and above. ### Workarounds The default content type binder can be replaced in an existing Micronaut application to mitigate the issue: ```java package example; import java.util.List; import io.micronaut.context.annotation.Replaces; import io.micronaut.core.convert.ConversionService; import io.micronaut.http.MediaType; import io.micronaut.http.bind.DefaultRequestBinderRegistry; import io.micronaut.http.bind.binders.RequestArgumentBinder; import jakarta.inject.Singleton; @Singleton @Replaces(DefaultRequestBinderRegistry.class) class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry { public FixedRequestBinderRegistry(ConversionService conversionService, List<RequestArgumentBinder> binders) { super(conversionService, binders); } @Override protected void registerDefaultConverters(ConversionService<?> conversionService) { super.registerDefaultConverters(conversionService); conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> { try { return MediaType.of(charSequence); } catch (IllegalArgumentException e) { return null; } }); } } ``` ### References Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues) * Email us at [info@micronaut.io](mailto:info@micronaut.io)

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2022-21690 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2022-21694 β€Ό

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.

πŸ“– Read

via "National Vulnerability Database".
19 January 2022
?
03:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22178 β€Ό

A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2022-22164 β€Ό

An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2021-26043 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2022-23435 β€Ό

decoding.c in android-gif-drawable before 1.2.24 does not limit the maximum length of a comment, leading to denial of service.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2021-26047 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2022-22154 β€Ό

In a Junos Fusion scenario an External Control of Critical State Data vulnerability in the Satellite Device (SD) control state machine of Juniper Networks Junos OS allows an attacker who is able to make physical changes to the cabling of the device to cause a denial of service (DoS). An SD can get rebooted and subsequently controlled by an Aggregation Device (AD) which does not belong to the original Fusion setup and is just connected to an extended port of the SD. To carry out this attack the attacker needs to have physical access to the cabling between the SD and the original AD. This issue affects: Juniper Networks Junos OS 16.1R1 and later versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2022-22160 β€Ό

An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS). In a subscriber management / broadband edge environment if a single session group configuration contains dual-stack and a pp0 interface, smgd will crash and restart every time a PPPoE client sends a specific message. This issue affects Juniper Networks Junos OS on MX Series: 16.1 version 16.1R1 and later versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S3; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2022-22170 β€Ό

A Missing Release of Resource after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a Denial of Service (DoS) by sending specific packets over VXLAN which cause heap memory to leak and on exhaustion the PFE to reset. The heap memory utilization can be monitored with the command: user@host> show chassis fpc This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions of Junos OS prior to 19.4R1.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2021-26055 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2022-22177 β€Ό

A release of illegal memory vulnerability in the snmpd daemon of Juniper Networks Junos OS, Junos OS Evolved allows an attacker to halt the snmpd daemon causing a sustained Denial of Service (DoS) to the service until it is manually restarted. This issue impacts any version of SNMP Γ’β‚¬β€œ v1,v2, v3 This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S20; 15.1 versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R2-S5, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2. Juniper Networks Junos OS Evolved 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.

πŸ“– Read

via "National Vulnerability Database".
03:31
β€Ό CVE-2021-26048 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
08:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0266 β€Ό

Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-31821 β€Ό

When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image

πŸ“– Read

via "National Vulnerability Database".
?
09:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cloned Dept. of Labor Site Hawks Fake Government Contracts ❌

A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative government projects -- but harvests credentials instead.

πŸ“– Read

via "Threat Post".
?
09:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ ThePhish: β€˜the most complete’ non-commercial phishing email analysis tool πŸ—“οΈ

Developer says tool is more precise and queries a wider range of utilities than other free and open source rivals

πŸ“– Read

via "The Daily Swig".
?
10:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21369 β€Ό

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Rich Text Editor). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21325 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21273 β€Ό

Vulnerability in the Oracle Project Costing product of Oracle E-Business Suite (component: Expenses, Currency Override). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Project Costing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Project Costing accessible data as well as unauthorized access to critical data or complete access to all Oracle Project Costing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21272 β€Ό

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21288 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21281 β€Ό

Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21307 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2022-21244 β€Ό

Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:25
β€Ό CVE-2021-35687 β€Ό

Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Unified Metadata Manager). Supported versions that are affected are 8.0.7-8.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21328 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21345 β€Ό

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21403 β€Ό

Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21400 β€Ό

Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21283 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21268 β€Ό

Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Pipeline Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Billing and Revenue Management executes to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Billing and Revenue Management accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21314 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21293 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21351 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21277 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-21300 β€Ό

Vulnerability in the PeopleSoft Enterprise CS SA Integration Pack product of Oracle PeopleSoft (component: Snapshot Integration). Supported versions that are affected are 9.0 and 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise CS SA Integration Pack. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CS SA Integration Pack accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21375 β€Ό

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21263 β€Ό

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Fault Management Architecture). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data as well as unauthorized read access to a subset of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21303 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21250 β€Ό

Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: GL Accounts). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21395 β€Ό

Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks of this vulnerability can result in takeover of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21366 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21396 β€Ό

Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21266 β€Ό

Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Pipeline Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Communications Billing and Revenue Management accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21284 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:31
β€Ό CVE-2022-21379 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21337 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21338 β€Ό

Vulnerability in the Oracle Communications Convergence product of Oracle Communications Applications (component: General Framework). The supported version that is affected is 3.0.2.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Convergence. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Convergence accessible data as well as unauthorized read access to a subset of Oracle Communications Convergence accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21378 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21315 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21302 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21381 β€Ό

Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: WebUI). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. While the vulnerability is in Oracle Enterprise Session Border Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Enterprise Session Border Controller accessible data as well as unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21310 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2021-35587 β€Ό

Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21264 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-21372 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21292 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21340 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2021-31854 β€Ό

A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges.

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21311 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21362 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21380 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21377 β€Ό

Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web API). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2 and 20.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21358 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21399 β€Ό

Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-21291 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21295 β€Ό

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21313 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21374 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21262 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21344 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21392 β€Ό

Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Policy Framework). Supported versions that are affected are 13.4.0.0 and 13.5.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21332 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-38786 β€Ό

There is a NULL pointer dereference in media/libcedarc/vdecoder of Allwinner R818 SoC Android Q SDK V1.0, which could cause a media crash (denial of service).

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-21287 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21248 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21360 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21326 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21341 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21327 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21270 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21286 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21274 β€Ό

Vulnerability in the Oracle Sourcing product of Oracle E-Business Suite (component: Intelligence, RFx Creation). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Sourcing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Sourcing accessible data as well as unauthorized access to critical data or complete access to all Oracle Sourcing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21349 β€Ό

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 7u321, 8u311; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21390 β€Ό

Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Webservices Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2022-21370 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21367 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21331 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21388 β€Ό

Vulnerability in the Oracle Communications Pricing Design Center product of Oracle Communications Applications (component: On Premise Install). Supported versions that are affected are 12.0.0.3.0 and 12.0.0.4.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Pricing Design Center executes to compromise Oracle Communications Pricing Design Center. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Pricing Design Center accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21382 β€Ό

Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: WebUI). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. While the vulnerability is in Oracle Enterprise Session Border Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 7.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21359 β€Ό

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Optimization Framework). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21342 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21257 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2021-35683 β€Ό

Vulnerability in the Oracle Essbase Administration Services product of Oracle Essbase (component: EAS Console). The supported version that is affected is Prior to 11.1.2.4.047. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Essbase Administration Services. While the vulnerability is in Oracle Essbase Administration Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Essbase Administration Services. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21402 β€Ό

Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21269 β€Ό

Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
10:41
β€Ό CVE-2022-21323 β€Ό

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).

πŸ“– Read

via "National Vulnerability Database".
?
11:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Beijing Olympics App Flaws Allow Man-in-the-Middle Attacks ❌

Attackers can access audio and files uploaded to the MY2022 mobile app required for use by all winter games attendees – including personal health details.

πŸ“– Read

via "Threat Post".
?
11:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Security vulnerabilities in Umbraco CMS could lead to account takeover πŸ—“οΈ

Partial fix applied for two separate bugs in the open source software

πŸ“– Read

via "The Daily Swig".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Preparing For the Next Cybersecurity Epidemic: Deepfakes πŸ•΄

Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.

πŸ“– Read

via "Dark Reading".
12:20
🦿 Phishing attack spoofs US Department of Labor to steal account credentials 🦿

A phishing campaign seen by email security provider Inky tries to trick its victims by inviting them to submit bids for alleged government projects.

πŸ“– Read

via "Tech Republic".
12:25
β€Ό CVE-2021-46104 β€Ό

An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server.

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-38787 β€Ό

There is an integer overflow in the ION driver "/dev/ion" of Allwinner R818 SoC Android Q SDK V1.0 that could use the ioctl cmd "COMPAT_ION_IOC_SUNXI_FLUSH_RANGE" to cause a system crash (denial of service).

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-45808 β€Ό

jpress v4.2.0 allows users to register an account by default. With the account, user can upload arbitrary files to the server.

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-44837 β€Ό

An issue was discovered in Delta RM 1.2. It is possible for an unprivileged user to access the same information as an admin user regarding the risk creation information in the /risque/administration/referentiel/json/create/categorie endpoint, using the id_cat1 query parameter to indicate the risk.

πŸ“– Read

via "National Vulnerability Database".
?
13:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ GitHub Actions flaw that allowed code to be approved without review is addressed πŸ—“οΈ

Uncheck risky setting option offered

πŸ“– Read

via "The Daily Swig".
13:53
⚠ Serious Security: Apple Safari leaks private data via database API – what you need to know ⚠

There's a tiny data leakage bug in the WebKit browser engine... but it could act as a "supercookie" identifier for your browsing

πŸ“– Read

via "Naked Security".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ (ISC)Β² Launches Entry-Level Cybersecurity Course πŸ•΄

Prospective entrants to the sector will receive instruction on fundamental cybersecurity concepts on which they will be evaluated during the new (ISC)Β² entry-level cybersecurity certification pilot exam.

πŸ“– Read

via "Dark Reading".
14:09
πŸ•΄ LogPoint Releases LogPoint 7, Adding SOAR Capabilities Within SIEM πŸ•΄

LogPoint 7 includes ready-made integrations to connect with existing security technologies, including endpoint protection, network detection, and threat management.

πŸ“– Read

via "Dark Reading".
?
14:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46030 β€Ό

There is a Cross Site Scripting attack (XSS) vulnerability in JavaQuarkBBS <= v2. By entering specific statements into the background tag management module, the attack statement will be stored in the database, and the next victim will be attacked when he accesses the tag module.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2021-38788 β€Ό

The Background service in Allwinner R818 SoC Android Q SDK V1.0 is used to manage background applications. Malicious apps can use the interface provided by the service to set the number of applications allowed to run in the background to 0 and add themselves to the whitelist, so that once other applications enter the background, they will be forcibly stopped by the system, causing a denial of service.

πŸ“– Read

via "National Vulnerability Database".
?
14:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ IRS Will Soon Require Selfies for Online Access β™ŸοΈ

If you created an online account to manage your tax records with the U.S. Internal Revenue Service (IRS), those login credentials will cease to work later this year. The agency says that by the summer of 2022, the only way to log in to irs.gov will be through ID.me, an online identity verification service that requires applicants to submit copies of bills and identity documents, as well as a live video feed of their faces via a mobile device.

πŸ“– Read

via "Krebs on Security".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Adoption Widens the Cybersecurity Skills Gap πŸ•΄

No matter what cloud services you employ, you are still responsible for protecting the security of your data.

πŸ“– Read

via "Dark Reading".
?
16:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Box 2FA Bypass Opens User Accounts to Attack ❌

A security bug in the file-sharing cloud app could have allowed attackers using stolen credentials to skate by one-time SMS code verification requirements.

πŸ“– Read

via "Threat Post".
?
16:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44299 β€Ό

A reflected cross-site scripting (XSS) vulnerability in \lib\packages\themes\themes.php of Navigate CMS v2.9.4 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-33912 β€Ό

libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-22310 β€Ό

IBM WebSphere Application Server Liberty 21.0.0.10 through 21.0.0.12 could provide weaker than expected security. A remote attacker could exploit this weakness to obtain sensitive information and gain unauthorized access to JAX-WS applications. IBM X-Force ID: 217224.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-23221 β€Ό

H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-33913 β€Ό

libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-46203 β€Ό

Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-0274 β€Ό

Cross-site Scripting (XSS) - Stored in NPM cypress-orchardcore prior to 1.2.2.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-46204 β€Ό

Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter. SQL injection vulnerability via taocms\include\Model\Article.php.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-42810 β€Ό

A flaw in the previous versions of the product may allow an authenticated attacker the ability to execute code as a privileged user on a system where the agent is installed.

πŸ“– Read

via "National Vulnerability Database".
16:39
πŸ•΄ When Patching Security Flaws, Smarter Trumps Faster πŸ•΄

Just turning the patch dial to "high" is not enough, and if your company is using the Common Vulnerability Scoring System (CVSS) to prioritize software patching, you are doing it wrong.

πŸ“– Read

via "Dark Reading".
?
17:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 AI and Cybersecurity Predictions for 2022 πŸ•΄

Among them: Explainable artificial intelligence (XAI) will improve the ways humans and AI interact, plus expect a shift in how organizations fight ransomware.

πŸ“– Read

via "Dark Reading".
17:39
πŸ•΄ 1Password Raises $620M Series C, Now Valued at $6.8B πŸ•΄

The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.

πŸ“– Read

via "Dark Reading".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Europol, Feds Take VPN Used by Cybercriminals Offline πŸ”

The service was being used to carry out ransomware deployment and other cybercrime activities.

πŸ“– Read

via "".
17:59
❌ Destructive Wiper Targeting Ukraine Aimed at Eroding Trust, Experts Say ❌

Disruptive malware attacks on Ukrainian organizations (posing as ransomware attacks) are very likely part of Russia’s wider effort to undermine Ukraine’s sovereignty, according to analysts.

πŸ“– Read

via "Threat Post".
18:09
πŸ•΄ What Happens to My Organization If APIs Are Compromised? πŸ•΄

Once attackers have obtained access, they can compromise other systems or pivot within your networks.

πŸ“– Read

via "Dark Reading".
?
18:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0243 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.2.2.

πŸ“– Read

via "National Vulnerability Database".
18:46
β€Ό CVE-2022-22769 β€Ό

The Web server component of TIBCO Software Inc.'s TIBCO EBX, TIBCO EBX, TIBCO EBX, TIBCO EBX Add-ons, TIBCO EBX Add-ons, TIBCO EBX Add-ons, and TIBCO Product and Service Catalog powered by TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.8.124 and below, TIBCO EBX: versions 5.9.3, 5.9.4, 5.9.5, 5.9.6, 5.9.7, 5.9.8, 5.9.9, 5.9.10, 5.9.11, 5.9.12, 5.9.13, 5.9.14, and 5.9.15, TIBCO EBX: versions 6.0.0, 6.0.1, 6.0.2, and 6.0.3, TIBCO EBX Add-ons: versions 3.20.18 and below, TIBCO EBX Add-ons: versions 4.1.0, 4.2.0, 4.2.1, 4.2.2, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5, and 4.5.6, TIBCO EBX Add-ons: versions 5.0.0, 5.0.1, 5.1.0, 5.1.1, and 5.2.0, and TIBCO Product and Service Catalog powered by TIBCO EBX: versions 1.1.0 and below.

πŸ“– Read

via "National Vulnerability Database".
18:46
β€Ό CVE-2021-38789 β€Ό

Allwinner R818 SoC Android Q SDK V1.0 is affected by an incorrect access control vulnerability that does not check the caller's permission, in which a third-party app could change system settings.

πŸ“– Read

via "National Vulnerability Database".
?
20:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FireEye & McAfee Enterprise Renamed as Trellix πŸ•΄

Symphony Technology Group announces a name for the newly merged company, which aims to become a leader in extended detection and response (XDR).

πŸ“– Read

via "Dark Reading".
?
20:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-26247 β€Ό

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2021-44777 β€Ό

Cross-Site Request Forgery (CSRF) vulnerabilities leading to single or bulk e-mail entries deletion discovered in Email Tracker WordPress plugin (versions <= 5.2.6).

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2021-23225 β€Ό

Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the "new_username" field during creation of a new user via "Copy" method at user_admin.php.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2022-21699 β€Ό

IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2021-23842 β€Ό

Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\'s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2021-3816 β€Ό

Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via "Copy" method at user_group_admin.php.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2021-23843 β€Ό

The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\'s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2022-23046 β€Ό

PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2022-23045 β€Ό

PhpIPAM v1.4.4 allows an authenticated admin user to inject persistent JavaScript code inside the "Site title" parameter while updating the site settings. The "Site title" setting is injected in several locations which triggers the XSS.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2022-21701 β€Ό

Istio is an open platform to connect, manage, and secure microservices. In versions 1.12.0 and 1.12.1 Istio is vulnerable to a privilege escalation attack. Users who have `CREATE` permission for `gateways.gateway.networking.k8s.io` objects can escalate this privilege to create other resources that they may not have access to, such as `Pod`. This vulnerability impacts only an Alpha level feature, the Kubernetes Gateway API. This is not the same as the Istio Gateway type (gateways.networking.istio.io), which is not vulnerable. Users are advised to upgrade to resolve this issue. Users unable to upgrade should implement any of the following which will prevent this vulnerability: Remove the gateways.gateway.networking.k8s.io CustomResourceDefinition, set PILOT_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER=true environment variable in Istiod, or remove CREATE permissions for gateways.gateway.networking.k8s.io objects from untrusted users.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2022-21679 β€Ό

Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy.

πŸ“– Read

via "National Vulnerability Database".
20 January 2022
?
03:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43269 β€Ό

In Code42 app before 8.8.0, eval injection allows an attacker to change a deviceÒ€ℒs proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cloud; and CrashPlan for Small Business. (Incydr Professional and Enterprise are unaffected.)

πŸ“– Read

via "National Vulnerability Database".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0277 β€Ό

Improper Access Control in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
08:11
β€Ό CVE-2022-0278 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Eleven prolific BEC scam suspects arrested in Nigeria πŸ—“οΈ

SilverTerrier brought to heel

πŸ“– Read

via "The Daily Swig".
?
10:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0281 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
10:16
β€Ό CVE-2021-34600 β€Ό

Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for authorization of users.

πŸ“– Read

via "National Vulnerability Database".
10:16
β€Ό CVE-2022-22820 β€Ό

Due to the lack of media file checks before rendering, it was possible for an attacker to cause abnormal CPU consumption for message recipient by sending specially crafted gif image in LINE for Windows before 7.4.

πŸ“– Read

via "National Vulnerability Database".
10:16
β€Ό CVE-2021-45230 β€Ό

In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for.

πŸ“– Read

via "National Vulnerability Database".
10:16
β€Ό CVE-2021-3866 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository zulip/zulip prior to main.

πŸ“– Read

via "National Vulnerability Database".
10:16
β€Ό CVE-2022-0282 β€Ό

Code Injection in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
10:16
β€Ό CVE-2022-22733 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache ShardingSphere ElasticJob-UI allows an attacker who has guest account to do privilege escalation. This issue affects Apache ShardingSphere ElasticJob-UI Apache ShardingSphere ElasticJob-UI 3.x version 3.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cisco's Kenna Security Research Shows the Relative Likelihood of an Organization Being Exploited πŸ•΄

A record-breaking 20,130 vulnerabilities were reported in 2021. However, only 4% pose a high risk to organizations.

πŸ“– Read

via "Dark Reading".
11:23
🦿 WAN report: Complexity continue to grow as more organizations close legacy data centers 🦿

The sixth annual report from Aryaka found that IT teams are planning to invest more in 2022 but expect more transparency and control.

πŸ“– Read

via "Tech Republic".
11:23
πŸ—“οΈ Red Cross suffers cyber-attack – data of 515,000 β€˜highly vulnerable’ people exposed πŸ—“οΈ

The β€˜sophisticated’ attack was detected last week

πŸ“– Read

via "The Daily Swig".
11:30
❌ SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack ❌

The Fortune 500 integrated services company confirmed a β€˜systems intrusion’ that occurred in late December and is still under investigation in an SEC filing.

πŸ“– Read

via "Threat Post".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Ways to Develop Your Team's Cyber Skills πŸ•΄

Organizations need to invest in professional development β€” and then actually make time for it.

πŸ“– Read

via "Dark Reading".
?
12:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ White House orders federal agencies to raise cybersecurity bar for national security systems πŸ—“οΈ

New guidance will bring standards into line with federal civilian networks

πŸ“– Read

via "The Daily Swig".
13:00
❌ Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data ❌

The Red Cross was forced to shut down IT systems behind its Restoring Family Links system, which reunites families separated by war, disaster or migration.

πŸ“– Read

via "Threat Post".
?
14:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Pervasive Apple Safari Bug Exposes Web-Browsing Data, Google IDs ❌

The information-disclosure issue, affecting Macs, iPhones and iPads, allows a snooping website to find out information about other tabs a user might have open.

πŸ“– Read

via "Threat Post".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0285 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-32039 β€Ό

Users with appropriate file access may be able to access unencrypted user credentials saved by MongoDB Extension for VS Code in a binary file. These credentials may be used by malicious attackers to perform unauthorized actions. This vulnerability affects all MongoDB Extension for VS Code including and prior to version 0.7.0

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-44738 β€Ό

Buffer overflow vulnerability has been identified in Lexmark devices through 2021-12-07 in postscript interpreter.

πŸ“– Read

via "National Vulnerability Database".
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis [Podcast + Transcript] ⚠

Latest epsiode - listen now!

πŸ“– Read

via "Naked Security".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Enterprises Are Sailing Into a Perfect Storm of Cloud Risk πŸ•΄

Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud customers.

πŸ“– Read

via "Dark Reading".
15:20
🦿 Secure your passwords and access them anywhere with LastPass 🦿

LastPass's Premium Plan keeps your digital life secure and at your fingertips with management for an unlimited number of passwords and seamless access across all of your devices.

πŸ“– Read

via "Tech Republic".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  AIDE 0.17.4 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
15:38
πŸ›  GRAudit Grep Auditing Tool 3.3 πŸ› 

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

πŸ“– Read

via "Packet Storm Security".
15:50
🦿 Microsoft RDP vulnerability makes it a breeze for attackers to become men-in-the-middle 🦿

The Microsoft RDP vulnerability is a serious problem, but with a few caveats: It's been patched, and experts say it may be less likely to happen than it seems at first glance.

πŸ“– Read

via "Tech Republic".
16:00
❌ Microsoft Sees Log4j Attacks Exploiting SolarWinds Serv-U Bug ❌

SolarWinds has fixed a Serv-U bug that threat actors were exploiting to unleash Log4j attacks on networks’ internal devices.

πŸ“– Read

via "Threat Post".
16:11
β€Ό CVE-2021-44829 β€Ό

Cross Site Scripting (XSS) vulnerability exists in index.html in AFI WebACMS through 2.1.0 via the the ID parameter.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-44735 β€Ό

Embedded web server command injection vulnerability in Lexmark devices through 2021-12-07.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-45417 β€Ό

AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-44091 β€Ό

A Cross-Site Scripting (XSS) vulnerability exists in Courcecodester Multi Restaurant Table Reservation System 1.0 in register.php via the (1) fullname, (2) phone, and (3) address parameters.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-44736 β€Ό

The initial admin account setup wizard on Lexmark devices allow unauthenticated access to the Ò€œout of service eraseҀ� feature.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44734 β€Ό

Embedded web server input sanitization vulnerability in Lexmark devices through 2021-12-07, which can which can lead to remote code execution on the device.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-21658 β€Ό

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44737 β€Ό

PJL directory traversal vulnerability in Lexmark devices through 2021-12-07 that can be leveraged to overwrite internal configuration files.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-0219 β€Ό

Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
?
17:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Cisco StarOS Bug Grants Root Access via Debug Mode ❌

Cisco issued a critical fix for a flaw in its Cisco RCM for Cisco StarOS Software that could give attackers RCE on the application with root-level privileges.

πŸ“– Read

via "Threat Post".
?
17:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New White House Memo Aims to Strengthen National Security Systems πŸ”

A new White House memo gives greater power to the NSA in its fight to protect sensitive government data.

πŸ“– Read

via "".
?
18:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44092 β€Ό

An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.

πŸ“– Read

via "National Vulnerability Database".
18:11
β€Ό CVE-2021-46061 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-23119 β€Ό

A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2021-44090 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2021-29785 β€Ό

IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2021-44245 β€Ό

An SQL Injection vulnerability exists in Courcecodester COVID 19 Testing Management System (CTMS) 1.0 via the (1) username and (2) contactno parameters.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-23120 β€Ό

A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2021-44244 β€Ό

An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.

πŸ“– Read

via "National Vulnerability Database".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Red Cross Hit via Third-Party Cyberattack πŸ•΄

The incident compromised the personal data and confidential information of more than 515,000 "highly vulnerable people," the Red Cross reports.

πŸ“– Read

via "Dark Reading".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Automating Response Is a Marathon, Not a Sprint πŸ•΄

Organizations should balance process automation and human interaction to meet their unique security requirements.

πŸ“– Read

via "Dark Reading".
?
19:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Discover Dangerous Firmware-Level Rootkit πŸ•΄

MoonBounce is the latest in a small but growing number of implants found hidden in a computer's Unified Extensible Firmware Interface (UEFI).

πŸ“– Read

via "Dark Reading".
?
20:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46335 β€Ό

Moddable SDK v11.5.0 was discovered to contain a NULL pointer dereference in the component fx_Function_prototype_hasInstance.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46339 β€Ό

There is an Assertion 'lit_is_valid_cesu8_string (string_p, string_size)' failed at /base/ecma-helpers-string.c(ecma_new_ecma_string_from_utf8) in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46324 β€Ό

Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46337 β€Ό

There is an Assertion 'page_p != NULL' failed at /parser/js/js-parser-mem.c(parser_list_get) in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46338 β€Ό

There is an Assertion 'ecma_is_lexical_environment (object_p)' failed at /base/ecma-helpers.c(ecma_get_lex_env_type) in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46325 β€Ό

Espruino 2v10.246 was discovered to contain a stack buffer overflow via src/jsutils.c in vcbprintf.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2020-23315 β€Ό

There is an ASSERTION (pFuncBody->GetYieldRegister() == oldYieldRegister) failed in Js::DebugContext::RundownSourcesAndReparse in ChakraCore version 1.12.0.0-beta.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46333 β€Ό

Moddable SDK v11.5.0 was discovered to contain an invalid memory access vulnerability via the component __asan_memmove.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46336 β€Ό

There is an Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at /parser/js/js-parser-expr.c(parser_parse_class_body) in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46348 β€Ό

There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46351 β€Ό

There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46326 β€Ό

Moddable SDK v11.5.0 was discovered to contain a heap-buffer-overflow via the component __asan_memcpy.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46345 β€Ό

There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry-core/lit/lit-strings.c in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46334 β€Ό

Moddable SDK v11.5.0 was discovered to contain a stack buffer overflow via the component __interceptor_strcat.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46349 β€Ό

There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46346 β€Ό

There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46342 β€Ό

There is an Assertion 'ecma_is_lexical_environment (obj_p) || !ecma_op_object_is_fast_array (obj_p)' failed at /jerry-core/ecma/base/ecma-helpers.c in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46328 β€Ό

Moddable SDK v11.5.0 was discovered to contain a heap-buffer-overflow via the component __libc_start_main.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46350 β€Ό

There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46330 β€Ό

Moddable SDK v11.5.0 was discovered to contain a SEGV vulnerability via xs/sources/xsDataView.c in fx_ArrayBuffer_prototype_concat.

πŸ“– Read

via "National Vulnerability Database".
?
22:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22894 β€Ό

Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_lcache_lookup in /jerry-core/ecma/base/ecma-lcache.c.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22888 β€Ό

Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_op_object_find_own in /ecma/operations/ecma-objects.c.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-23315 β€Ό

MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22891 β€Ό

Jerryscript 3.0.0 was discovered to contain a SEGV vulnerability via ecma_ref_object_inline in /jerry-core/ecma/base/ecma-gc.c.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-23314 β€Ό

MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via /ms/mdiy/model/importJson.do.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22893 β€Ό

Jerryscript 3.0.0 was discovered to contain a stack overflow via vm_loop.lto_priv.304 in /jerry-core/vm/vm.c.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22890 β€Ό

There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22892 β€Ό

There is an Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c in Jerryscripts 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22895 β€Ό

Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-helpers-conversion.c.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22929 β€Ό

MCMS v5.2.4 was discovered to have an arbitrary file upload vulnerability in the New Template module, which allows attackers to execute arbitrary code via a crafted ZIP file.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22930 β€Ό

A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-22928 β€Ό

MCMS v5.2.4 was discovered to have a hardcoded shiro-key, allowing attackers to exploit the key and execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
21 January 2022
?
00:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Safari bug lets websites track browsing activity and unique identifiers πŸ“’

The flaw, found in Apple's WebKit browser engine, affects Safari 15 on macOS and all browsers on iOS and iPadOS 15

πŸ“– Read

via "ITPro".
00:48
πŸ“’ NSW ditches e-voting system after glitch left citizens unable to vote πŸ“’

The electoral commissioner is also seeking the validity of the results in three councillor elections

πŸ“– Read

via "ITPro".
00:48
πŸ“’ Aldi launches its first checkout-free store in London πŸ“’

The store uses facial age estimation technology provided by Yoti to verify the purchase of age-restricted products

πŸ“– Read

via "ITPro".
00:48
πŸ“’ European data regulators issued €1.1 billion in GDPR fines in 2021 πŸ“’

The UK placed sixth on the GDPR fine tableΒ with its Β£20 million fine levied against British Airways

πŸ“– Read

via "ITPro".
00:48
πŸ“’ IOC defends China Olympics app after 'devastating flaw' revealed πŸ“’

The app may even be breaking Google and Apple’s app store policies when it comes to privacy, according to Citizen Lab

πŸ“– Read

via "ITPro".
00:48
πŸ“’ NCA plots education drive to crack down on children exploring cyber crime πŸ“’

With children as young as nine being referred to the NCA for launching DDoS attacks, the new campaign aims to educate children in the consequences of cyber crime

πŸ“– Read

via "ITPro".
00:49
πŸ“’ A month in the life of a social engineer - part three πŸ“’

With the master plan now well underway, we learn how the hacker exploits their target's β€˜unpatchable’ human flaws to gain access to corporate systems

πŸ“– Read

via "ITPro".
00:49
πŸ“’ Skills 'deficit' forces Student Loans Company to spend heavily on temp staff πŸ“’

The organisation has spent Β£2.6 million on agency staff as it struggles to retain technical employees

πŸ“– Read

via "ITPro".
00:49
πŸ“’ Microsoft warns full scope of Ukraine cyber attacks β€˜not fully realised’ πŸ“’

The company's investigation into the attacks targeting Ukraine revealed atypical characteristics of the "destructive" campaign that disguises itself as ransomware

πŸ“– Read

via "ITPro".
00:49
πŸ“’ The UK's IoT proposals are riddled with β€˜astonishing’ gaps πŸ“’

The Product Security and Telecommunications Infrastructure (PTSI) Bill aims to address the connected devices security nightmare, but experts agree it doesn’t go far enough

πŸ“– Read

via "ITPro".
00:49
πŸ“’ Windows Server admins agree to forgo broken patches πŸ“’

Many administrators have agreed to wait until February's round of patches to avoid operational disruption caused by broken fixes

πŸ“– Read

via "ITPro".
00:49
πŸ“’ Russia's "politically motivated" REvil raid could be used as leverage, experts warn πŸ“’

The cyber security industry says the FSB's arrests are β€œunlikely” to signal a change in Russia’s policy

πŸ“– Read

via "ITPro".
00:49
πŸ“’ FireEye and McAfee Enterprise relaunch as Trellix πŸ“’

The new pure-play cyber security firm’s platform combines automation, machine learning, and threat intelligence

πŸ“– Read

via "ITPro".
00:49
πŸ“’ White House issues memorandum to bolster national security systems πŸ“’

Agencies must now implement multi-factor authentication within 180 days, along with encryption for data at rest and in transit

πŸ“– Read

via "ITPro".
00:49
πŸ“’ Red Cross "appalled" by data breach targeting 515,000 vulnerable people πŸ“’

The charitable organisation has begged cyber attackers not to leak the data online in emotional plea

πŸ“– Read

via "ITPro".
00:49
πŸ“’ DHL overtakes Microsoft as the most imitated brand in phishing attacks πŸ“’

Check Point Research reveals that the logistics giant accounted for almost a quarter of global phishing attacks in 2021

πŸ“– Read

via "ITPro".
00:49
πŸ“’ UK and Australia partner on cyber security investment πŸ“’

The countries are set to invest in infrastructure for Indo-Pacific states as well, in the areas of energy, investment, and technology

πŸ“– Read

via "ITPro".
00:49
πŸ“’ Ransomware: Why only the bravest businesses will survive πŸ“’

With ransomware attacks a matter of when, not if, the secret to protecting your reputation lies in honesty and transparency

πŸ“– Read

via "ITPro".
00:49
πŸ“’ NordVPN launches open source VPN speed testing tool πŸ“’

The unified speed-testing software can be downloaded from GitHub

πŸ“– Read

via "ITPro".
00:49
πŸ“’ The government’s anti-encryption campaign shows it’s learned nothing from the war on drugs πŸ“’

Criminalisation has almost always backfired through history, pushing illicit materials further into the hands of criminals

πŸ“– Read

via "ITPro".
?
08:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21933 β€Ό

ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service.

πŸ“– Read

via "National Vulnerability Database".
08:12
β€Ό CVE-2022-0326 β€Ό

NULL Pointer Dereference in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ BitLocker encryption: Clear text key storage prompts security debate online πŸ—“οΈ

Many are questioning why keys are saved in the clear ahead of sign-in

πŸ“– Read

via "The Daily Swig".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0318 β€Ό

Heap-based Buffer Overflow in Conda vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
10:12
β€Ό CVE-2022-0329 β€Ό

Code Injection in Conda loguru prior to master.

πŸ“– Read

via "National Vulnerability Database".
?
10:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Open debug mode in Cisco mobile networking software created critical security hole πŸ—“οΈ

Patch issued after testing engineers uncover RCE threat

πŸ“– Read

via "The Daily Swig".
?
11:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spyware Blitzes Compromise, Cannibalize ICS Networks ❌

The brief spearphishing campaigns spread malware and use compromised networks to steal credentials that can be sold or used to commit financial fraud.

πŸ“– Read

via "Threat Post".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Looking Beyond Biden's Binding Security Directive πŸ•΄

Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.

πŸ“– Read

via "Dark Reading".
12:14
β€Ό CVE-2022-0319 β€Ό

Out-of-bounds Read in Conda vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2020-19858 β€Ό

Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy.

πŸ“– Read

via "National Vulnerability Database".
12:15
β€Ό CVE-2020-19860 β€Ό

When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload.

πŸ“– Read

via "National Vulnerability Database".
12:21
πŸ—“οΈ Was COMELEC hacked? Philippines Commission on Elections casts doubt on data breach claims πŸ—“οΈ

Local newspaper alleges that usernames and PINs of vote-counting machines were stolen

πŸ“– Read

via "The Daily Swig".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis [Podcast + Transcript] ⚠

Latest epsiode - listen now!

πŸ“– Read

via "Naked Security".
?
13:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ European Commission launches new open source software bug bounty program πŸ—“οΈ

Hackers are invited to test services used by EU agencies

πŸ“– Read

via "The Daily Swig".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cryptocoin broker Crypto.com says 2FA bypass led to $35m theft ⚠

The company has put out a brief security report that summarises the 'what', but not yet the 'how' or 'why'.

πŸ“– Read

via "Naked Security".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46201 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Online Resort Management System 1.0 via the id parameterv in /orms/ node.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2021-40855 β€Ό

The EU Technical Specifications for Digital COVID Certificates before 1.1 mishandle certificate governance. A non-production public key certificate could have been used in production.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2021-46200 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Simple Music Clour Community System 1.0 via the email parameter in /music/ajax.php.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2021-46307 β€Ό

An SQL Injection vulnerability exists in Projectworlds Online Examination System 1.0 via the eid parameter in account.php.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2021-35003 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14655.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2021-35004 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link TL-WA1201 1.0.1 Build 20200709 rel.66244(5553) wireless access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14656.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2021-46198 β€Ό

An SQL Injection vulnerability exists in Sourceodester Courier Management System 1.0 via the email parameter in /cms/ajax.php app.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2020-19861 β€Ό

When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2022-23220 β€Ό

USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.

πŸ“– Read

via "National Vulnerability Database".
14:16
β™ŸοΈ Crime Shop Sells Hacked Logins to Other Crime Shops β™ŸοΈ

Up for the "Most Meta Cybercrime Offering" award this year is Accountz Club, a new cybercrime store that sells access to purloined accounts at services built for cybercriminals, including shops peddling stolen payment cards and identities, spamming tools, email and phone bombing services, and those selling authentication cookies for a slew of popular websites.

πŸ“– Read

via "Krebs on Security".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges ❌

McAfee has patched two high-severity bugs in its Agent component, one of which can allow attackers to achieve arbitrary code execution with SYSTEM privileges.

πŸ“– Read

via "Threat Post".
?
15:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 20K WordPress Sites Exposed by Insecure Plugin REST-API ❌

The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and phishing due to XSS.

πŸ“– Read

via "Threat Post".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4879 β€Ό

IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could allow a remote attacker to bypass security restrictions, caused by improper validation of authentication cookies. IBM X-Force ID: 190847.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2020-4877 β€Ό

IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could be vulnerable to unauthorized modifications by using public fields in public classes. IBM X-Force ID: 190843.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-46309 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Employee and Visitor Gate Pass Logging System 1.0 via the username parameter.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2020-4875 β€Ό

IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190838.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-46308 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Online Railway Reservation Sysytem 1.0 via the sid parameter.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-4016 β€Ό

Rapid7 Insight Agent, versions prior to 3.1.3, suffer from an improper access control vulnerability whereby, the user has access to the snapshot directory. An attacker can access, read and copy any of the files in this directory e.g. asset_info.json or file_info.json, leading to a loss of confidentiality. This issue was fixed in Rapid7 Insight Agent 3.1.3.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2020-4876 β€Ό

IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190839.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-0323 β€Ό

Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.

πŸ“– Read

via "National Vulnerability Database".
?
17:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 1/21 πŸ”

News on the Ukrainian wiper attack, MIcrosoft disables macros in Excel by default, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Merck Awarded $1.4B Insurance Payout over NotPetya Attack ❌

Court rules β€˜War or Hostile Acts’ exclusion doesn’t apply to the pharma giant's 2017 cyberattack.

πŸ“– Read

via "Threat Post".
17:42
πŸ•΄ REvil Ransomware Gang Arrests Trigger Uncertainty, Concern in Cybercrime Forums πŸ•΄

Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say.

πŸ“– Read

via "Dark Reading".
?
18:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40595 β€Ό

SQL injection vulnerability in Sourcecodester Online Leave Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /leave_system/classes/Login.php.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-33966 β€Ό

Cross site scripting (XSS) vulnerability in spotweb 1.4.9, allows authenticated attackers to execute arbitrary code via crafted GET request to the login page.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-31562 β€Ό

The SSL/TLS configuration of Fresenius Kabi Agilia Link + version 3.0 has serious deficiencies that may allow an attacker to compromise SSL/TLS sessions in different ways. An attacker may be able to eavesdrop on transferred data, manipulate data allegedly secured by SSL/TLS, and impersonate an entity to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-40247 β€Ό

SQL injection vulnerability in Sourcecodester Budget and Expense Tracker System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username field.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-44464 β€Ό

Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 contains service credentials likely to be common across all instances. An attacker in possession of the password may gain privileges on all installations of this software.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23128 β€Ό

Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-41835 β€Ό

Fresenius Kabi Agilia Link + version 3.0 does not enforce transport layer encryption. Therefore, transmitted data may be sent in cleartext. Transport layer encryption is offered on Port TCP/443, but the affected service does not perform an automated redirect from the unencrypted service on Port TCP/80 to the encrypted service.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23728 β€Ό

Attacker can reset the device with AT Command in the process of rebooting the device. The LG ID is LVE-SMP-210011.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-4001 β€Ό

A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-23130 β€Ό

Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33843 β€Ό

Fresenius Kabi Agilia Link + version 3.0 has a default configuration page accessible without authentication. An attacker may use this functionality to change the exposed configuration values such as network settings.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-23196 β€Ό

The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33846 β€Ό

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 issues authentication tokens to authenticated users that are signed with a symmetric encryption key. An attacker in possession of the key can issue valid JWTs and impersonate arbitrary users.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-23460 β€Ό

The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33848 β€Ό

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 is vulnerable to reflected cross-site scripting attacks. An attacker could inject JavaScript in a GET parameter of HTTP requests and perform unauthorized actions such as stealing internal information and performing actions in context of an authenticated user.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-23195 β€Ό

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 has the option for automated indexing (directory listing) activated. When accessing a directory, a web server delivers its entire content in HTML form. If an index file does not exist and directory listing is enabled, all content of the directory will be displayed, allowing an attacker to identify and access files on the server.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-44593 β€Ό

Simple College Website 1.0 is vulnerable to unauthenticated file upload & remote code execution via UNION-based SQL injection in the username parameter on /admin/login.php.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-23631 β€Ό

This affects all versions of package convert-svg-core; all versions of package convert-svg-to-png; all versions of package convert-svg-to-jpeg. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-23127 β€Ό

Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-23207 β€Ό

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.

πŸ“– Read

via "National Vulnerability Database".
?
18:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fraud Is On the Rise, and It's Going to Get Worse πŸ•΄

The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.

πŸ“– Read

via "Dark Reading".
18:45
❌ The Internet’s Most Tempting Targets ❌

What attracts the attackers? David "moose" Wolpoff, CTO at Randori, discusses how to evaluate your infrastructure for juicy targets.

πŸ“– Read

via "Threat Post".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46238 β€Ό

GPAC v1.1.0 was discovered to contain a stack overflow via the function gf_node_get_name () at scenegraph/base_scenegraph.c. This vulnerability can lead to a program crash, causing a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46313 β€Ό

The binary MP4Box in GPAC v1.0.1 was discovered to contain a segmentation fault via the function __memmove_avx_unaligned_erms (). This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46311 β€Ό

A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_destroy_routes () at scenegraph/vrml_route.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-22552 β€Ό

Dell EMC AppSync versions 3.9 to 4.3 contain a clickjacking vulnerability in AppSync. A remote unauthenticated attacker could potentially exploit this vulnerability to trick the victim into executing state changing operations.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46234 β€Ό

A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46243 β€Ό

An untrusted pointer dereference vulnerability exists in HDF5 v1.13.1-1 via the function H5O__dtype_decode_helper () at hdf5/src/H5Odtype.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46236 β€Ό

A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_vrml_field_pointer_del () at scenegraph/vrml_tools.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-22553 β€Ό

Dell EMC AppSync versions 3.9 to 4.3 contain an Improper Restriction of Excessive Authentication Attempts Vulnerability that can be exploited from UI and CLI. An adjacent unauthenticated attacker could potentially exploit this vulnerability, leading to password brute-forcing. Account takeover is possible if weak passwords are used by users.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46239 β€Ό

The binary MP4Box in GPAC v1.1.0 was discovered to contain an invalid free vulnerability via the function gf_free () at utils/alloc.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-22551 β€Ό

DELL EMC AppSync versions 3.9 to 4.3 use GET request method with sensitive query strings. An Adjacent, unauthenticated attacker could potentially exploit this vulnerability, and hijack the victim session.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46244 β€Ό

A Divide By Zero vulnerability exists in HDF5 v1.13.1-1 vis the function H5T__complete_copy () at /hdf5/src/H5T.c. This vulnerability causes an aritmetic exception, leading to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46237 β€Ό

An untrusted pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-36338 β€Ό

Unisphere for PowerMax versions prior to 9.2.2.2 contains a privilege escalation vulnerability. An adjacent malicious user could potentially exploit this vulnerability to escalate their privileges and access functionalities they do not have access to.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-36339 β€Ό

The Dell EMC Virtual Appliances before 9.2.2.2 contain undocumented user accounts. A local malicious user may potentially exploit this vulnerability to get privileged access to the virtual appliance.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-39480 β€Ό

Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46240 β€Ό

A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_dump_vrml_sffield () at scene_manager/scene_dump.c. This vulnerability can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-46242 β€Ό

HDF5 v1.13.1-1 was discovered to contain a heap-use-after free via the component H5AC_unpin_entry.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23837 β€Ό

In api.rb in Sidekiq before 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.

πŸ“– Read

via "National Vulnerability Database".
?
22:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23366 β€Ό

HMS v1.0 was discovered to contain a SQL injection vulnerability via patientlogin.php.

πŸ“– Read

via "National Vulnerability Database".
22:15
β€Ό CVE-2022-21708 β€Ό

graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. The issue has been patched in version `v1.3.0`. The only known workaround for this issue is to disable the `graphql.MaxDepth` option from your schema which is not recommended.

πŸ“– Read

via "National Vulnerability Database".
22 January 2022
?
03:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23808 β€Ό

An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.

πŸ“– Read

via "National Vulnerability Database".
03:13
β€Ό CVE-2022-23807 β€Ό

An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.

πŸ“– Read

via "National Vulnerability Database".
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4172 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.

πŸ“– Read

via "National Vulnerability Database".
23 January 2022
?
03:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4103 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 1.0.34.

πŸ“– Read

via "National Vulnerability Database".
?
08:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23850 β€Ό

xhtml_translate_entity in xhtml.c in epub2txt (aka epub2txt2) through 2.02 allows a stack-based buffer overflow via a crafted EPUB document.

πŸ“– Read

via "National Vulnerability Database".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46024 β€Ό

Projectworlds online-shopping-webvsite-in-php 1.0 suffers from a SQL Injection vulnerability via the "id" parameter in cart_add.php, No login is required.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-45380 β€Ό

AppCMS 2.0.101 has a XSS injection vulnerability in \templates\m\inc_head.php

πŸ“– Read

via "National Vulnerability Database".
24 January 2022
?
03:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23852 β€Ό

Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.

πŸ“– Read

via "National Vulnerability Database".
03:21
β€Ό CVE-2022-23858 β€Ό

In StarWind Command Center before V2 build 6021, an authenticated read-only user can elevate privileges to administrator through the REST API.

πŸ“– Read

via "National Vulnerability Database".