9 February 2022
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21986 β€Ό

.NET Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-21987 β€Ό

Microsoft SharePoint Server Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-23272 β€Ό

Microsoft Dynamics GP Elevation Of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23271, CVE-2022-23273.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-21974 β€Ό

Roaming Security Rights Management Services Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-23256 β€Ό

Azure Data Explorer Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-22005 β€Ό

Microsoft SharePoint Server Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-22718 β€Ό

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22717.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-21995 β€Ό

Windows Hyper-V Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-21993 β€Ό

Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-23254 β€Ό

Microsoft Power BI Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-21844 β€Ό

HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21926, CVE-2022-21927.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-21981 β€Ό

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22000.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-22712 β€Ό

Windows Hyper-V Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
17:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Telecom Alleges Theft of Radio Technology Trade Secrets πŸ”

New charges unsealed this week allege a China-based company stole valuable trade secrets – source code and hardware designs - over the course of 13 years.

πŸ“– Read

via "".
18:13
β€Ό CVE-2022-22566 β€Ό

Select Dell Client Commercial and Consumer platforms contain a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-41442 β€Ό

An HTTP smuggling attack in the web application of D-Link DIR-X1860 before v1.10WWB09_Beta allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-22567 β€Ό

Select Dell Client Commercial and Consumer platforms are vulnerable to an insufficient verification of data authenticity vulnerability. An authenticated malicious user may exploit this vulnerability in order to install modified BIOS firmware.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-36302 β€Ό

All Dell EMC Integrated System for Microsoft Azure Stack Hub versions contain a privilege escalation vulnerability. A remote malicious user with standard level JEA credentials may potentially exploit this vulnerability to elevate privileges and take over the system.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-21660 β€Ό

Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-45286 β€Ό

Directory Traversal vulnerability exists in ZZCMS 2021 via the skin parameter in 1) index.php, 2) bottom.php, and 3) top_index.php.

πŸ“– Read

via "National Vulnerability Database".
18:21
❌ 3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I ❌

Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.

πŸ“– Read

via "Threat Post".
?
19:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cybercriminals Swarm Windows Utility Regsvr32 to Spread Malware ❌

The living-off-the-land binary (LOLBin) is anchoring a rash of cyberattacks bent on evading security detection to drop Qbot and Lokibot.

πŸ“– Read

via "Threat Post".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Linux Malware on the Rise πŸ•΄

Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.

πŸ“– Read

via "Dark Reading".
19:54
πŸ•΄ Auth0 Credential Guard Detects Breached Passwords to Prevent Account Takeover πŸ•΄

New feature adds a dedicated security team and support for multiple languages to prevent fraudulent access with stolen credentials.

πŸ“– Read

via "Dark Reading".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23621 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23628 β€Ό

OPA is an open source, general-purpose policy engine. Under certain conditions, pretty-printing an abstract syntax tree (AST) that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths. **All of these** three conditions have to be met to create an adverse effect: 1. An AST of Rego had to be **created programmatically** such that it ends up containing terms without a location (such as wildcard variables). 2. The AST had to be **pretty-printed** using the `github.com/open-policy-agent/opa/format` package. 3. The result of the pretty-printing had to be **parsed and evaluated again** via an OPA instance using the bundles, or the Golang packages. If any of these three conditions are not met, you are not affected. Notably, all three would be true if using **optimized bundles**, i.e. bundles created with `opa build -O=1` or higher. In that case, the optimizer would fulfil condition (1.), the result of that would be pretty-printed when writing the bundle to disk, fulfilling (2.). When the bundle was then used, we'd satisfy (3.). As a workaround users may disable optimization when creating bundles.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23617 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23616 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for an unprivileged user to perform a remote code execution by injecting a groovy script in her own profile and by calling the Reset password feature since the feature is performing a save of the user profile with programming rights in the impacted versions of XWiki. The issue has been patched in XWiki 13.1RC1. There are two different possible workarounds, each consisting of modifying the XWiki/ResetPassword page. 1. The Reset password feature can be entirely disabled by deleting the XWiki/ResetPassword page. 2. The script in XWiki/ResetPassword can also be modified or removed: an administrator can replace it with a simple email contact to ask an administrator to reset the password.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23631 β€Ό

superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23618 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23615 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23622 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is a cross site scripting (XSS) vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: 1. The wiki must be open to registration for anyone. 2. The wiki must be closed to view for Guest users or more specifically the XWiki.Registration page must be forbidden in View for guest user. A way to obtain the second condition is when administrators checked the "Prevent unregistered users from viewing pages, regardless of the page rights" box in the administration rights. This issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3. There are two main ways for protecting against this vulnerability, the easiest and the best one is by applying a patch in the `registerinline.vm` template, the patch consists in checking the value of the xredirect field to ensure it matches: `<input type="hidden" name="xredirect" value="$escapetool.xml($!request.xredirect)" />`. If for some reason it's not possible to patch this file, another workaround is to ensure "Prevent unregistered users from viewing pages, regardless of the page rights" is not checked in the rights and apply a better right scheme using groups and rights on spaces.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23620 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like "../", "./". or "/" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-23619 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. This problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. Users are advised yo update. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
20:24
πŸ•΄ Experts: Several CVEs From Microsoft's February Security Update Require Prompt Attention πŸ•΄

Microsoft's release of relatively sparse vulnerability information makes it difficult for organizations to prioritize mitigation efforts, security experts say.

πŸ“– Read

via "Dark Reading".
?
20:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Putting AI to Practical Use in Cybersecurity πŸ•΄

Almost every cybersecurity product has an AI component. Here is where it's working in the real world.

πŸ“– Read

via "Dark Reading".
?
22:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Self-styled β€œCrocodile of Wall Street” arrested with husband over Bitcoin megaheist ⚠

The cops say they've recovered 80% of a $72 million cryptocoin heist... but the recovered funds alone are now worth over $4 billion!

πŸ“– Read

via "Naked Security".
22:13
β€Ό CVE-2021-33115 β€Ό

Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-0161 β€Ό

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33137 β€Ό

Out-of-bounds write in the Intel(R) Kernelflinger project may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33166 β€Ό

Incorrect default permissions for the Intel(R) RXT for Chromebook application, all versions, may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33096 β€Ό

Improper isolation of shared resources in network on chip for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-20027 β€Ό

In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126826; Issue ID: ALPS06126826.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-0173 β€Ό

Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-0092 β€Ό

Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33147 β€Ό

Improper conditions check in the Intel(R) IPP Crypto library before version 2021.2 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33113 β€Ό

Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-0103 β€Ό

Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-22954 β€Ό

A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-21133 β€Ό

Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33105 β€Ό

Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-22544 β€Ό

Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unauthorized execution of commands can lead to sensitive information disclosure, loss of system integrity and denial of service.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-33061 β€Ό

Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-0530 β€Ό

A flaw was found in unzip 6.0. The vulnerability occurs during the conversion of an utf-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-26616 β€Ό

An OS command injection was found in SecuwaySSL, when special characters injection on execute command with runCommand arguments.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-0118 β€Ό

Out-of-bounds read in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-20024 β€Ό

In system service, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219064; Issue ID: ALPS06219064.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-22532 β€Ό

In SAP NetWeaver Application Server Java - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, an unauthenticated attacker could submit a crafted HTTP server request which triggers improper shared memory buffer handling. This could allow the malicious payload to be executed and hence execute functions that could be impersonating the victim or even steal the victim's logon session.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-0169 β€Ό

Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-23049 β€Ό

Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the JavaScript will be triggered allowing an attacker to compromise the administrator session.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-20025 β€Ό

In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126832; Issue ID: ALPS06126832.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-21174 β€Ό

Improper access control in a third-party component of Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-37109 β€Ό

There is a security protection bypass vulnerability with the modem.Successful exploitation of this vulnerability may cause memory protection failure.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-24319 β€Ό

A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA web server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-20039 β€Ό

In ccu driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06183345; Issue ID: ALPS06183345.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-24320 β€Ό

A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA database server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-21226 β€Ό

Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-22536 β€Ό

SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-0072 β€Ό

Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-24668 β€Ό

A program using swift-nio-http2 is vulnerable to a denial of service attack caused by a network peer sending ALTSVC or ORIGIN frames. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. This vulnerability is caused by a logical error after frame parsing but before frame handling. ORIGIN and ALTSVC frames are not currently supported by swift-nio-http2, and should be ignored. However, one code path that encounters them has a deliberate trap instead. This was left behind from the original development process and was never removed. Sending an ALTSVC or ORIGIN frame does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send one of these frames. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send these frames, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself. This is a controlled, intentional crash. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-33139 β€Ό

Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-21203 β€Ό

Improper permissions in the SafeNet Sentinel driver for Intel(R) Quartus(R) Prime Standard Edition before version 21.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2022-20029 β€Ό

In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-33101 β€Ό

Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-0093 β€Ό

Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-0147 β€Ό

Improper locking in the Power Management Controller (PMC) for some Intel Chipset firmware before versions pmc_fw_lbg_c1-21ww02a and pmc_fw_lbg_b0-21ww02a may allow a privileged user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:19
β€Ό CVE-2021-33119 β€Ό

Improper access control in the Intel(R) RealSense(TM) DCM before version 20210625 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0170 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-24314 β€Ό

A CWE-125: Out-of-bounds Read vulnerability exists that could cause memory leaks potentially resulting in denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-40045 β€Ό

There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-24316 β€Ό

A CWE-665: Improper Initialization vulnerability exists that could cause information exposure when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-20030 β€Ό

In vow driver, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05837793; Issue ID: ALPS05837793.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0171 β€Ό

Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-22543 β€Ό

SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-21825 β€Ό

An Improper Access Control vulnerability exists in Citrix Workspace App for Linux 2012 - 2111 with App Protection installed that can allow an attacker to perform local privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-40015 β€Ό

There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0174 β€Ό

Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0117 β€Ό

Pointer issues in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-33107 β€Ό

Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-22533 β€Ό

Due to improper error handling in SAP NetWeaver Application Server Java - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, an attacker could submit multiple HTTP server requests resulting in errors, such that it consumes the memory buffer. This could result in system shutdown rendering the system unavailable.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0091 β€Ό

Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2022-20040 β€Ό

In power_hal_manager_service, there is a possible permission bypass due to a stack-based buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219150; Issue ID: ALPS06219150.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-39943 β€Ό

An authorization logic error in the External Status Check API in GitLab EE affecting all versions starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allowed a user to update the status of the check via an API call

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0116 β€Ό

Out-of-bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-0107 β€Ό

Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-20035 β€Ό

In vcu driver, there is a possible information disclosure due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171675; Issue ID: ALPS06171675.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-0166 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-22817 β€Ό

A CWE-276: Incorrect Default Permissions vulnerability exists that could cause unauthorized access to the base installation directory leading to local privilege escalation. Affected Product: Harmony/Magelis iPC Series (All Versions), Vijeo Designer (All Versions prior to V6.2 SP11 Multiple HotFix 4), Vijeo Designer Basic (All Versions prior to V1.2.1)

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-21156 β€Ό

Access of uninitialized pointer in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-20045 β€Ό

In Bluetooth, there is a possible service crash due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126820; Issue ID: ALPS06126820.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-0175 β€Ό

Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-40696 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-22542 β€Ό

S/4HANA Supplier Factsheet exposes the private address and bank details of an Employee Business Partner with Supplier Role, AND Enterprise Search for Customer, Supplier and Business Partner objects exposes the private address fields of Employee Business Partners, to an actor that is not explicitly authorized to have access to that information, which could compromise Confidentiality.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-20044 β€Ό

In Bluetooth, there is a possible service crash due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126814; Issue ID: ALPS06126814.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-33129 β€Ό

Incorrect default permissions in the software installer for the Intel(R) Advisor before version 2021.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-20031 β€Ό

In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-0168 β€Ό

Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-20038 β€Ό

In ccu driver, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06183335; Issue ID: ALPS06183335.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2021-0145 β€Ό

Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-22809 β€Ό

A CWE-306: Missing Authentication for Critical Function vulnerability exists that could allow modifications of the touch configurations in an unauthorized manner when an attacker attempts to modify the touch configurations. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)

πŸ“– Read

via "National Vulnerability Database".
22:26
β€Ό CVE-2022-22545 β€Ό

A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2021-0183 β€Ό

Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2021-39994 β€Ό

There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-0534 β€Ό

A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-22813 β€Ό

A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-20032 β€Ό

In vow driver, there is a possible memory corruption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05852822; Issue ID: ALPS05852822.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-22807 β€Ό

A CWE-1021 Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause unintended modifications of the product settings or user accounts when deceiving the user to use the web interface rendered within iframes. Affected Product: EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13)

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-20037 β€Ό

In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2021-0115 β€Ό

Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
22:32
⚠ S3 Ep69: WordPress woes, Wormhole holes, and a Microsoft change of heart [Podcast + Transcript] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
22:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Russian Govt. Continues Carding Shop Crackdown β™ŸοΈ

Russian authorities have arrested six men accused of operating some of the most active online bazaars for selling stolen payment card data. The crackdown -- the second closure of major card fraud shops by Russian authorities in as many weeks -- comes closely behind Russia's arrest of 14 alleged affiliates of the REvil ransomware gang, and has many in the cybercrime underground asking who might be next.

πŸ“– Read

via "Krebs on Security".
10 February 2022
?
11:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE ❌

The plug-in’s default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.

πŸ“– Read

via "Threat Post".
?
12:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45901 β€Ό

The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.

πŸ“– Read

via "National Vulnerability Database".
12:25
πŸ•΄ Bot Marketplaces as a Source of Future Data Breaches πŸ•΄

Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.

πŸ“– Read

via "Dark Reading".
12:25
πŸ•΄ Data Transparency Hasn't Made Us Safer Yet. Can It Uncover Breach Causality? πŸ•΄

Advanced machine learning models within an XDR framework could uncover what actually causes breaches, but first we need better data transparency.

πŸ“– Read

via "Dark Reading".
?
13:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SAP to Give Threat Briefing on Uber-Severe β€˜ICMAD’ Bugs ❌

SAP’s Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers to hijack identities, steal data and more.

πŸ“– Read

via "Threat Post".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  nfstream 6.4.1 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".
14:15
β€Ό CVE-2022-24111 β€Ό

In Mahara 21.04 before 21.04.3 and 21.10 before 21.10.1, portfolios created in groups that have not been shared with non-group members and portfolios created on the site and institution levels can be viewed without requiring a login if the URL to these portfolios is known.

πŸ“– Read

via "National Vulnerability Database".
14:15
πŸ—“οΈ Ransomware surge prompts joint NCSC, CISA warning to safeguard systems πŸ—“οΈ

Weekend attacks and assaults on the software supply chain mark evolving TTPs

πŸ“– Read

via "The Daily Swig".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Titaniam Secures $6 Million in Seed Funding πŸ•΄

Funding round led by Refinery Ventures, with participation from Fusion Fund and Shasta Ventures.

πŸ“– Read

via "Dark Reading".
15:55
πŸ•΄ Allure Security Raises $6.8 Million Seed Funding Round πŸ•΄

Funding led by Gutbrain Ventures.

πŸ“– Read

via "Dark Reading".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-20701 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0017 β€Ό

An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0019 β€Ό

An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target userΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20707 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-3398 β€Ό

Stormshield Network Security (SNS) 3.x has an Integer Overflow in the high-availability component.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20709 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20708 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20699 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0021 β€Ό

An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0020 β€Ό

A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0018 β€Ό

An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20703 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20712 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-37613 β€Ό

Stormshield Network Security (SNS) 1.0.0 through 4.2.3 allows a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20738 β€Ό

A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20704 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20702 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-45357 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Piwigo 12.x via the pwg_activity function in include/functions.inc.php.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-20706 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-0016 β€Ό

An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
16:31
πŸ—“οΈ Cryptocurrency firm MakerDAO offers record $10m in newly launched bug bounty program πŸ—“οΈ

Chance to become an instant multimillionaire via flaws in DAI smart contracts, websites, and apps

πŸ“– Read

via "The Daily Swig".
?
16:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Orca Security Adds Expanded CIEM Capabilities and Multi-Cloud Security Score to Cloud Platform πŸ•΄

Expands cloud infrastructure entitlement management capabilities, adds cloud security benchmarking, and support for Kubernetes compliance frameworks.

πŸ“– Read

via "Dark Reading".
16:55
πŸ•΄ Dynatrace Adds Real-Time Attack Detection and Blocking, Advancing Cloud Application Security πŸ•΄

Application Security Module unifies multicloud observability and advanced AIOps with real-time vulnerability management and defense.

πŸ“– Read

via "Dark Reading".
16:55
πŸ•΄ Dynatrace Launches DevSecOps Automation Alliance Partner Program πŸ•΄

Program enables alliance and solution partners to extend the capabilities of their DevSecOps offerings through seamless integrations with the Dynatrace platform.

πŸ“– Read

via "Dark Reading".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23321 β€Ό

A persistent cross-site scripting (XSS) vulnerability exists on two input fields within the administrative panel when editing users in the XMPie UStore application on version 12.3.7244.0.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-45364 β€Ό

A Code Execution vulnerability exists in Statamic Version through 3.2.26 via SettingsController.php.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-44850 β€Ό

On Xilinx Zynq-7000 SoC devices, physical modification of an SD boot image allows for a buffer overflow attack in the ROM. Because the Zynq-7000's boot image header is unencrypted and unauthenticated before use, an attacker can modify the boot header stored on an SD card so that a secure image appears to be unencrypted, and they will be able to modify the full range of register initialization values. Normally, these registers will be restricted when booting securely. Of importance to this attack are two registers that control the SD card's transfer type and transfer size. These registers could be modified a way that causes a buffer overflow in the ROM.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-24916 β€Ό

Optimism before @eth-optimism/l2geth@0.5.11 allows economic griefing because a balance is duplicated upon contract self-destruction.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-24568 β€Ό

Novel-plus v3.6.0 was discovered to be vulnerable to Server-Side Request Forgery (SSRF) via user-supplied crafted input.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-23630 β€Ό

Gradle is a build tool with a focus on build automation and support for multi-language development. In some cases, Gradle may skip that verification and accept a dependency that would otherwise fail the build as an untrusted external artifact. This occurs when dependency verification is disabled on one or more configurations and those configurations have common dependencies with other configurations that have dependency verification enabled. If the configuration that has dependency verification disabled is resolved first, Gradle does not verify the common dependencies for the configuration that has dependency verification enabled. Gradle 7.4 fixes that issue by validating artifacts at least once if they are present in a resolved configuration that has dependency verification active. For users who cannot update either do not use `ResolutionStrategy.disableDependencyVerification()` and do not use plugins that use that method to disable dependency verification for a single configuration or make sure resolution of configuration that disable that feature do not happen in builds that resolve configuration where the feature is enabled.

πŸ“– Read

via "National Vulnerability Database".
18:25
πŸ•΄ Defense Contractors Need to Check Their Six πŸ•΄

Companies overall met government standards, but poor credential management left vulnerabilities.

πŸ“– Read

via "Dark Reading".
?
19:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sharp SIM-Swapping Spike Causes $68M in Losses ❌

The attacks, which lead to 2FA defeat and account takeover, have accelerated by several hundred percent in one year, leading to thousands of drained bank accounts.

πŸ“– Read

via "Threat Post".
19:25
πŸ•΄ Apple Releases Security Update for Webkit Flaw πŸ•΄

A Webkit use-after-free vulnerability in iOS, iPadOS, Monterey, and Safari may already have been exploited, Apple said in a security advisory issued today.

πŸ“– Read

via "Dark Reading".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Credential-Stuffing Attacks on Remote Windows Systems Took Off in 2021 πŸ•΄

Password-guessing became last year's weapon of choice, as attackers attempted to brute-force vulnerable Remote Desktop Protocol (RDP) servers, SQL databases, and SMB file shares.

πŸ“– Read

via "Dark Reading".
?
20:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Decryptor Keys Published for Maze, Egregor, Sekhmet Ransomwares ❌

The Maze gang are purportedly never going back to ransomware and have destroyed all of their ransomware source code, said somebody claiming to be the developer.

πŸ“– Read

via "Threat Post".
20:25
πŸ•΄ Retailers' Offboarding Procedures Leave Potential Risks πŸ•΄

IT teams need to consider unforeseen threats to avoid violating privacy regulations and supplier contracts.

πŸ“– Read

via "Dark Reading".
20:28
β€Ό CVE-2022-0554 β€Ό

Use of Out-of-range Pointer Offset in Conda vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
?
22:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44969 β€Ό

Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component.

πŸ“– Read

via "National Vulnerability Database".
22:27
β€Ό CVE-2021-44970 β€Ό

MiniCMS v1.11 was discovered to contain a cross-site scripting (XSS) vulnerability via /mc-admin/page-edit.php.

πŸ“– Read

via "National Vulnerability Database".
22:27
β€Ό CVE-2021-42000 β€Ό

When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password.

πŸ“– Read

via "National Vulnerability Database".
22:27
β€Ό CVE-2022-24646 β€Ό

Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/contact.php via the txtMsg parameters.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-24647 β€Ό

Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.

πŸ“– Read

via "National Vulnerability Database".
11 February 2022
?
08:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24958 β€Ό

drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.

πŸ“– Read

via "National Vulnerability Database".
08:28
β€Ό CVE-2022-0557 β€Ό

OS Command Injection in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
08:28
β€Ό CVE-2022-24961 β€Ό

In Portainer Agent before 2.11.1, an API server can continue running even if not associated with a Portainer instance in the past few days.

πŸ“– Read

via "National Vulnerability Database".
08:28
β€Ό CVE-2022-24959 β€Ό

An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.

πŸ“– Read

via "National Vulnerability Database".
08:31
πŸ—“οΈ Tool trio released to protect JavaScript applications from malicious NPM packages πŸ—“οΈ

Security tools inspired by recent case where a package maintainer went rogue

πŸ“– Read

via "The Daily Swig".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep69: WordPress woes, Wormhole holes, and a Microsoft change of heart [Podcast + Transcript] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
10:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-30326 β€Ό

Possible assertion due to improper size validation while processing the DownlinkPreemption IE in an RRC Reconfiguration/RRC Setup message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30309 β€Ό

Improper size validation of QXDM commands can lead to memory corruption in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30318 β€Ό

Improper validation of input when provisioning the HDCP key can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-35075 β€Ό

Possible null pointer dereference due to lack of WDOG structure validation during registration in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30325 β€Ό

Possible out of bound access of DCI resources due to lack of validation process and resource allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-35074 β€Ό

Possible integer overflow due to improper fragment datatype while calculating number of fragments in a request message in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-35077 β€Ό

Possible use after free scenario in compute offloads to DSP while multiple calls spawn a dynamic process in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30322 β€Ό

Possible out of bounds write due to improper validation of number of GPIOs configured in an internal parameters array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30323 β€Ό

Improper validation of maximum size of data write to EFS file can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30324 β€Ό

Possible out of bound write due to lack of boundary check for the maximum size of buffer when sending a DCI packet to remote process in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-35068 β€Ό

Lack of null check while freeing the device information buffer in the Bluetooth HFP protocol can lead to a NULL pointer dereference in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-30317 β€Ό

Improper validation of program headers containing ELF metadata can lead to image verification bypass in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
10:28
β€Ό CVE-2021-35069 β€Ό

Improper validation of data length received from DMA buffer can lead to memory corruption. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Patches Actively Exploited WebKit Zero Day ❌

A memory issue affects myriad iPhone, iPad and MacOS devices and allows attackers to execute arbitrary code after processing malicious web content.

πŸ“– Read

via "Threat Post".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple zero-day drama for Macs, iPhones and iPads – patch now! ⚠

Sudden update! Zero-day browser hole! Drive-by malware danger! Patch Apple laptops and phones now...

πŸ“– Read

via "Naked Security".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Bowser’s jury: Nintendo Switch hacker sent behind bars, owes video game giant further $4.5m πŸ—“οΈ

Underground business sold jailbreak devices for consoles including the Nintendo Switch, 3DS, and Microsoft’s Xbox

πŸ“– Read

via "The Daily Swig".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What CISOs Should Tell the Board About Log4j πŸ•΄

It's time for a reset with the board of directors. Very few have a dedicated, board-level cybersecurity committee, which means cybersecurity isn't viewed as a critical executive function.

πŸ“– Read

via "Dark Reading".
12:29
β€Ό CVE-2022-0560 β€Ό

Open Redirect in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
12:29
β€Ό CVE-2021-46355 β€Ό

OCS Inventory 2.9.1 is affected by Cross Site Scripting (XSS). To exploit the vulnerability, the attacker needs to manipulate the name of some device on your computer, such as a printer, replacing the device name with some malicious code that allows the execution of Stored Cross-site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
12:29
β€Ό CVE-2022-24289 β€Ό

Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server. This can result in arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
12:29
β€Ό CVE-2021-44521 β€Ό

When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.

πŸ“– Read

via "National Vulnerability Database".
12:29
β€Ό CVE-2022-24112 β€Ό

An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.

πŸ“– Read

via "National Vulnerability Database".
12:29
β€Ό CVE-2021-38679 β€Ό

An improper authentication vulnerability has been reported to affect QNAP NAS running Kazoo Server. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.22 and later

πŸ“– Read

via "National Vulnerability Database".
?
12:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ BlackBerry Seeks to Restore Its Past Glory With Services Push πŸ•΄

Selling security software might prove easier than selling phones, but can BlackBerry outsmart its competition?

πŸ“– Read

via "Dark Reading".
13:08
πŸ›  nfstream 6.4.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".
13:08
πŸ›  Wireshark Analyzer 3.6.2 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 2/11 πŸ”

Modernizing HIPAA, online romance scams cost millions, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
16:28
β€Ό CVE-2021-22823 β€Ό

A CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause deletion of arbitrary files in the context of the user running IGSS due to lack of validation of network messages. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21320 and prior)

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2021-22806 β€Ό

A CWE-669: Incorrect Resource Transfer Between Spheres vulnerability exists that could cause data exfiltration and unauthorized access when accessing a malicious website. Affected Product: spaceLYnk (V2.6.1 and prior), Wiser for KNX (V2.6.1 and prior), fellerLYnk (V2.6.1 and prior)

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2022-23853 β€Ό

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2021-22804 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists that could cause disclosure of arbitrary files being read in the context of the user running IGSS, due to missing validation of user supplied data in network messages. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior)

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2022-23433 β€Ό

Improper access control vulnerability in Reminder prior to versions 12.3.01.3000 in Android S(12), 12.2.05.6000 in Android R(11) and 11.6.08.6000 in Andoid Q(10) allows attackers to register reminders or execute exporeted activities remotely.

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2022-23432 β€Ό

An improper input validation in SMC_SRPMB_WSM handler of RPMB ldfw prior to SMR Feb-2022 Release 1 allows arbitrary memory write and code execution.

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2022-24003 β€Ό

Exposure of Sensitive Information vulnerability in Bixby Vision prior to version 3.7.50.6 allows attackers to access internal data of Bixby Vision via unprotected intent.

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2022-24002 β€Ό

Improper Authorization vulnerability in Link Sharing prior to version 12.4.00.3 allows attackers to open protected activity via PreconditionActivity.

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2021-22785 β€Ό

A CWE-200: Information Exposure vulnerability exists that could cause sensitive information of files located in the web root directory to leak when an attacker sends a HTTP request to the web server of the device. Affected Product: Modicon M340 CPUs: BMXP34 (Versions prior to V3.40), Modicon M340 X80 Ethernet Communication Modules: BMXNOE0100 (H), BMXNOE0110 (H), BMXNOC0401, BMXNOR0200H RTU (All Versions), Modicon Premium Processors with integrated Ethernet (Copro): TSXP574634, TSXP575634, TSXP576634 (All Versions), Modicon Quantum Processors with Integrated Ethernet (Copro): 140CPU65xxxxx (All Versions), Modicon Quantum Communication Modules: 140NOE771x1, 140NOC78x00, 140NOC77101 (All Versions), Modicon Premium Communication Modules: TSXETY4103, TSXETY5103 (All Versions)

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2022-22292 β€Ό

Unprotected dynamic receiver in Telecom prior to SMR Feb-2022 Release 1 allows untrusted applications to launch arbitrary activity.

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2021-39663 β€Ό

In openFileAndEnforcePathPermissionsHelper of MediaProvider.java, there is a possible bypass of a permissions check due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-200682135

πŸ“– Read

via "National Vulnerability Database".
16:28
β€Ό CVE-2021-39619 β€Ό

In updatePackageMappingsData of UsageStatsService.java, there is a possible way to bypass security and privacy settings of app usage due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-197399948

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2022-23431 β€Ό

An improper boundary check in RPMB ldfw prior to SMR Feb-2022 Release 1 allows arbitrary memory write and code execution.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2022-24000 β€Ό

PendingIntent hijacking vulnerability in DataUsageReminderReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-22787 β€Ό

A CWE-20: Improper Input Validation vulnerability exists that could cause denial of service of the device when an attacker sends a specially crafted HTTP request to the web server of the device. Affected Product: Modicon M340 CPUs: BMXP34 (Versions prior to V3.40), Modicon M340 X80 Ethernet Communication Modules: BMXNOE0100 (H), BMXNOE0110 (H), BMXNOC0401, BMXNOR0200H RTU (All Versions), Modicon Premium Processors with integrated Ethernet (Copro): TSXP574634, TSXP575634, TSXP576634 (All Versions), Modicon Quantum Processors with Integrated Ethernet (Copro): 140CPU65xxxxx (All Versions), Modicon Quantum Communication Modules: 140NOE771x1, 140NOC78x00, 140NOC77101 (All Versions), Modicon Premium Communication Modules: TSXETY4103, TSXETY5103 (All Versions)

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-39665 β€Ό

In checkSpsUpdated of AAVCAssembler.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-204077881

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2022-23999 β€Ό

PendingIntent hijacking vulnerability in CpaReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-22802 β€Ό

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution due to missing length check on user supplied data, when a constructed message is received on the network. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior)

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-4046 β€Ό

The m_txtNom y m_txtCognoms parameters in TCMAN GIM v8.01 allow an attacker to perform persistent XSS attacks. This vulnerability could be used to carry out a number of browser-based attacks including browser hijacking or theft of sensitive data.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2022-0562 β€Ό

Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-4035 β€Ό

A stored cross site scripting have been identified at the comments in the report creation due to an obsolote version of tinymce editor. In order to exploit this vulnerability, the attackers needs an account with enough privileges to view and edit reports.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-39675 β€Ό

In GKI_getbuf of gki_buffer.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-205729183

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2022-23995 β€Ό

Unprotected component vulnerability in StBedtimeModeAlarmReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to change bedtime mode without a proper permission.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-22796 β€Ό

A CWE-287: Improper Authentication vulnerability exists that could allow remote code execution when a malicious file is uploaded. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2020-14521 β€Ό

Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2022-0185 β€Ό

A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-39677 β€Ό

In startVideoStream() there is a possibility of an OOB Read in the heap, when the camera buffer is Γ’β‚¬ΛœzeroÒ€ℒ in size.Product: AndroidVersions: Android-11Android ID: A-205097028

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-39688 β€Ό

In TBD of TBD, there is a possible out of bounds read due to TBD. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206039140References: N/A

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-39662 β€Ό

In checkUriPermission of MediaProvider.java , there is a possible way to gain access to the content of media provider collections due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-197302116

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-22824 β€Ό

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in denial of service, due to missing length check on user-supplied data from a constructed message received on the network. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21320 and prior)

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-24924 β€Ό

An improper access control in LiveWallpaperService prior to versions 3.0.9.0 allows to create a specific named system directory without a proper permission.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-45386 β€Ό

tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-24926 β€Ό

Improper input validation vulnerability in SmartTagPlugin prior to version 1.2.15-6 allows privileged attackers to trigger a XSS on a victim's devices.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-39664 β€Ό

In LoadedPackage::Load of LoadedArsc.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure when parsing an APK file with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-203938029

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-22798 β€Ό

A CWE-522: Insufficiently Protected Credentials vulnerability exists that could cause Sensitive data such as login credentials being exposed when a Network is sniffed. Affected Product: Conext? ComBox (All Versions)

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-23597 β€Ό

This affects the package fastify-multipart before 5.3.1. By providing a name=constructor property it is still possible to crash the application. **Note:** This is a bypass of CVE-2020-8136 (https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382).

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-24927 β€Ό

Improper privilege management vulnerability in Samsung Video Player prior to version 7.3.15.30 allows attackers to execute video files without permission.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-39666 β€Ό

In extract of MediaMetricsItem.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-204445255

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-23427 β€Ό

PendingIntent hijacking vulnerability in KnoxPrivacyNoticeReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission via implicit Intent.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-39671 β€Ό

In code generated by aidl_const_expressions.cpp, there is a possible out of bounds read due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-206718630

πŸ“– Read

via "National Vulnerability Database".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Google Project Zero hails dramatic acceleration in security bug remediation πŸ—“οΈ

Researchers credit greater transparency and responsible disclosure policies for improvements in the patching process

πŸ“– Read

via "The Daily Swig".
17:22
❌ Cybercrooks Frame Targets by Planting Fabricated Digital Evidence ❌

The β€˜ModifiedElephant’ threat actors are technically unimpressive, but they’ve evaded detection for a decade, hacking human rights advocates' systems with dusty old keyloggers and off-the-shelf RATs.

πŸ“– Read

via "Threat Post".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Paid Record $8.7 Million to Bug Hunters in 2021 πŸ•΄

Company's Chrome and Android technologies continued to be target-rich environments for security researchers from around the world.

πŸ“– Read

via "Dark Reading".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23555 β€Ό

The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.

πŸ“– Read

via "National Vulnerability Database".
18:28
β€Ό CVE-2022-22766 β€Ό

Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information.

πŸ“– Read

via "National Vulnerability Database".
18:28
β€Ό CVE-2022-24975 β€Ό

The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the "GitBleed" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option.

πŸ“– Read

via "National Vulnerability Database".
18:28
β€Ό CVE-2021-20001 β€Ό

It was discovered, that debian-edu-config, a set of configuration files used for the Debian Edu blend, before 2.12.16 configured insecure permissions for the user web shares (~/public_html), which could result in privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
18:28
β€Ό CVE-2020-26728 β€Ό

A vulnerability was discovered in Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN which allows for remote code execution via shell metacharacters in the guestuser field to the __fastcall function with a POST request.

πŸ“– Read

via "National Vulnerability Database".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical MQTT-Related Bugs Open Industrial Networks to RCE Via Moxa ❌

A collection of five security vulnerabilities with a collective CVSS score of 10 out of 10 threaten critical infrastructure environments that use Moxa MXview.

πŸ“– Read

via "Threat Post".
19:26
πŸ•΄ Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics πŸ•΄

New capabilities added to Aviatrix ThreatIQ improve enterprise security posture to reduce business risk.

πŸ“– Read

via "Dark Reading".
?
19:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attacks on a Tear in Q4 2021 πŸ•΄

New data from Kaspersky shows distributed denial-of-service attacks increased by more than 50% in the fourth quarter of last year compared with the third quarter.

πŸ“– Read

via "Dark Reading".
?
20:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24968 β€Ό

In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-46365 β€Ό

An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-46361 β€Ό

An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-46364 β€Ό

A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-46362 β€Ό

A Server-Side Template Injection (SSTI) vulnerability in the Registration and Forgotten Password forms of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted payload entered into the fullname parameter.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-46363 β€Ό

An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-46366 β€Ό

An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2022-23633 β€Ό

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2022-23634 β€Ό

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13 February 2022
?
20:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Sophos to launch new data centre in Mumbai πŸ“’

The cyber security company will help organisations to comply with strict data sovereignty laws and regulations

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Google Cloud adds cryptomining protection following widespread exploitation πŸ“’

In nearly all cases of compromised Google Cloud instances, cryptomining malware was installed within 22 seconds

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Linux-based multi-cloud environments facing increased ransomware attacks πŸ“’

VMware researchers claim not enough effort is being spent on developing countermeasures for attacks on the cloud's most popular operating system

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Washington State Department of Licensing hit by suspected data breach πŸ“’

The DOL temporarily disabled its POLARIS system to investigate a possible breach

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Apple bug allowed iPhones to inadvertently record Siri interactions πŸ“’

The flaw stored Siri recordings even if a user had opted out

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Online Safety Bill will require porn sites to verify age of UK users πŸ“’

However, internet users are concerned the proposal will threaten online privacy and open new opportunities for blackmail

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Building IT antibodies to fight future shocks πŸ“’

As enterprises look towards their post-COVID futures, they must ensure their IT systems are robust, secure, and resilient

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Google claims default 2FA reduced account breaches by 50% πŸ“’

The auto-enabled security mechanism was first introduced late last year

πŸ“– Read

via "ITPro".
20:12
πŸ“’ US seizes record $3.6 billion in Bitcoin from Bitfinex hack πŸ“’

The FBI has also arrested a married couple for allegedly conspiring to launder the stolen cryptocurrency

πŸ“– Read

via "ITPro".
20:12
πŸ“’ US indicts Indian call center scammers πŸ“’

Six call centers were responsible for millions of IRS and loan fraud scams, says DoJ

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Foreign Office hit by β€œserious cyber security incident” πŸ“’

The department sought urgent assistance from its security contractor in light of the "emergency"

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Microsoft's Patch Tuesday fixes 70 vulnerabilities after a troublesome January update πŸ“’

Microsoft will be hoping for a bug-free round of patches after admins complained of January's updates breaking more components than they fixed

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Swissport ransomware attack leads to flight delays πŸ“’

The attack is now 'under control' but raises questions around critical European businesses being targeted in recent weeks

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Microsoft disables VBA macros in Office by default following years of complaints πŸ“’

The move has been widely welcomed by the security industry, though concerns remain over the ease of implementation

πŸ“– Read

via "ITPro".
20:12
πŸ“’ DHS establishes the nation’s first Cyber Safety Review Board πŸ“’

The public-private initiative unites federal government and industry leaders to boost cyber security in the US

πŸ“– Read

via "ITPro".
20:12
πŸ“’ The top 12 password-cracking techniques used by hackers πŸ“’

Some of the most common, and most effective methods for stealing passwords

πŸ“– Read

via "ITPro".
20:12
πŸ“’ IRS backtracks on facial recognition plans following backlash πŸ“’

The turnabout was prompted by privacy concerns raised by taxpayers, lawmakers, and advocacy groups

πŸ“– Read

via "ITPro".
20:12
πŸ“’ Why software alone won’t solve the security crisis πŸ“’

The shift to remote working and emerging cyber threats have the potential to create a perfect storm. Endpoint security requires a new approach

πŸ“– Read

via "ITPro".
20:12
πŸ“’ China-backed hackers linked to News Corp cyber attack πŸ“’

Journalists at high-profile media organisations such as the Wall Street Journal and The Times were targeted in the attack linked to espionage activity

πŸ“– Read

via "ITPro".
20:12
πŸ“’ FBI warns of "sophisticated" LockBit 2.0 ransomware πŸ“’

Bureau warns of fast, automated organization-wide encryption capability

πŸ“– Read

via "ITPro".
14 February 2022
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple zero-day drama for Macs, iPhones and iPads – patch now! ⚠

Sudden update! Zero-day browser hole! Drive-by malware danger! Patch Apple laptops and phones now...

πŸ“– Read

via "Naked Security".
?
10:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0308 β€Ό

Use after free in Data Transfer in Google Chrome on Chrome OS prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2021-25014 β€Ό

The Ibtana WordPress plugin before 1.1.4.9 does not have authorisation and CSRF checks in the ive_save_general_settings AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin's settings which could lead to Stored Cross-Site Scripting issue.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0307 β€Ό

Use after free in Optimization Guide in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0212 β€Ό

The SpiderCalendar WordPress plugin through 1.5.65 does not sanitise and escape the callback parameter before outputting it back in the page via the window AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0575 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2021-25018 β€Ό

The PPOM for WooCommerce WordPress plugin before 24.0 does not have authorisation and CSRF checks in the ppom_settings_panel_action AJAX action, allowing any authenticated to call it and set arbitrary settings. Furthermore, due to the lack of sanitisation and escaping, it could lead to Stored XSS issues

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2021-44879 β€Ό

In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0300 β€Ό

Use after free in Text Input Method Editor in Google Chrome on Android prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2021-45444 β€Ό

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0291 β€Ό

Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0200 β€Ό

Themify Portfolio Post WordPress plugin before 1.1.7 does not sanitise and escape the num_of_pages parameter before outputting it back the response of the themify_create_popup_page_pagination AJAX action (available to any authenticated user), leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-22765 β€Ό

BD Viper LT system, versions 2.0 and later, contains hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). BD Viper LT system versions 4.0 and later utilize Microsoft Windows 10 and have additional Operating System hardening configurations which increase the attack complexity required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0176 β€Ό

The PowerPack Lite for Beaver Builder WordPress plugin before 1.2.9.3 does not sanitise and escape the tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0302 β€Ό

Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0311 β€Ό

Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2022-0310 β€Ό

Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.

πŸ“– Read

via "National Vulnerability Database".
10:33
β€Ό CVE-2022-0208 β€Ό

The MapPress Maps for WordPress plugin before 2.73.4 does not sanitise and escape the mapid parameter before outputting it back in the "Bad mapid" error message, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
10:33
β€Ό CVE-2021-25109 β€Ό

The Futurio Extra WordPress plugin before 1.6.3 is affected by a SQL Injection vulnerability that could be used by high privilege users to extract data from the database as well as used to perform Cross-Site Scripting (XSS) against logged in admins by making send open a malicious link.

πŸ“– Read

via "National Vulnerability Database".
10:33
β€Ό CVE-2022-24977 β€Ό

ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.

πŸ“– Read

via "National Vulnerability Database".
10:33
β€Ό CVE-2022-0304 β€Ό

Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-24446 β€Ό

The Remove Footer Credit WordPress plugin before 1.0.6 does not have CSRF check in place when saving its settings, which could allow attacker to make logged in admins change them and lead to Stored XSS issue as well due to the lack of sanitisation

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0206 β€Ό

The NewStatPress WordPress plugin before 1.3.6 does not properly escape the whatX parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0570 β€Ό

Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-25115 β€Ό

The WP Photo Album Plus WordPress plugin before 8.0.10 was vulnerable to Stored Cross-Site Scripting (XSS). Error log content was handled improperly, therefore any user, even unauthenticated, could cause arbitrary javascript to be executed in the admin panel.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0571 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-24976 β€Ό

Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0295 β€Ό

Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-25033 β€Ό

The WordPress Newsletter Plugin WordPress plugin before 1.6.5 does not validate the to parameter before redirecting the user to its given value, leading to an open redirect issue

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0301 β€Ό

Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-24874 β€Ό

The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.31 does not escape the lang and pid parameter before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0305 β€Ό

Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-25050 β€Ό

The Remove Footer Credit WordPress plugin before 1.0.11 does properly sanitise its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-0569 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in Packagist snipe/snipe-it prior to v5.3.9.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2022-24110 β€Ό

Kiteworks MFT 7.5 may allow an unauthorized user to reset other users' passwords. This is fixed in version 7.6 and later.

πŸ“– Read

via "National Vulnerability Database".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ New Zealand government mandates bug reporting process for federal agencies πŸ—“οΈ

Researchers can report vulnerabilities on a β€˜no blame’ basis

πŸ“– Read

via "The Daily Swig".
?
11:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Threat Intel: You're Soaking In It! πŸ•΄

Organizations need to improve their ability to detect and prevent emerging ransomware attacks.

πŸ“– Read

via "Dark Reading".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Power company pays out $3 trillion compensation to astonished customer ⚠

More money than the UK's economy produces in a year!

πŸ“– Read

via "Naked Security".
?
12:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Could Biology Hold the Clue to Better Cybersecurity? πŸ•΄

Sophisticated malware attacks underscore the need for a more dynamic security framework, inspired by biological concepts.

πŸ“– Read

via "Dark Reading".
12:33
β€Ό CVE-2021-45420 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced.

πŸ“– Read

via "National Vulnerability Database".
12:33
β€Ό CVE-2021-45421 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Emerson Dixell XWEB-500 products are affected by information disclosure via directory listing. A potential attacker can use this misconfiguration to access all the files in the remote directories. Note: the product has not been supported since 2018 and should be removed or replaced.

πŸ“– Read

via "National Vulnerability Database".
12:33
β€Ό CVE-2022-24686 β€Ό

HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. Fixed in 1.0.18, 1.1.12, and 1.2.6

πŸ“– Read

via "National Vulnerability Database".
?
13:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ (ISC)Β² to Pilot Online Proctored Exams for CISSP in U.S., U.K. and Singapore πŸ•΄

Second pilot program will assess feasibility and security of offering online exams to increase global accessibility for certification candidates.

πŸ“– Read

via "Dark Reading".
13:00
πŸ•΄ LogRhythm Unveils New Brand Identity πŸ•΄

Announcement comes in advance of new technology offerings in 2022.

πŸ“– Read

via "Dark Reading".
13:00
πŸ•΄ One Identity Enhances Unified Identity Security Platform with CIEM, Application Governance and Teams Modules πŸ•΄

Plans to further advance vision for end-to-end identity security.

πŸ“– Read

via "Dark Reading".
13:09
πŸ—“οΈ Missouri prosecutor declines to file charges over β€˜hacker’ allegation against reporter πŸ—“οΈ

Relief as controversial charges dropped tempered by fears about chilling effect

πŸ“– Read

via "The Daily Swig".
?
13:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe: Zero-Day Magento 2 RCE Bug Under Active Attack ❌

The vendor issued an emergency fix on Sunday, and eCommerce websites should update ASAP to avoid Magecart card-skimming attacks and other problems.

πŸ“– Read

via "Threat Post".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46371 β€Ό

antd-admin 5.5.0 is affected by an incorrect access control vulnerability. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information.

πŸ“– Read

via "National Vulnerability Database".
14:32
β€Ό CVE-2022-0512 β€Ό

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.

πŸ“– Read

via "National Vulnerability Database".
?
14:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜Cities: Skylines’ Gaming Modder Banned Over Hidden Malware ❌

35K+ players were exposed to an auto-updater that planted a trojan that choked performance for fellow modders and Colossal Order employees.

πŸ“– Read

via "Threat Post".
?
15:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Wazawaka Goes Waka Waka β™ŸοΈ

In January, KrebsOnSecurity examined clues left behind by "Wazawaka," the hacker handle chosen by a major ransomware criminal in the Russian-speaking cybercrime scene. Wazawaka has since "lost his mind" according to his erstwhile colleagues, creating a Twitter account to drop exploit code for a widely-used virtual private networking (VPN) appliance, and publishing bizarre selfie videos taunting security researchers and journalists. In last month's story, we explored clues that led from Wazawaka's multitude of monikers, email addresses, and passwords to a 30-something father in Abakan, Russia named Mikhail Pavlovich Matveev. This post concerns itself with the other half of Wazawaka's identities not mentioned in the first story, such as how Wazawaka also ran the Babuk ransomware affiliate program, and later becameΒ "Orange," the founder of the ransomware-focused Dark Web forum known as "RAMP."

πŸ“– Read

via "Krebs on Security".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22854 β€Ό

An access control issue in hprms/admin/?page=user/list of Hospital Patient Record Management System v1.0 allows attackers to escalate privileges via accessing and editing the user list.

πŸ“– Read

via "National Vulnerability Database".
16:32
β€Ό CVE-2022-23367 β€Ό

Fulusso v1.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in /BindAccount/SuccessTips.js. This vulnerability allows attackers to inject malicious code into a victim user's device via open redirection.

πŸ“– Read

via "National Vulnerability Database".
16:32
β€Ό CVE-2021-39079 β€Ό

IBM Cognos Analytics Mobile for Android applications prior to version 1.1.14 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 215592.

πŸ“– Read

via "National Vulnerability Database".
16:32
β€Ό CVE-2021-45392 β€Ό

A Buffer Overflow vulnerability exists in Tenda Router AX12 V22.03.01.21_CN in the sub_422CE4 function in page /goform/setIPv6Status via the prefixDelegate parameter, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
16:32
β€Ό CVE-2021-39080 β€Ό

Due to weak obfuscation, IBM Cognos Analytics Mobile for Android application prior to version 1.1.14 , an attacker could be able to reverse engineer the codebase to gain knowledge about the programming technique, interface, class definitions, algorithms and functions used. IBM X-Force ID: 215593.

πŸ“– Read

via "National Vulnerability Database".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Federal Advisory Highlights Increased Globalized Ransomware Threat πŸ”

A joint advisory on ransomware issued by the FBI, CISA, and the NSA recapped ransomware activity in 2021 and showed why the threat continues to loom large for enterprises.

πŸ“– Read

via "".
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0579 β€Ό

Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.9.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2019-16864 β€Ό

CompleteFTPService.exe in the server in EnterpriseDT CompleteFTP before 12.1.4 allows Remote Code Execution by leveraging a Windows user account that has SSH access. The exec command is always run as SYSTEM.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2022-25150 β€Ό

In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2022-24988 β€Ό

In galois_2p8 before 0.1.2, PrimitivePolynomialField::new has an off-by-one buffer overflow for a vector.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-45347 β€Ό

An Incorrect Access Control vulnerability exists in zzcms 8.2, which lets a malicious user bypass authentication by changing the user name in the cookie to use any password.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-45346 β€Ό

A Memory Leak vulnerabilty exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicous user obtain sensitive information..

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-43106 β€Ό

A Header Injection vulnerability exists in Compass Plus TranzWare Online FIMI Web Interface Tranzware Online (TWO) 5.3.33.3 F38 and FIMI 4.2.19.4 25.The HTTP host header can be manipulated and cause the application to behave in unexpected ways. Any changes made to the header would just cause the request to be sent to a completely different Domain/IP address. This is due to that the server implicitly trusts the Host header, and fails to validate or escape it properly. An attacker can use this input to redirect target users to a malicious domain/web page. This would result in expanding the potential to further attacks and malicious actions.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-45348 β€Ό

An Arbitrary File Deletion vulnerability exists in SourceCodester Attendance Management System v1.0 via the csv parameter in admin/pageUploadCSV.php, which can cause a Denial of Service (crash).

πŸ“– Read

via "National Vulnerability Database".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 of the Biggest Cybersecurity M&As & Investment Deals in 2021 πŸ•΄

There were more financial deals in cybersecurity last year than in any previous year.

πŸ“– Read

via "Dark Reading".
19:30
πŸ•΄ San Francisco 49ers Hit With a Ransomware Attack πŸ•΄

AP report says NFL team organization acknowledged a "network security incident" that affected its corporate IT network.

πŸ“– Read

via "Dark Reading".
19:40
⚠ Adobe fixes zero-day exploit in e-commerce code: update now! ⚠

There's a remote code execution hole in Adobe e-commerce products - and cybercrooks are already exploiting it.

πŸ“– Read

via "Naked Security".
?
20:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23638 β€Ό

svg-sanitizer is a SVG/XML sanitizer written in PHP. A cross-site scripting vulnerability impacts all users of the `svg-sanitizer` library prior to version 0.15.0. This issue is fixed in version 0.15.0. There is currently no workaround available.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2021-46463 β€Ό

njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23336 β€Ό

S-CMS v5.0 was discovered to contain a SQL injection vulnerability in member_pay.php via the O_id parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2021-46461 β€Ό

njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-0583 β€Ό

Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23389 β€Ό

PublicCMS v4.0 was discovered to contain a remote code execution (RCE) vulnerability via the cmdarray parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23902 β€Ό

Tongda2000 v11.10 was discovered to contain a SQL injection vulnerability in export_data.php via the d_name parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23410 β€Ό

AXIS IP Utility prior to 4.17.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23992 β€Ό

XCOM Data Transport for Windows, Linux, and UNIX 11.6 releases contain a vulnerability due to insufficient input validation that could potentially allow remote attackers to execute arbitrary commands with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-24206 β€Ό

Tongda2000 v11.10 was discovered to contain a SQL injection vulnerability in /mobile_seal/get_seal.php via the DEVICE_LIST parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-24704 β€Ό

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23391 β€Ό

A cross-site scripting (XSS) vulnerability in Pybbs v6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Search box.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2021-45005 β€Ό

Artifex MuJS v1.1.3 was discovered to contain a heap buffer overflow which is caused by conflicting JumpList of nested try/finally statements.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23390 β€Ό

An issue in the getType function of BBS Forum v5.3 and below allows attackers to upload arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23335 β€Ό

Metinfo v7.5.0 was discovered to contain a SQL injection vulnerability in language_general.class.php via doModifyParameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23337 β€Ό

DedeCMS v5.7.87 was discovered to contain a SQL injection vulnerability in article_coonepage_rule.php via the ids parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-23637 β€Ό

K-Box is a web-based application to manage documents, images, videos and geodata. Prior to version 0.33.1, a stored Cross-Site-Scripting (XSS) vulnerability is present in the markdown editor used by the document abstract and markdown file preview. A specifically crafted anchor link can, if clicked, execute untrusted javascript actions, like retrieving user cookies. Version 0.33.1 includes a patch that allows discarding unsafe links.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2021-46462 β€Ό

njs through 0.7.1, used in NGINX, was discovered to contain a segmentation violation via njs_object_set_prototype in /src/njs_object.c.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-22295 β€Ό

Metinfo v7.5.0 was discovered to contain a SQL injection vulnerability in parameter_admin.class.php via the table_para parameter.

πŸ“– Read

via "National Vulnerability Database".
20:33
β€Ό CVE-2022-25139 β€Ό

njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.

πŸ“– Read

via "National Vulnerability Database".
?
23:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ BlackByte Tackles the SF 49ers & US Critical Infrastructure ❌

Hours before the Superbowl and two days after the FBI warned about the ransomware gang, BlackByte leaked what are purportedly the NFL team's files.

πŸ“– Read

via "Threat Post".
15 February 2022
?
03:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43940 β€Ό

Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

πŸ“– Read

via "National Vulnerability Database".
03:33
β€Ό CVE-2021-43950 β€Ό

Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view import source configuration information via a Broken Access Control vulnerability in the Insight Import Source feature. The affected versions are before version 4.21.0.

πŸ“– Read

via "National Vulnerability Database".
03:33
β€Ό CVE-2021-43952 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint. The affected versions are before version 8.21.0.

πŸ“– Read

via "National Vulnerability Database".
03:33
β€Ό CVE-2021-43948 β€Ό

Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view the names of private objects via an Improper Authorization vulnerability in the "Move objects" feature. The affected versions are before version 4.21.0.

πŸ“– Read

via "National Vulnerability Database".
03:33
β€Ό CVE-2021-43941 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify several resources (including CsvFieldMappingsPage.jspa and ImporterValueMappingsPage.jspa) via a Cross-Site Request Forgery (CSRF) vulnerability in the jira-importers-plugin. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.

πŸ“– Read

via "National Vulnerability Database".
03:33
β€Ό CVE-2021-43953 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to toggle the Thread Contention and CPU monitoring settings via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/ViewInstrumentation.jspa endpoint. The affected versions are before version 8.21.0.

πŸ“– Read

via "National Vulnerability Database".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46557 β€Ό

Vicidial 2.14-783a was discovered to contain a cross-site scripting (XSS) vulnerability via the input tabs.

πŸ“– Read

via "National Vulnerability Database".
10:34
β€Ό CVE-2021-46558 β€Ό

Multiple cross-site scripting (XSS) vulnerabilities in the Add User module of Issabel PBX 20200102 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the username and password fields.

πŸ“– Read

via "National Vulnerability Database".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TA2541: APT Has Been Shooting RATs at Aviation for Years ❌

Since 2017, the attacker has flung simple off-the-shelf malware in malicious email campaigns aimed at aviation, aerospace, transportation and defense.

πŸ“– Read

via "Threat Post".
11:39
πŸ—“οΈ Grafana web security vulnerability opened a plethora of attack possibilities πŸ—“οΈ

Visualize this

πŸ“– Read

via "The Daily Swig".
?
12:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Make Cybersecurity Effective and Invisible πŸ•΄

Cybersecurity should be a shield that protects the business, not a barrier that holds it back.

πŸ“– Read

via "Dark Reading".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23317 β€Ό

CobaltStrike <=4.5 HTTP(S) listener does not determine whether the request URL begins with "/", and attackers can obtain relevant information by specifying the URL.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2022-0596 β€Ό

Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2022-23384 β€Ό

YzmCMS v6.3 is affected by Cross Site Request Forgery (CSRF) in /admin.add

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2021-42712 β€Ό

Splashtop Streamer through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2022-0597 β€Ό

Open Redirect in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2022-24586 β€Ό

A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2021-41552 β€Ό

CommScope URFboard SBG6950AC2 9.1.103AA23 devices allow Command Injection.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2021-43734 β€Ό

kkFileview v4.0.0 has arbitrary file read through a directory traversal vulnerability which may lead to sensitive file leak on related host.

πŸ“– Read

via "National Vulnerability Database".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ New tool can uncover redacted, pixelated text to reveal sensitive data πŸ—“οΈ

Developer warns that redaction method is insecure

πŸ“– Read

via "The Daily Swig".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google announces zero-day in Chrome browser – update now! ⚠

Zero-day buses: none for a while, then three at once. Here's Google joining Apple and Adobe in "zero-day week"

πŸ“– Read

via "Naked Security".
14:34
β€Ό CVE-2022-24587 β€Ό

A stored cross-site scripting (XSS) vulnerability in the component core/admin/medias.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-24684 β€Ό

HashiCorp Nomad and Nomad Enterprise before 1.0.17, 1.1.x before 1.1.12, and 1.2.x before 1.2.6 has Uncontrolled Resource Consumption.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2021-44960 β€Ό

In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-24585 β€Ό

A stored cross-site scripting (XSS) vulnerability in the component /core/admin/comment.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the author parameter.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-24227 β€Ό

A cross-site scripting (XSS) vulnerability in BoltWire v7.10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-24226 β€Ό

Hospital Management System v4.0 was discovered to contain a blind SQL injection vulnerability via the register function in func2.php.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-24590 β€Ό

A stored cross-site scripting (XSS) vulnerability in the Add Link function of BackdropCMS v1.21.1 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-24588 β€Ό

Flatpress v1.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability in the Upload SVG File function.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-21698 β€Ό

client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2022-23604 β€Ό

x26-Cogs is a repository of cogs made by Twentysix for the Red Discord bot. Among these cogs is the Defender cog, a tool for Discord server moderation. A vulnerability in the Defender cog prior to version 1.10.0 allows users with admin privileges to issue commands as other users who share the same server. If a bot owner shares the same server as the attacker, it is possible for the attacker to issue bot-owner restricted commands. The issue has been patched in version 1.10.0. One may unload the Defender cog as a workaround.

πŸ“– Read

via "National Vulnerability Database".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Critical Software Development Security Trends and Best Practices πŸ•΄

Organizations should focus on proactive, development-based approaches to security.

πŸ“– Read

via "Dark Reading".
?
15:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chrome Zero-Day Under Active Attack: Patch ASAP ❌

The year's 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems.

πŸ“– Read

via "Threat Post".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability πŸ•΄

A rogue help-desk employee could gain access to user accounts through unauthorized password resets. It's time to bring zero trust to the help desk.

πŸ“– Read

via "Dark Reading".
16:35
β€Ό CVE-2022-25200 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Checkmarx Plugin 2022.1.2 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25195 β€Ό

A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-22770 β€Ό

The Web Server component of TIBCO Software Inc.'s TIBCO AuditSafe contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to execute API methods on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO AuditSafe: versions 1.1.0 and below.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25208 β€Ό

A missing permission check in Jenkins Chef Sinatra Plugin 1.20 and earlier allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse an XML response.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25191 β€Ό

Jenkins Agent Server Parameter Plugin 1.0 and earlier does not escape parameter names of agent server parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25210 β€Ό

Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25197 β€Ό

Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25196 β€Ό

Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25178 β€Ό

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25198 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins SCP publisher Plugin 1.8 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25187 β€Ό

Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25211 β€Ό

A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25179 β€Ό

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25205 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25212 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25183 β€Ό

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the names of Pipeline libraries to create cache directories without any sanitization, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted library names if a global Pipeline library configured to use caching already exists.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25206 β€Ό

A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25181 β€Ό

A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM contents, if a global Pipeline library already exists.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25201 β€Ό

Missing permission checks in Jenkins Checkmarx Plugin 2022.1.2 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2022-25209 β€Ό

Jenkins Chef Sinatra Plugin 1.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

πŸ“– Read

via "National Vulnerability Database".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Red Canary Launches Partner Program πŸ•΄

Red Canary Partner Connect will unite a diverse ecosystem of incident response, risk and managed services partners.

πŸ“– Read

via "Dark Reading".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46264 β€Ό

Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the onlineList module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-42713 β€Ό

Splashtop Remote Client (Personal Edition) through 3.4.6.1 creates a Temporary File in a Directory with Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-42714 β€Ό

Splashtop Remote Client (Business Edition) through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-46263 β€Ό

Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the wifiTime module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-46262 β€Ό

Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the PPPoE module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-46321 β€Ό

Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the wifiBasicCfg module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2022-24589 β€Ό

Burden v3.0 was discovered to contain a stored cross-site scripting (XSS) in the Add Category function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the task parameter.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2022-23639 β€Ό

crossbeam-utils provides atomics, synchronization primitives, scoped threads, and other utilities for concurrent programming in Rust. crossbeam-utils prior to version 0.8.7 incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause unaligned memory accesses and data race. Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue. 32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue. This has been fixed in crossbeam-utils 0.8.7. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-46265 β€Ό

Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the wanBasicCfg module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-37354 β€Ό

Xerox Phaser 4622 v35.013.01.000 was discovered to contain a buffer overflow in the function sub_3226AC via the TIMEZONE variable. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
18:34
β€Ό CVE-2021-33945 β€Ό

RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
?
19:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Nonprofits Can Continue to Evade Ransomware Attacks πŸ•΄

Just as small businesses can't be complacent, nonprofits also need to prepare for cyberattacks.

πŸ“– Read

via "Dark Reading".
?
19:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Machine Learning in 2022: Data Threats and Backdoors? πŸ•΄

While research illustrates some sly threats, experts say attackers will likely focus on data exposure and finding ways to fool algorithms.

πŸ“– Read

via "Dark Reading".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SquirrelWaffle Adds a Twist of Fraud to Exchange Server Malspamming ❌

Researchers have never before seen SquirrelWaffle attackers use typosquatting to keep sending spam once a targeted Exchange server has been patched for ProxyLogon/ProxyShell.

πŸ“– Read

via "Threat Post".
20:02
πŸ•΄ FBI, US Secret Service Issue Mitigations for BlackByte Ransomware πŸ•΄

Joint Cybersecurity Advisory from federal law enforcement includes indicators of compromise associated with the ransomware variant.

πŸ“– Read

via "Dark Reading".
?
20:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Akamai To Acquire Linode πŸ•΄

Akamai will discuss the acquisition on its Q4 and year end 2021 financial results conference call today, February 15, at 4:30 p.m. ET.

πŸ“– Read

via "Dark Reading".
20:32
πŸ•΄ Securonix Secures Over $1B in Growth Investment From Vista Equity πŸ•΄

Deal is the second one topping $1 billion since November and sets the stage for what could be another record-breaking year for investment in the cybersecurity industry.

πŸ“– Read

via "Dark Reading".
20:35
β€Ό CVE-2022-23643 β€Ό

Sourcegraph is a code search and navigation engine. Sourcegraph versions 3.35 and 3.36 reintroduced a previously fixed side-channel vulnerabilitity in the Code Monitoring feature where strings in private source code could be guessed by an authenticated but unauthorized actor. This issue affects only the Code Monitoring feature, whereas CVE-2021-43823 also affected saved searches. A successful attack would require an authenticated bad actor to create many Code Monitors to receive confirmation that a specific string exists. This could allow an attacker to guess formatted tokens in source code, such as API keys. This issue was patched in versions 3.35.2 and 3.36.3 of Sourcegraph. Those who are unable to upgrade may disable the Code Monitor feature in their installation.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2022-23641 β€Ό

Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2021-35380 β€Ό

A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).

πŸ“– Read

via "National Vulnerability Database".
?
22:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46251 β€Ό

A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit 1603f04e44ef67dde6ccffe866d2dca16defb293 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
22:34
β€Ό CVE-2021-46250 β€Ό

An issue in SOA2Login::commented of ScratchOAuth2 before commit a91879bd58fa83b09283c0708a1864cdf067c64a allows attackers to authenticate as other users on downstream components that rely on ScratchOAuth2.

πŸ“– Read

via "National Vulnerability Database".
22:34
β€Ό CVE-2021-46252 β€Ό

A Cross-Site Request Forgery (CSRF) in RequirementsBypassPage.php of Scratch Wiki scratch-confirmaccount-v3 allows attackers to modify account request requirement bypasses.

πŸ“– Read

via "National Vulnerability Database".
22:34
β€Ό CVE-2022-0611 β€Ό

Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.11.

πŸ“– Read

via "National Vulnerability Database".
22:34
β€Ό CVE-2021-46249 β€Ό

An authorization bypass exploited by a user-controlled key in SpecificApps REST API in ScratchOAuth2 before commit d856dc704b2504cd3b92cf089fdd366dd40775d6 allows app owners to set flags that indicate whether an app is verified on their own apps.

πŸ“– Read

via "National Vulnerability Database".
?
23:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Google announces zero-day in Chrome browser – update now! ⚠

Zero-day buses: none for a while, then three at once. Here's Google joining Apple and Adobe in "zero-day week"

πŸ“– Read

via "Naked Security".
16 February 2022
?
03:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25242 β€Ό

In FileCloud before 21.3, file upload is not protected against Cross-Site Request Forgery (CSRF).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2022-25236 β€Ό

xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2022-25241 β€Ό

In FileCloud before 21.3, the CSV user import functionality is vulnerable to Cross-Site Request Forgery (CSRF).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2022-25235 β€Ό

xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.

πŸ“– Read

via "National Vulnerability Database".
?
10:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Infineon’s Latest Chip Tackles Post-Quantum Security πŸ•΄

Infineon’s latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.

πŸ“– Read

via "Dark Reading".
?
10:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23358 β€Ό

EasyCMS v1.6 allows for SQL injection via ArticlemAction.class.php. In the background, search terms provided by the user were not sanitized and were used directly to construct a SQL statement.

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2021-46388 β€Ό

WAGO 750-8212 PFC200 G2 2ETH RS Firmware version 03.05.10(17) is affected by a privilege escalation vulnerability. Improper handling of user cookies leads to escalating privileges to administrative account of the router.

πŸ“– Read

via "National Vulnerability Database".
10:35
β€Ό CVE-2022-0559 β€Ό

Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
?
10:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Emotet Now Spreading Through Malicious Excel Files ❌

An ongoing malicious email campaign that includes macro-laden files and multiple layers of obfuscation has been active since late December.

πŸ“– Read

via "Threat Post".
?
11:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Poisoned pipelines: Security researcher explores attack methods in CI environments πŸ—“οΈ

Attack vector abuses permissions to force CI pipelines to execute arbitrary commands

πŸ“– Read

via "The Daily Swig".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Be Flexible About Where People Work β€” But Not on Data Privacy πŸ•΄

If your policies don't keep up with your work models, your company's sensitive information could be at risk.

πŸ“– Read

via "Dark Reading".
12:03
πŸ•΄ Hybrid Work Accelerated Fraud; Now, CSOs Are Taking a Seat at the Executive Table πŸ•΄

The days of security as a second-class citizen are over.

πŸ“– Read

via "Dark Reading".
?
12:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45391 β€Ό

A Buffer Overflow vulnerability exists in Tenda Router AX12 V22.03.01.21_CN in the sub_422CE4 function in the goform/setIPv6Status binary file /usr/sbin/httpd via the conType parameter, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
12:45
πŸ—“οΈ MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications πŸ—“οΈ

Social engineering technique confuses victims to gain entry to their accounts

πŸ“– Read

via "The Daily Swig".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity RCE Bug Found in Popular Apache Cassandra Database ❌

On the plus side, only instances with non-standard not recommended configurations are vulnerable. On the downside, those configurations aren't easy to track down, and it's easy as pie to exploit.

πŸ“– Read

via "Threat Post".
13:25
❌ Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers ❌

A group of five security vulnerabilities could lead to a range of bad outcomes for virtual-machine enthusiasts, including command execution and DoS.

πŸ“– Read

via "Threat Post".
?
13:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Red Cross Hack Linked to Iranian Influence Operation? β™ŸοΈ

A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was used to register multiple domain names the FBI says are tied to a sprawling media influence operation originating from Iran.

πŸ“– Read

via "Krebs on Security".
14:03
πŸ•΄ Where AI Falls Down in Cybersecurity πŸ•΄

Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.

πŸ“– Read

via "Dark Reading".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-26726 β€Ό

A remote code execution vulnerability affecting a Valmet DNA service listening on TCP port 1517, allows an attacker to execute commands with SYSTEM privileges This issue affects: Valmet DNA versions from Collection 2012 until Collection 2021.

πŸ“– Read

via "National Vulnerability Database".
14:41
⚠ VMWare fixes holes that could allow virtual machine escapes ⚠

Hats off to VMWare for not using weasel words: "When should you act?" Immediately...

πŸ“– Read

via "Naked Security".
?
15:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Laminar Announces General Availability of Cloud Data Security Platform πŸ•΄

Solution monitors and protects public cloud data.

πŸ“– Read

via "Dark Reading".
15:34
πŸ•΄ DoD Awards Attivo Networks Contract for Ransomware Mitigation πŸ•΄

Contract extends Attivo’s strategic support to the three major branches of the DoD – Air Force, Army, and Navy.

πŸ“– Read

via "Dark Reading".
15:34
πŸ•΄ SANS Institute Launches Cybersecurity Education Scholarship for HBCU Students and Alumni πŸ•΄

Applications will be open throughout all Black History Month and accepted until March 1, 2022.

πŸ“– Read

via "Dark Reading".
?
16:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Fight the Novel Software Supply Chain Attacks of Tomorrow πŸ•΄

In the past year, attackers have focused on the lucrative supply chain. Organizations need to defend against such attacks, even inside their perimeters.

πŸ“– Read

via "Dark Reading".
16:04
πŸ•΄ Pixelating Text Leads to Information Leakage, Warns Firm πŸ•΄

Blurring text isn't enough to obscure sensitive information. An offensive-security firm releases a tool showing how information can still be exposed.

πŸ“– Read

via "Dark Reading".
16:08
πŸ” Semiconductor Firm Again Alleges IP Theft πŸ”

The company has defended its confidential and proprietary information and trade secrets in the past.

πŸ“– Read

via "".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-6920 β€Ό

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23190 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-21966 β€Ό

An information disclosure vulnerability exists in the HTTP Server /ping.html functionality of Texas Instruments CC3200 SimpleLink Solution NWP 2.9.0.0. A specially-crafted HTTP request can lead to an uninitialized read. An attacker can send an HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23195 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23193 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3648 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-39298 β€Ό

Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23188 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a buffer overflow vulnerability due to insecure handling of a crafted malicious file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted malicious file in Illustrator.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23189 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-39299 β€Ό

Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-24086 β€Ό

Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-6918 β€Ό

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-22945 β€Ό

VMware NSX Edge contains a CLI shell injection vulnerability. A malicious actor with SSH access to an NSX-Edge appliance can execute arbitrary commands on the operating system as root.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3551 β€Ό

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23198 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23186 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-23803 β€Ό

A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadXYCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-39300 β€Ό

Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2022-0617 β€Ό

A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-21958 β€Ό

A heap-based buffer overflow vulnerability exists in the Hword HwordApp.dll functionality of Hancom Office 2020 11.0.0.2353. A specially-crafted malformed file can lead to memory corruption and potential arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2022-24663 β€Ό

PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via WordPress shortcodes, which can be used by any authenticated user.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2019-4351 β€Ό

IBM Maximo Anywhere 7.6.4.0 applications could disclose sensitive information to a user with physical access to the device. IBM X-Force ID: 161493.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2021-22041 β€Ό

VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2021-22050 β€Ό

ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2020-6922 β€Ό

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2019-4291 β€Ό

IBM Maximo Anywhere 7.6.4.0 could allow an attacker to reverse engineer the application due to the lack of binary protection precautions. IBM X-Force ID: 160697.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2021-3557 β€Ό

A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2022-23194 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2022-23804 β€Ό

A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2022-23199 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2020-6921 β€Ό

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2021-39301 β€Ό

Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2021-4106 β€Ό

A vulnerability in Snow Inventory Java Scanner allows an attacker to run malicious code at a higher level of privileges. This issue affects: SNOW Snow Inventory Java Scanner 1.0

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2021-22042 β€Ό

VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2022-23202 β€Ό

Adobe Creative Cloud Desktop version 2.7.0.13 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must download a malicious DLL file. The attacker has to deliver the DLL on the same folder as the installer which makes it as a high complexity attack vector.

πŸ“– Read

via "National Vulnerability Database".
16:42
β€Ό CVE-2022-23203 β€Ό

Adobe Photoshop versions 22.5.4 (and earlier) and 23.1 (and earlier) are affected by a buffer overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Photoshop.

πŸ“– Read

via "National Vulnerability Database".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Massive LinkedIn Phishing, Bot Attacks Feed on the Job-Hungry ❌

The phishing attacks are spoofing LinkedIn to target β€˜Great Resignation’ job hunters, who are also being preyed on by huge data-scraping bot attacks.

πŸ“– Read

via "Threat Post".
18:36
β€Ό CVE-2021-3242 β€Ό

DuxCMS v3.1.3 was discovered to contain a SQL injection vulnerability via the component s/tools/SendTpl/index?keyword=.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3760 β€Ό

A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3773 β€Ό

A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2022-25258 β€Ό

An issue was discovered in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3752 β€Ό

A use-after-free flaw was found in the Linux kernelÒ€ℒs Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2022-25255 β€Ό

In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3578 β€Ό

A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3560 β€Ό

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2022-23644 β€Ό

BookWyrm is a decentralized social network for tracking reading habits and reviewing books. The functionality to load a cover via url is vulnerable to a server-side request forgery attack. Any BookWyrm instance running a version prior to v0.3.0 is susceptible to attack from a logged-in user. The problem has been patched and administrators should upgrade to version 0.3.0 As a workaround, BookWyrm instances can close registration and limit members to trusted individuals.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3781 β€Ό

A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3753 β€Ό

A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TrickBot Ravages Customers of Amazon, PayPal and Other Top Brands ❌

The resurgent trojan has targeted 60 top companies to harvest credentials for a wide range of applications, with an eye to virulent follow-on attacks.

πŸ“– Read

via "Threat Post".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24982 β€Ό

Forms generated by JQueryForm.com before 2022-02-05 allows a remote authenticated attacker to access the cleartext credentials of all other form users. admin.php contains a hidden base64-encoded string with these credentials.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-24981 β€Ό

A reflected cross-site scripting (XSS) vulnerability in forms generated by JQueryForm.com before 2022-02-05 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter to admin.php.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-22881 β€Ό

Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-22885 β€Ό

Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43302 β€Ό

Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-22880 β€Ό

Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-24983 β€Ό

Forms generated by JQueryForm.com before 2022-02-05 allow remote attackers to obtain the URI to any uploaded file by capturing the POST response. When chained with CVE-2022-24984, this could lead to unauthenticated remote code execution on the underlying web server. This occurs because the Unique ID field is contained in the POST response upon submitting a form.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43301 β€Ό

Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43299 β€Ό

Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-24985 β€Ό

Forms generated by JQueryForm.com before 2022-02-05 allows a remote authenticated attacker to bypass authentication and access the administrative section of other forms hosted on the same web server. This is relevant only when an organization hosts more than one of these forms on their server.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-24984 β€Ό

Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-25265 β€Ό

In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43303 β€Ό

Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-23636 β€Ό

Wasmtime is an open source runtime for WebAssembly & WASI. Prior to versions 0.34.1 and 0.33.1, there exists a bug in the pooling instance allocator in Wasmtime's runtime where a failure to instantiate an instance for a module that defines an `externref` global will result in an invalid drop of a `VMExternRef` via an uninitialized pointer. A number of conditions listed in the GitHub Security Advisory must be true in order for an instance to be vulnerable to this issue. Maintainers believe that the effective impact of this bug is relatively small because the usage of `externref` is still uncommon and without a resource limiter configured on the `Store`, which is not the default configuration, it is only possible to trigger the bug from an error returned by `mprotect` or `VirtualAlloc`. Note that on Linux with the `uffd` feature enabled, it is only possible to trigger the bug from a resource limiter as the call to `mprotect` is skipped. The bug has been fixed in 0.34.1 and 0.33.1 and users are encouraged to upgrade as soon as possible. If it is not possible to upgrade to version 0.34.1 or 0.33.1 of the `wasmtime` crate, it is recommend that support for the reference types proposal be disabled by passing `false` to `Config::wasm_reference_types`. Doing so will prevent modules that use `externref` from being loaded entirely.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43300 β€Ό

Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

πŸ“– Read

via "National Vulnerability Database".
?
22:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25271 β€Ό

Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2022-25270 β€Ό

The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.

πŸ“– Read

via "National Vulnerability Database".
17 February 2022
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0623 β€Ό

Out-of-bounds Read in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
?
09:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Port of LA’s new Cyber Resilience Center aims to bolster physical and digital supply chain defenses πŸ—“οΈ

β€˜We must take every precaution against potential cyber incidents’, port director tells The Daily Swig

πŸ“– Read

via "The Daily Swig".
?
09:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ VMWare fixes holes that could allow virtual machine escapes ⚠

Hats off to VMWare for not using weasel words: "When should you act?" Immediately...

πŸ“– Read

via "Naked Security".
?
10:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0629 β€Ό

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
10:37
β€Ό CVE-2021-46368 β€Ό

TRIGONE Remote System Monitor 3.61 is vulnerable to an unquoted path service allowing local users to launch processes with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Russian nation-state hackers targeting US contractors for sensitive defense information, FBI warns πŸ—“οΈ

Cybersecurity and military secrets among documents accessed

πŸ“– Read

via "The Daily Swig".
11:26
❌ Microsoft Teams Targeted With Takeover Trojans ❌

Threat actors are infiltrating the increasingly popular collaboration app to attach malicious files to chat threads that drop system-hijacking malware.

πŸ“– Read

via "Threat Post".
11:26
❌ Kill Cloud Risk: Get Everybody to Stop Fighting Over App Security – Podcast ❌

When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt share tips on quashing all the squabbling.

πŸ“– Read

via "Threat Post".
?
12:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Keys to Bridging the Gap Between Security and Developers πŸ•΄

Security personnel's priority is protecting the organization. Developers are trying to hit tight timelines. Here's how both groups can get get their needs met.

πŸ“– Read

via "Dark Reading".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23318 β€Ό

A heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact.

πŸ“– Read

via "National Vulnerability Database".
12:37
β€Ό CVE-2022-22899 β€Ό

Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service.

πŸ“– Read

via "National Vulnerability Database".
12:37
β€Ό CVE-2022-23319 β€Ό

A segmentation fault during PCF file parsing in pcf2bdf versions >=1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This crash affects the availability of the software and dependent downstream components.

πŸ“– Read

via "National Vulnerability Database".
?
13:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Microsoft bolsters Edge browser security with enhanced features πŸ—“οΈ

Latest protections unveiled

πŸ“– Read

via "The Daily Swig".
13:26
❌ Ukrainian DDoS Attacks Should Put US on Notice–Researchers ❌

On Tuesday, institutions central to Ukraine’s military and economy were hit with denial-of-service (DoS) attacks. Impact was limited, but the ramifications are not.

πŸ“– Read

via "Threat Post".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-20659 β€Ό

A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2022-20653 β€Ό

A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2021-44868 β€Ό

A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2022-20750 β€Ό

A vulnerability in the checkpoint manager implementation of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow an unauthenticated, remote attacker to cause the checkpoint manager process to restart upon receipt of malformed TCP data. This vulnerability is due to improper input validation of an ingress TCP packet. An attacker could exploit this vulnerability by sending crafted TCP data to the affected application. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the checkpoint manager process restarting.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2022-23632 β€Ό

Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. Version 2.6.1 contains a patch for this issue. As a workaround, one may add the FDQN to the host rule. However, there is no workaround if the CNAME flattening is enabled.

πŸ“– Read

via "National Vulnerability Database".
14:41
⚠ S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript] ⚠

Latest episode - listen and learn!

πŸ“– Read

via "Naked Security".
14:56
❌ Baby Golang-Based Botnet Already Pulling in $3K/Month for Operators ❌

Kraken has already spread like wildfire, but in the past few months, the malware's author has been tinkering away, adding more infostealers and backdoors.

πŸ“– Read

via "Threat Post".
15:05
πŸ•΄ Software-Developer Security Vendor Snyk Buys Cloud Security Company πŸ•΄

Acquisition helps expand Snyk into the cloud security sector.

πŸ“– Read

via "Dark Reading".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24683 β€Ό

HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-39034 β€Ό

IBM MQ 9.1 LTS is vulnerable to a denial of service attack caused by an issue within the channel process. IBM X-Force ID: 213964.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2022-0638 β€Ό

Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2022-0639 β€Ό

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.

πŸ“– Read

via "National Vulnerability Database".
?
19:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Teams Expect Attackers to Go After End Users First πŸ•΄

Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Reading’s Endpoint Security Survey.

πŸ“– Read

via "Dark Reading".
?
19:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Confluera Cloud Research Finds Cybersecurity Concern as Biggest Obstacle to Cloud and Multicloud Adoption πŸ•΄

Meanwhile, 84% of IT leaders are optimistic about their cybersecurity readiness for 2022.

πŸ“– Read

via "Dark Reading".
19:35
πŸ•΄ Attackers Hone Their Playbooks, Become More Agile πŸ•΄

Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.

πŸ“– Read

via "Dark Reading".
19:35
πŸ•΄ Darktrace Artificial Intelligence Stops Cyberattack at Italian Electronics Distributor πŸ•΄

Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.

πŸ“– Read

via "Dark Reading".
19:35
πŸ•΄ Neustar Security Services Report Highlights Shifts in Threat Landscape Amid Maturing Cybercrime Economy πŸ•΄

Carpet bombing attacks increase sharply in 2021, along with complex multivector attacks.

πŸ“– Read

via "Dark Reading".
?
20:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSA Issues Guidance for Selecting Strong Cisco Password Types πŸ•΄

Poorly protected passwords in device configuration files present a risk of compromise, agency says.

πŸ“– Read

via "Dark Reading".
20:37
β€Ό CVE-2022-22914 β€Ό

An incorrect access control issue in the component FileManager of Ovidentia CMS 6.0 allows authenticated attackers to to view and download content in the upload directory via path traversal.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-45382 β€Ό

A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-46319 β€Ό

Remote Code Execution (RCE) vulnerability exists in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicious users can use this vulnerability to use "\ " or backticks to bypass the shell metacharacters in the ssid0 or ssid1 parameters to execute arbitrary commands.This vulnerability is due to the fact that CVE-2019-17509 is not fully patched and can be bypassed by using line breaks or backticks on its basis.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-46314 β€Ό

A Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetNetworkTomographySettings.php of D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin because backticks can be used for command injection when judging whether it is a reasonable domain name.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2022-22916 β€Ό

O2OA v6.4.7 was discovered to contain a remote code execution (RCE) vulnerability via /x_program_center/jaxrs/invoke.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2022-23646 β€Ό

Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-46315 β€Ό

Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetWizardConfig.php in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicoius users can use this vulnerability to use "\ " or backticks in the shell metacharacters in the ssid0 or ssid1 parameters to cause arbitrary command execution. Since CVE-2019-17510 vulnerability has not been patched and improved www/hnap1/control/setwizardconfig.php, can also use line breaks and backquotes to bypass.

πŸ“– Read

via "National Vulnerability Database".
18 February 2022
?
03:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25313 β€Ό

In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2022-22922 β€Ό

TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2022-25315 β€Ό

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2022-25314 β€Ό

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-46108 β€Ό

D-Link DSL-2730E CT-20131125 devices allow XSS via the username parameter to the password page in the maintenance configuration.

πŸ“– Read

via "National Vulnerability Database".
?
09:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Lagging behind? New study highlights weaknesses in open source patch process πŸ—“οΈ

Patch delays create a β€˜window of opportunity’ for observant attackers

πŸ“– Read

via "The Daily Swig".
?
10:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0660 β€Ό

Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
?
10:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iranian State Broadcaster Clobbered by β€˜Clumsy, Buggy’ Code ❌

Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of Iran’s Supreme Leader was a clumsy and unsophisticated wiper attack.

πŸ“– Read

via "Threat Post".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Severe WordPress Plug-In UpdraftPlus Bug Threatens Backups ❌

An oversight in a WordPress plug-in exposes PII and authentication data to malicious insiders.

πŸ“– Read

via "Threat Post".
?
11:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Critical vulnerabilities in Zabbix Web Frontend allow authentication bypass, code execution on servers πŸ—“οΈ

Patch now to protect, say researchers

πŸ“– Read

via "The Daily Swig".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ If the Cloud Is More Secure, Then Why Is Everything Still Broken? πŸ•΄

The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.

πŸ“– Read

via "Dark Reading".
12:36
πŸ•΄ Ransomware Adds New Wrinkle in Russian Cybercrime Market πŸ•΄

Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.

πŸ“– Read

via "Dark Reading".
12:39
β€Ό CVE-2022-0664 β€Ό

Use of Hard-coded Cryptographic Key in Go github.com/gravitl/netmaker prior to 0.8.5,0.9.4,0.10.0,0.10.1.

πŸ“– Read

via "National Vulnerability Database".
12:39
β€Ό CVE-2022-25299 β€Ό

This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.

πŸ“– Read

via "National Vulnerability Database".
12:39
β€Ό CVE-2022-25298 β€Ό

This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.

πŸ“– Read

via "National Vulnerability Database".
12:40
β€Ό CVE-2022-0451 β€Ό

Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.

πŸ“– Read

via "National Vulnerability Database".
12:40
β€Ό CVE-2021-46372 β€Ό

Scoold 1.47.2 is a Q&A/knowledge base platform written in Java. When writing a Q&A, the markdown editor is vulnerable to a XSS attack when using uppercase letters.

πŸ“– Read

via "National Vulnerability Database".
12:40
β€Ό CVE-2022-0631 β€Ό

Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript] ⚠

Latest episode - listen and learn!

πŸ“– Read

via "Naked Security".
13:37
πŸ•΄ Enterprises Look Beyond Antivirus Software for Remote Workers πŸ•΄

Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.

πŸ“– Read

via "Dark Reading".
?
14:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Critical RCE Bug Found in Adobe Commerce, Magento ❌

Adobe updated its recent out-of-band security advisory to add another critical bug, while researchers put out a PoC for the one it emergency-fixed last weekend.

πŸ“– Read

via "Threat Post".
14:38
β€Ό CVE-2022-0666 β€Ό

CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
14:38
β€Ό CVE-2022-23647 β€Ό

Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.

πŸ“– Read

via "National Vulnerability Database".
14:46
πŸ—“οΈ Red Cross servers β€˜were hacked via unpatched ManageEngine flaw’ πŸ—“οΈ

Humanitarian organization failed to apply fix rolled out a couple of months earlier

πŸ“– Read

via "The Daily Swig".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Irony alert! PHP fixes security flaw in input validation code ⚠

What's wrong with this sequence? 1. Step into the road 2. Check if it's safe 3. Keep on walki...

πŸ“– Read

via "Naked Security".
?
16:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Free Cybersecurity Tools and Services List Published by CISA πŸ•΄

The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.

πŸ“– Read

via "Dark Reading".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why You Need An Adversary-First Approach to Threats in the Cloud πŸ•΄

Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.

πŸ“– Read

via "Dark Reading".
16:40
β€Ό CVE-2021-3930 β€Ό

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2021-39026 β€Ό

IBM Guardium Data Encryption (GDE) 5.0.0.2 and 5.0.0.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 213964.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-24445 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-21196 β€Ό

MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not perform proper authorization and authentication checks on multiple API routes. An attacker may gain access to these API routes and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-25322 β€Ό

ZEROF Web Server 2.0 allows /HandleEvent SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-21176 β€Ό

MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input, which may allow an attacker to perform a SQL injection and obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-0671 β€Ό

A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2016-2124 β€Ό

A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-21215 β€Ό

This vulnerability could allow an attacker to force the server to create and execute a web request granting access to backend APIs that are only accessible to the Mimosa MMP server, or request pages that could perform some actions themselves. The attacker could force the server into accessing routes on those cloud-hosting platforms, accessing secret keys, changing configurations, etc. Affecting MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-25336 β€Ό

Ibexa DXP ezsystems/ezpublish-kernel 7.5.x before 7.5.26 and 1.3.x before 1.3.12 allows Insecure Direct Object Reference (IDOR) attacks against image files because the image path and filename can be correctly deduced.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-25335 β€Ό

RigoBlock Dragos through 2022-02-17 lacks the onlyOwner modifier for setMultipleAllowances. This enables token manipulation, as exploited in the wild in February 2022. NOTE: although 2022-02-17 is the vendor's vulnerability announcement date, the vulnerability will not be remediated until a major protocol upgrade occurs.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-25337 β€Ό

Ibexa DXP ezsystems/ezpublish-kernel 7.5.x before 7.5.26 and 1.3.x before 1.3.12 allows injection attacks via image filenames.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-23981 β€Ό

The vulnerability allows Subscriber+ level users to create brands in WordPress Perfect Brands for WooCommerce plugin (versions <= 2.0.4).

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2021-45401 β€Ό

A Command injection vulnerability exists in Tenda AC10U AC1200 Smart Dual-band Wireless Router AC10U V1.0 Firmware V15.03.06.49_multi via the setUsbUnload functionality. The vulnerability is caused because the client controlled "deviceName" value is passed directly to the "doSystemCmd" function.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-21800 β€Ό

MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2021-20320 β€Ό

A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-21143 β€Ό

MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input on several locations, which may allow an attacker to inject arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-23982 β€Ό

The vulnerability discovered in WordPress Perfect Brands for WooCommerce plugin (versions <= 2.0.4) allows server information exposure.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2022-25323 β€Ό

ZEROF Web Server 2.0 allows /admin.back XSS.

πŸ“– Read

via "National Vulnerability Database".
16:40
πŸ” Friday Five 2/18 πŸ”

Tech worker burnout, banning Pegasus, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
?
18:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24370 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader Foxit reader 11.0.1.0719 macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14819.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46646 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. Crafted data in a DGN file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15532.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46594 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15388.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46615 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15409.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46648 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15534.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46603 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15397.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46651 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15537.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46597 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15391.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46609 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15403.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46647 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15533.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46653 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15539.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46645 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. Crafted data in a BMP image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15531.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46642 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15514.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46654 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15540.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46610 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15404.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2022-24359 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15702.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46591 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15385.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46636 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. Crafted data in a DGN file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15508.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46607 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15401.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-46605 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15399.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-46621 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of JT files. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15415.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-46625 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of JT files. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15455.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-46622 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K image can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15416.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-46655 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15630.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-46601 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15395.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-46606 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15400.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-0543 β€Ό

It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-24047 β€Ό

This vulnerability allows remote attackers to bypass authentication on affected installations of BMC Track-It! 20.21.01.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-14618.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46633 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15463.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2022-24052 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2022-24048 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2022-24059 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. Crafted data in a DCM file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-15098.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2022-24060 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. Crafted data in a DCM file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15099.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46613 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15407.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2022-24050 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46620 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FBX files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15414.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46596 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15390.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46617 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF images. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15411.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46626 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K image can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15456.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46612 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15406.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2022-24046 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the anacapd daemon. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15828.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2021-46586 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15380.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2021-46618 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15412.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2021-46650 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15536.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2021-46627 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15457.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2021-46619 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15413.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2021-46623 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15453.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2022-24049 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the ALAC audio codec. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15798.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2022-24058 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. Crafted data in a J2K file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15095.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46649 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15535.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46582 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15376.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46643 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15515.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2022-24064 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro 11.8.8.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15161.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46614 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15408.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46629 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15459.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46632 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15462.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46624 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15454.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46589 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15383.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2022-24063 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro 13.2.0.21165. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15105.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2021-46631 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF images. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15461.

πŸ“– Read

via "National Vulnerability Database".
?
20:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40841 β€Ό

A Path Traversal vulnerability for a log file in LiveConfig 2.12.2 allows authenticated attackers to read files on the underlying server.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-40840 β€Ό

A Stored XSS issue exists in the admin/users user administration form in LiveConfig 2.12.2.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2022-23228 β€Ό

Pexip Infinity before 27.0 has improper WebRTC input validation. An unauthenticated remote attacker can use excessive resources, temporarily causing denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2022-25358 β€Ό

A ..%2F path traversal vulnerability exists in the path handler of awful-salmonella-tar before 0.0.4. Attackers can only list directories (not read files). This occurs because the safe-path? Scheme predicate is not used for directories.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-46110 β€Ό

Online Shopping Portal v3.1 was discovered to contain multiple time-based SQL injection vulnerabilities via the email and contactno parameters.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2022-23649 β€Ό

Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-29655 β€Ό

Pexip Infinity Connect before 1.8.0 omits certain provisioning authenticity checks. Thus, untrusted code may execute.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-29656 β€Ό

Pexip Infinity Connect before 1.8.0 mishandles TLS certificate validation. The allow list is not properly checked.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2022-23645 β€Ό

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2022-23650 β€Ό

Netmaker is a platform for creating and managing virtual overlay networks using WireGuard. Prior to versions 0.8.5, 0.9.4, and 010.0, there is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server if the exploiter know the address and username of the admin. This effects the server (netmaker) component, and not clients. This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
?
22:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2017-0371 β€Ό

MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 allows remote attackers to discover the IP addresses of Wiki visitors via a style="background-image: attr(title url);" attack within a DIV element that has an attacker-controlled URL in the title attribute.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25134 β€Ό

A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25130 β€Ό

A command injection vulnerability in the function updateWifiInfo of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25131 β€Ό

A command injection vulnerability in the function recvSlaveCloudCheckStatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-45082 β€Ό

An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25133 β€Ό

A command injection vulnerability in the function isAssocPriDevice of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25135 β€Ό

A command injection vulnerability in the function recv_mesh_info_sync of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25132 β€Ό

A command injection vulnerability in the function meshSlaveDlfw of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-23642 β€Ό

Sourcegraph is a code search and navigation engine. Sourcegraph prior to version 3.37 is vulnerable to remote code execution in the `gitserver` service. The service acts as a git exec proxy, and fails to properly restrict calling `git config`. This allows an attacker to set the git `core.sshCommand` option, which sets git to use the specified command instead of ssh when they need to connect to a remote system. Exploitation of this vulnerability depends on how Sourcegraph is deployed. An attacker able to make HTTP requests to internal services like gitserver is able to exploit it. This issue is patched in Sourcegraph version 3.37. As a workaround, ensure that requests to gitserver are properly protected.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25137 β€Ό

A command injection vulnerability in the function recvSlaveUpgstatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2022-25136 β€Ό

A command injection vulnerability in the function meshSlaveUpdate of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-44302 β€Ό

BaiCloud-cms v2.5.7 was discovered to contain multiple SQL injection vulnerabilities via the tongji and baidu_map parameters in /user/ztconfig.php.

πŸ“– Read

via "National Vulnerability Database".
19 February 2022
?
03:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25365 β€Ό

Docker Desktop before 4.5.1 on Windows allows attackers to move arbitrary files. NOTE: this issue exists because of an incomplete fix for CVE-2022-23774.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2022-24980 β€Ό

An issue was discovered in the Kitodo.Presentation (aka dif) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any file or webpage the webserver has access to.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2022-0409 β€Ό

Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2022-25366 β€Ό

Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2016-20013 β€Ό

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2022-24979 β€Ό

An issue was discovered in the Varnishcache extension before 2.0.1 for TYPO3. The Edge Site Includes (ESI) content element renderer component does not include an access check. This allows an unauthenticated user to render various content elements, resulting in insecure direct object reference (IDOR), with the potential of exposing internal content elements.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2022-25256 β€Ό

SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.

πŸ“– Read

via "National Vulnerability Database".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0678 β€Ό

Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0630 β€Ό

Out-of-bounds Read in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
12:39
β€Ό CVE-2022-0632 β€Ό

NULL Pointer Dereference in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0690 β€Ό

Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2016-1239 β€Ό

duck before 0.10 did not properly handle loading of untrusted code from the current directory..

πŸ“– Read

via "National Vulnerability Database".
20 February 2022
?
00:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ IT Pro News In Review: Nvidia breaks off Arm deal, FCDO security attack, Microsoft to disable VBA πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Moving forward in a work from anywhere world πŸ“’

A gorilla guide

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Texas sues Facebook for misusing facial recognition data πŸ“’

State wants up to $25,000 per alleged violation for discontinued program

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Mid-sized businesses on hackers’ 2022 hit list, cyber agencies warn πŸ“’

Cyber criminals are "shifting away from big-game hunting", say FBI and NCSC

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Google doubles bug bounty rewards for Linux, Kubernetes exploits πŸ“’

The increased rewards are said to align better with the community's expectations of a bug bounty programme of this kind

πŸ“– Read

via "ITPro".
00:45
πŸ“’ What is aΒ 502 bad gateway and how do you fix it? πŸ“’

We explain what this networking error means for users and website owners

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Apple users told to update their devices to fix critical WebKit flaw πŸ“’

The security flaw allowed code execution on a range of devices and represents the third major vulnerability to be patched by Apple this year

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Google and competition watchdog agree on rules governing cookie policy changes πŸ“’

The news comes as the European Publishers Council (EPC) issued a European Commission antitrust complaint against Google

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Coinbase Super Bowl marketing stunt prompts debate over QR code security πŸ“’

Experts are torn over QR codes and whether the cyber security threat they theoretically present is actually enough to warrant genuine concern in real-world scenarios

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Google Chrome update fixes zero-day under active exploitation πŸ“’

Google releases a fresh wave of patches for severe vulnerabilities that could facilitate code execution and system takeover via Google Chrome

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Data protection policies and procedures πŸ“’

Why your company needs them, and what they should include

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Hackers to face 25 years in jail for cyber attacks on Australia's national infrastructure πŸ“’

The proposals aim to update current laws to account for cyber threats like ransomware

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Cyber security startups pull in record-breaking investment in 2021 πŸ“’

Data suggests high-profile data breaches led to a greater number of transactions valued at $100 million or more

πŸ“– Read

via "ITPro".
00:45
πŸ“’ CISA updates must-patch bug list for federal agencies πŸ“’

Latest collection includes bugs up to seven years old that are still exploited in the wild

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Almost a quarter of all spam emails were sent from Russia in 2021 πŸ“’

Last year's spam emails mostly centred around money and investment, Bond and Spider-Man movie premieres, and the pandemic

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Juniper acquires cloud networking startup WiteSand πŸ“’

The deal will enable Juniper to advance traditional NAC solutions using AI and the cloud

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Ukrainian Ministry of Defence hit by DDoS attack πŸ“’

Ukraine’s largest commercial bank and State Savings Bank were also hit by cyber attacks

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Nine tips to improve your disaster recovery strategy πŸ“’

Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Remote access to businesses sold for huge profit in growing dark web operation πŸ“’

Researchers told IT Pro the lucrative business model is reaching 'full maturity' but has opportunities to become even more profitable in the near future

πŸ“– Read

via "ITPro".
00:45
πŸ“’ Google brings Privacy Sandbox initiative to Android πŸ“’

Multi-year effort likely to bring new Topics API to mobile OS

πŸ“– Read

via "ITPro".
?
10:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45007 β€Ό

Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel.

πŸ“– Read

via "National Vulnerability Database".
10:40
β€Ό CVE-2022-0685 β€Ό

Use of Out-of-range Pointer Offset in Conda vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23053 β€Ό

Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the Ò€œCondition WidgetҀ� element, that allows the injection of malicious JavaScript into the Γ’β‚¬ΛœURLÒ€ℒ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-22126 β€Ό

Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the Ò€œWeb PageҀ� element, that allows the injection of malicious JavaScript into the Γ’β‚¬ΛœURLÒ€ℒ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-25372 β€Ό

Pritunl Client through 1.2.3019.52 on Windows allows local privilege escalation, related to an ACL entry for CREATOR OWNER in platform_windows.go.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-23848 β€Ό

In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-25375 β€Ό

An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-23054 β€Ό

Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the Ò€œSummary WidgetҀ� element, that allows the injection of malicious JavaScript into the Γ’β‚¬ΛœURLÒ€ℒ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.

πŸ“– Read

via "National Vulnerability Database".
21 February 2022
?
08:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25297 β€Ό

This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.

πŸ“– Read

via "National Vulnerability Database".
08:41
β€Ό CVE-2022-0691 β€Ό

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

πŸ“– Read

via "National Vulnerability Database".
?
12:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Introducing Ghostbuster – AWS security tool protects against dangling elastic IP takeoversΒ  πŸ—“οΈ

New defense against attacks that can cause more damage than other flavors of subdomain takeover

πŸ“– Read

via "The Daily Swig".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0692 β€Ό

Open Redirect on Rudloff/alltube in Packagist rudloff/alltube prior to 3.0.1.

πŸ“– Read

via "National Vulnerability Database".
?
13:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Collabfiltrator 2.1 πŸ› 

Collabfiltrator is a tool to exfiltrate blind remote code execution output over DNS via Burp Collaborator.

πŸ“– Read

via "Packet Storm Security".
13:17
πŸ›  TestSSL 3.0.7 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Read

via "Packet Storm Security".
13:21
πŸ›  OpenStego Free Steganography Solution 0.8.4 πŸ› 

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

πŸ“– Read

via "Packet Storm Security".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44142 β€Ό

The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.

πŸ“– Read

via "National Vulnerability Database".
14:48
⚠ Irony alert! PHP fixes security flaw in input validation code ⚠

What's wrong with this sequence? 1. Step into the road 2. Check if it's safe 3. Keep on walki...

πŸ“– Read

via "Naked Security".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ French cybercriminals using sextortion scams with no text or links ⚠

You'd spot this one a mile away... but what about your friends or family?

πŸ“– Read

via "Naked Security".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0708 β€Ό

Mattermost 6.3.0 and earlier fails to protect email addresses of the creator of the team via one of the APIs, which allows authenticated team members to access this information resulting in sensitive & private information disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-44568 β€Ό

Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 & line 1995), which could cause a remote Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-27796 β€Ό

A vulnerability in Brocade Fabric OS versions before Brocade Fabric OS v8.0.1b, v7.4.1d could allow an authenticated attacker within the restricted shell environment (rbash) as either the Ò€œuserҀ� or Ò€œfactoryҀ� account, to read the contents of any file on the filesystem utilizing one of a few available binaries.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-25599 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability leading to event deletion was discovered in Spiffy Calendar WordPress plugin (versions <= 4.9.0).

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-23983 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability leading to plugin Settings Update discovered in WP Content Copy Protection & No Right Click WordPress plugin (versions <= 3.4.4).

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-27755 β€Ό

"Sametime Android potential path traversal vulnerability when using File class"

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-27797 β€Ό

Brocade Fabric OS before Brocade Fabric OS v8.2.1c, v8.1.2h, and all versions of Brocade Fabric OS v8.0.x and v7.x contain documented hard-coded credentials, which could allow attackers to gain access to the system.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-26256 β€Ό

Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in Survey Maker WordPress plugin (versions <= 2.0.6).

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-27753 β€Ό

"Sametime Android PathTraversal Vulnerability"

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-24295 β€Ό

Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2021-44141 β€Ό

All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-0564 β€Ό

A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authenticated requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-23984 β€Ό

Sensitive information disclosure discovered in wpDiscuz WordPress plugin (versions <= 7.3.11).

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-22308 β€Ό

IBM Planning Analytics 2.0 is vulnerable to a Remote File Include (RFI) attack. User input could be passed into file include commands and the web application could be tricked into including remote files with malicious code. IBM X-Force ID: 216891.

πŸ“– Read

via "National Vulnerability Database".
?
20:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4115 β€Ό

There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned

πŸ“– Read

via "National Vulnerability Database".
?
22:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24564 β€Ό

Checkmk <=2.0.0p19 contains a Cross Site Scripting (XSS) vulnerability. While creating or editing a user attribute, the Help Text is subject to HTML injection, which can be triggered for editing a user.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2022-0676 β€Ό

Heap-based Buffer Overflow in NPM radare2.js prior to 5.6.4.

πŸ“– Read

via "National Vulnerability Database".
22 February 2022
?
00:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ NFT Investors Lose $1.7M in OpenSea Phishing Attack ❌

Attackers took advantage of a smart-contract migration to swindle 17 users.

πŸ“– Read

via "Threat Post".
?
08:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Jaw-dropping Coinbase security bug allowed users to steal unlimited cryptocurrency πŸ—“οΈ

Researcher nets $250,000 for β€˜potentially market-nuking’ vulnerability

πŸ“– Read

via "The Daily Swig".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hidden Costs of a Data Breach πŸ•΄

Don't consider just the initial costs. Hidden factors include remediation, revenue loss, reputational harm, national security β€” even human life.

πŸ“– Read

via "Dark Reading".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ AirTag clone bypassed Apple’s tracking-protection features, claims researcher πŸ—“οΈ

Third-party app allegedly outperforms Find My service by detecting the DIY device

πŸ“– Read

via "The Daily Swig".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Report: Missouri Governor’s Office Responsible for Teacher Data Leak β™ŸοΈ

Missouri Governor Mike Parson made headlines last year when he vowed to criminally prosecute a journalist for reporting a security flaw in a state website that exposed personal information of more than 100,000 teachers. But Missouri prosecutors now say they… Read More Β»

πŸ“– Read

via "Krebs on Security".
13:49
⚠ French speakers blasted by sextortion scams with no text or links ⚠

You'd spot this one a mile away... but what about your friends or family?

πŸ“– Read

via "Naked Security".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0665 β€Ό

Path Traversal in GitHub repository pimcore/pimcore prior to 10.3.2.

πŸ“– Read

via "National Vulnerability Database".
14:17
πŸ›  I2P 1.7.0 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read

via "Packet Storm Security".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ WordPress backup plugin maker Updraft says β€œYou should update”… ⚠

A straight-talking bug report written in plain English by an actual expert - there's a teachable moment in this cybersecurity story!

πŸ“– Read

via "Naked Security".
15:11
β™ŸοΈ IRS: Selfies Now Optional, Biometric Data to Be Deleted β™ŸοΈ

The U.S. Internal Revenue Service (IRS) said Monday that taxpayers are no longer required to provide facial scans to create an account online at irs.gov. In lieu of providing biometric data, taxpayers can now opt for a live video interview with ID.me, the privately-held Virginia company that runs the agency's identity proofing system. The IRS also said any biometric data already shared with ID.me would be permanently deleted over the next few weeks, and any biometric data provided for new signups will be destroyed after an account is created.

πŸ“– Read

via "Krebs on Security".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Xenomorph Malware Burrows into Google Play Users, No Facehugger Required ❌

Researchers discovered a new, modular banking trojan with ties to Cerberus and Alien that has the capability to become a much larger threat than it is now.

πŸ“– Read

via "Threat Post".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46162 β€Ό

A vulnerability has been identified in Simcenter Femap (All versions < V2022.1.1). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15048)

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-0712 β€Ό

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-46699 β€Ό

A vulnerability has been identified in Simcenter Femap (All versions < V2022.1.1). Affected application contains a stack based buffer overflow vulnerability while parsing specially crafted BDF files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15061)

πŸ“– Read

via "National Vulnerability Database".
?
16:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” DHS Privacy Office Wants More Ways to Protect Data πŸ”

The department’s Chief Privacy Officer is hoping to build systems designed to prioritize the protection and confidentiality of consumer information by design.

πŸ“– Read

via "".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Toon: Out in the Cold πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyberattackers Cook Up Employee Personal Data Heist for Meyer ❌

The Conti gang breached the cookware giant's network, prepping thousands of employees’ personal data for consumption by cybercrooks.

πŸ“– Read

via "Threat Post".
18:12
β€Ό CVE-2022-0714 β€Ό

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-23608 β€Ό

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-0713 β€Ό

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-23654 β€Ό

Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access against the user-provided values instead of the actual path associated to the page ID. Commit https://github.com/Requarks/wiki/commit/411802ec2f654bb5ed1126c307575b81e2361c6b fixes this vulnerability by checking access control on the path associated with the page ID instead of the user-provided value. When the path is different than the current value, a second access control check is then performed on the user-provided path before the move operation.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-23652 β€Ό

capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
?
18:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gaming, Banking Trojans Dominate Mobile Malware Scene ❌

The overall number of attacks on mobile users is down, but they're getting slicker, both in terms of malware functionality and vectors, researchers say.

πŸ“– Read

via "Threat Post".
?
20:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ More Orgs Suffered Successful Phishing Attacks in 2021 Than in 2020 πŸ•΄

Threat actors maintained their relentless attacks on enterprise end users for yet another year, new study shows.

πŸ“– Read

via "Dark Reading".
20:23
πŸ•΄ GitHub Opens Security Database to Community Contributions πŸ•΄

The Microsoft company will allow community members to add information and code samples to security advisories using the standard pull request to change the document.

πŸ“– Read

via "Dark Reading".
20:23
β€Ό CVE-2022-23635 β€Ό

Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet. There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent.

πŸ“– Read

via "National Vulnerability Database".
?
21:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hikvision Network Cyber-Protect Helps Ensure Physical Cybersecurity Protection πŸ•΄

Combines technology, education and tools to help dealers protect networked security systems.

πŸ“– Read

via "Dark Reading".
21:08
πŸ•΄ Palo Alto Networks Introduces the Autonomous Security Platform, Cortex XSIAM πŸ•΄

The new AI-driven platform brings threat response times from days to minutes and provides a modern alternative to SIEM. Cortex XSIAM is currently available to a limited set of customers with general availability expected later this year.

πŸ“– Read

via "Dark Reading".
?
22:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Log4j Remediation Took Weeks or More for Over 50% of Organizations πŸ•΄

ISC(2) survey also found that half of cybersecurity teams worldwide worked on fixing Log4j issues on weekends and during time off.

πŸ“– Read

via "Dark Reading".
22:12
β€Ό CVE-2022-23612 β€Ό

OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementations should update to the latest patch version of OpenMRS Core for the minor version they use. These are: 2.1.5, 2.2.1, 2.3.5, 2.4.5 and 2.5.3. As a general rule, this vulnerability is already mitigated by Tomcat's URL normalization in Tomcat 7.0.28+. Users on older versions of Tomcat should consider upgrading their Tomcat instance as well as their OpenMRS instance.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-21656 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-23606 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-0654 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2021-43824 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use regex in the JWT filter. Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2022-21654 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
22:12
β€Ό CVE-2021-43825 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-21657 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions Envoy does not restrict the set of certificates it accepts from the peer, either as a TLS client or a TLS server, to only those certificates that contain the necessary extendedKeyUsage (id-kp-serverAuth and id-kp-clientAuth, respectively). This means that a peer may present an e-mail certificate (e.g. id-kp-emailProtection), either as a leaf certificate or as a CA in the chain, and it will be accepted for TLS. This is particularly bad when combined with the issue described in pull request #630, in that it allows a Web PKI CA that is intended only for use with S/MIME, and thus exempted from audit or supervision, to issue TLS certificates that will be accepted by Envoy. As a result Envoy will trust upstream certificates that should not be trusted. There are no known workarounds to this issue. Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2021-43826 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:`upstream tunneling <envoy_v3_api_field_extensions.filters.network.tcp_proxy.v3.TcpProxy.tunneling_config>` and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. There are no workarounds for this issue. Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-21655 β€Ό

Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.

πŸ“– Read

via "National Vulnerability Database".
23 February 2022
?
05:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Novel phishing method deceives users with ubiquitous IT support tool πŸ“’

The man-in-the-middle attack can be used for a range of nefarious purposes, including credential theft and malicious code injection

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Hackers caught dropping malware into Microsoft Teams chats πŸ“’

The self-administering files can take complete control of a user's system after a single click

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Cisco patches bug that could break its email security service with a single message πŸ“’

A carefully crafted email could freeze Cisco's Email Security Appliance interface and stop it processing messages

πŸ“– Read

via "ITPro".
05:16
πŸ“’ UK, US officials say Russia was behind DDoS attacks against Ukraine πŸ“’

The Russian Embassy in the US slammed the accusations as "baseless statements"

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Australian firms reported 464 data breaches in second half of 2021 πŸ“’

Malicious or criminal attacks remain the leading source of incidents, accounting for 55% of the total

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Nokia debuts new SaaS services in security and analytics πŸ“’

The offerings accelerate time-to-value while focusing on analytics, security, and monetization

πŸ“– Read

via "ITPro".
05:16
πŸ“’ GitHub goes open source on security research πŸ“’

Community members, enthusiasts, researchers, and academics are now able to submit their own research to widen the understanding of security vulnerabilities

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Ten ways to protect your company from the next big data breach πŸ“’

Even big-name corporations can’t prevent all breaches, but there are ways to protect your business

πŸ“– Read

via "ITPro".
05:16
πŸ“’ More than 80% of UK businesses paid ransomware demands in 2021 πŸ“’

The figure means UK organisations are twice as likely to pay a ransom demand compared to the global average

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Only ever use black bars to redact text, warns security researcher πŸ“’

Researcher Dan Petro shows how pixelation can be easily reversed using algorithms

πŸ“– Read

via "ITPro".
05:16
πŸ“’ US pledges to take a 'hands-on' approach to disrupting cyber criminals πŸ“’

The country has promised 'proactivity' on cyber warfare as it launches new government cyber crime taskforces

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Why AI and machine learning are vital cybersecurity tools for 2022 πŸ“’

Matt Aldridge, Principal Solutions Consultant at Carbonite + Webroot, explores how understanding of AI/ML is lagging behind

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Adobe forced to patch its own failed security update πŸ“’

Company issues new fix for e-commerce vulnerability after researchers bypass the original update

πŸ“– Read

via "ITPro".
05:16
πŸ“’ GitHub launches code scanning tool for JavaScript and TypeScript projects πŸ“’

The experimental, machine learning-powered feature aims to identify security vulnerabilities using open source expertise

πŸ“– Read

via "ITPro".
05:16
πŸ“’ Microsoft releases analysis of Web3 'ice phishing' attack πŸ“’

New phishing method targets an immature technology stack on the next generation of the internet

πŸ“– Read

via "ITPro".
05:16
πŸ“’ NordPass teams up with insurance provider Cowbell Cyber to improve security awareness πŸ“’

Policy holders will be eligible for a 15% discount on NordPass Business

πŸ“– Read

via "ITPro".
?
08:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0736 β€Ό

Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.

πŸ“– Read

via "National Vulnerability Database".
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Google Groups unsubscribe feature abused to remove members without consent πŸ—“οΈ

β€˜This could have destroyed the Google Payment system flow,’ security researcher tells The Daily Swig

πŸ“– Read

via "The Daily Swig".
?
10:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0724 β€Ό

Insecure Storage of Sensitive Information in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
10:13
β€Ό CVE-2022-0719 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
10:13
β€Ό CVE-2022-0721 β€Ό

Insertion of Sensitive Information Into Debugging Code in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ India’s Personal Data Privacy Bill: What does it mean for individuals and businesses? πŸ—“οΈ

New legislation sets out to bring India in line with international best practice, but what will this look like in action?

πŸ“– Read

via "The Daily Swig".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenSSH 8.9p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0727 β€Ό

Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.

πŸ“– Read

via "National Vulnerability Database".
12:16
β€Ό CVE-2022-0726 β€Ό

Improper Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.

πŸ“– Read

via "National Vulnerability Database".
12:16
β€Ό CVE-2022-0729 β€Ό

Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
12:16
πŸ•΄ Why Passwordless Is at an Impasse πŸ•΄

Many widely used business applications aren't built to support passwordless login because identity and authentication remain siloed.

πŸ“– Read

via "Dark Reading".
12:16
πŸ•΄ Ransomware Trained on Manufacturing Firms Led Cyberattacks in Industrial Sector πŸ•΄

Meanwhile, a few "alarming" infiltrations of OT networks by previously unknown threat groups occurred last year as well.

πŸ“– Read

via "Dark Reading".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Creaky Old WannaCry, GandCrab Top the Ransomware Scene ❌

Nothing like zombie campaigns: WannaCry's old as dirt, and GandCrab threw in the towel years ago. They're on auto-pilot at this point, researchers say.

πŸ“– Read

via "Threat Post".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ EU countries offer cyber-defense assistance to Ukraine πŸ—“οΈ

Increase in cyber-attacks expected to accompany further incursions into Ukrainian territory

πŸ“– Read

via "The Daily Swig".
?
14:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sextortion Rears Its Ugly Head Again ❌

Attackers are sending email blasts with malware links in embedded PDFs as a way to evade email filters, lying about having fictional "video evidence."

πŸ“– Read

via "Threat Post".
14:38
πŸ•΄ Microsoft Debuts Unified Service for Multicloud ID Management πŸ•΄

With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.

πŸ“– Read

via "Dark Reading".
14:49
⚠ WordPress backup plugin maker Updraft says β€œYou should update”… ⚠

A straight-talking bug report written in plain English by an actual expert - there's a teachable moment in this cybersecurity story!

πŸ“– Read

via "Naked Security".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple AirTag anti-stalking protection bypassed by researchers ⚠

Problems with Apple's Tracker Detect system, which warns you of likely stalking attempts using hidden AirTags.

πŸ“– Read

via "Naked Security".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-20625 β€Ό

A vulnerability in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the service to restart, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of Cisco Discovery Protocol messages that are processed by the Cisco Discovery Protocol service. An attacker could exploit this vulnerability by sending a series of malicious Cisco Discovery Protocol messages to an affected device. A successful exploit could allow the attacker to cause the Cisco Discovery Protocol service to fail and restart. In rare conditions, repeated failures of the process could occur, which could cause the entire device to restart.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-20650 β€Ό

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation of user supplied data that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP POST request to the NX-API of an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. Note: The NX-API feature is disabled by default.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-0476 β€Ό

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-20623 β€Ό

A vulnerability in the rate limiter for Bidirectional Forwarding Detection (BFD) traffic of Cisco NX-OS Software for Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause BFD traffic to be dropped on an affected device. This vulnerability is due to a logic error in the BFD rate limiter functionality. An attacker could exploit this vulnerability by sending a crafted stream of traffic through the device. A successful exploit could allow the attacker to cause BFD traffic to be dropped, resulting in BFD session flaps. BFD session flaps can cause route instability and dropped traffic, resulting in a denial of service (DoS) condition. This vulnerability applies to both IPv4 and IPv6 traffic.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-20624 β€Ό

A vulnerability in the Cisco Fabric Services over IP (CFSoIP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of incoming CFSoIP packets. An attacker could exploit this vulnerability by sending crafted CFSoIP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
?
16:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA Warns of New Malware Framework Used by Russian 'Sandworm' Hacking Team πŸ•΄

Russian General Staff Main Intelligence Directorate (GRU) hacking team appears to have swapped its VPNFilter malware platform for the so-called Cyclops Blink malware framework.

πŸ“– Read

via "Dark Reading".
16:45
πŸ•΄ Tales from the Dark Web, Part 3: How Criminals Monetize Ransomware πŸ•΄

Ransomware operators rely on cryptocurrency and other payment schemes to keep their activities under the radar and harder to trace.

πŸ“– Read

via "Dark Reading".
?
17:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Does Least Privilege Access Mean for Cloud Security? πŸ•΄

While traditional security controls are necessary at the perimeter, organizations also need to prevent malicious privileged access.

πŸ“– Read

via "Dark Reading".
17:43
πŸ” Fraud Cost Americans $5.8 Billion in 2021 πŸ”

Americans lost more than 70% more to fraud last year than the year before, proof that tactics used by scammers from the early days of the pandemic are still working.

πŸ“– Read

via "".
?
18:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22336 β€Ό

IBM Sterling External Authentication Server and IBM Sterling Secure Proxy 6.0.3.0, 6.0.2.0, and 3.4.3.2 could allow a remote user to consume resources causing a denial of service due to a resource leak. IBM X-Force ID: 219395.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-4070 β€Ό

Off-by-one Error in GitHub repository v2fly/v2ray-core prior to 4.44.0.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-21705 β€Ό

Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. In affected versions user input was not properly sanitized before rendering. An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code. This issue only affects admin panels that rely on safe mode and restricted permissions. To exploit this vulnerability, an attacker must first have access to the backend area. The issue has been patched in Build 474 (v1.0.474) and v1.1.10. Users unable to upgrade should apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation manually.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-22333 β€Ό

IBM Sterling Secure Proxy 6.0.3.0, 6.0.2.0, and 3.4.3.2 and IBM Sterling External Authentication Server are vulnerable a buffer overflow, due to the Jetty based GUI in the Secure Zone not properly validating the sizes of the form content and/or HTTP headers submitted. A local attacker positioned inside the Secure Zone could submit a specially crafted HTTP request to disrupt service. IBM X-Force ID: 219133.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-0731 β€Ό

Improper Access Control (IDOR) in GitHub repository dolibarr/dolibarr prior to 16.0.

πŸ“– Read

via "National Vulnerability Database".
?
18:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Samsung Shattered Encryption on 100M Phones ❌

One cryptography expert said that 'serious flaws' in the way Samsung phones encrypt sensitive material, as revealed by academics, are 'embarrassingly bad.'

πŸ“– Read

via "Threat Post".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24409 β€Ό

Only customers with active BSAFE maintenance contracts can receive details about this vulnerability. Public disclosure of the vulnerability details will be shared at a later date.

πŸ“– Read

via "National Vulnerability Database".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Storage Leaks Grew by 150% in 2021, New CybelAngel Report Reveals πŸ•΄

An increase in outsourced development projects also led to a 66% increase in source code leaks.

πŸ“– Read

via "Dark Reading".
20:39
πŸ•΄ Darktrace Acquires Attack Surface Management Company Cybersprint πŸ•΄

Through this acquisition, Darktrace gains a second European R&D centre in The Hague, Netherlands.

πŸ“– Read

via "Dark Reading".
?
22:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23653 β€Ό

B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-23651 β€Ό

b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys. Users should upgrade to b2-sdk-python 1.14.1 or later.

πŸ“– Read

via "National Vulnerability Database".
22:13
β€Ό CVE-2022-23655 β€Ό

Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. Affected versions of OctoberCMS did not validate gateway server signatures. As a result non-authoritative gateway servers may be used to exfiltrate user private keys. Users are advised to upgrade their installations to build 474 or v1.1.10. The only known workaround is to manually apply the patch (e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a) which adds server signature validation.

πŸ“– Read

via "National Vulnerability Database".
24 February 2022
?
08:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Zero-day XSS vulnerability in Horde webmail client can be triggered by file preview function πŸ—“οΈ

Researchers release details of unpatched security flaw

πŸ“– Read

via "The Daily Swig".
?
10:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ US fraudster jailed over $300k business email compromise scheme πŸ—“οΈ

Scheme unraveled when defendant tried to cash ill-gotten gains

πŸ“– Read

via "The Daily Swig".
?
10:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple AirTag anti-stalking protection bypassed by researchers ⚠

Problems with Apple's Tracker Detect system, which warns you of likely stalking attempts using hidden AirTags.

πŸ“– Read

via "Naked Security".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New York Opens Joint Security Operations Center in NYC πŸ•΄

The "first-in-nation" cyber command center will provide municipal and local governments with threat intelligence and resources to defend themselves against cyberattacks.

πŸ“– Read

via "Dark Reading".
?
11:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Art of Non-boring Cybersec Training–Podcast ❌

With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.

πŸ“– Read

via "Threat Post".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SaaS in the Enterprise: The Good, the Bad, and the Unknown πŸ•΄

SaaS offers many benefits to the enterprise, but security issues left unchecked can mitigate value.

πŸ“– Read

via "Dark Reading".
12:14
β€Ό CVE-2022-0695 β€Ό

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.

πŸ“– Read

via "National Vulnerability Database".
?
12:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyberattackers Leverage DocuSign to Steal Microsoft Outlook Logins ❌

A targeted phishing attack takes aim at a major U.S. payments company.

πŸ“– Read

via "Threat Post".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Data wiper deployed in cyber-attacks targeting Ukrainian systems πŸ—“οΈ

Newly named β€˜HermeticWiper’ malware discovered on hundreds of endpoints

πŸ“– Read

via "The Daily Swig".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ JupiterOne Unveils Starbase for Graph-Based ο»ΏSecurity πŸ•΄

The open source asset management tool lets security analysts collect asset information all across the organization's digital operations and run queries to understand their relationships.

πŸ“– Read

via "Dark Reading".
13:19
πŸ›  Packet Fence 11.2.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Read

via "Packet Storm Security".
13:30
❌ Web Filtering and Compliances for Wi-Fi Providers ❌

Demand for public Wi-Fi is on the rise. Usually free of charge, but there is a risk of expensive losses. Learn ways to protect yourself from cyber-threats.

πŸ“– Read

via "Threat Post".
?
14:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Illusive Launches Identity Risk Management Platform πŸ•΄

Illusive Spotlight automatically and continuously discovers and mitigates privileged identity risks, while Illusive Shadow protects against identity risks that can't be readily remediated.

πŸ“– Read

via "Dark Reading".
14:10
πŸ•΄ Businesses Are at Significant Risk of Cybersecurity Breaches Due to Immature Security Hygiene and Posture Management Practices πŸ•΄

Seven out of 10 organizations experienced a cyberattack that started through the exploit of unknown or poorly managed technology assets, according to Enterprise Strategy Group research.

πŸ“– Read

via "Dark Reading".
14:14
β€Ό CVE-2022-24633 β€Ό

All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24599 β€Ό

In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, in printinfo.c, which allows an attacker to leak sensitive information via a crafted file. The printfileinfo function calls the copyrightstring function to get data, however, it dosn't use zero bytes to truncate the data.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-25084 β€Ό

TOTOLink T6 V5.9c.4085_B20190428 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24620 β€Ό

Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24374 β€Ό

Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-25079 β€Ό

TOTOLink A810R V4.1.2cu.5182_B20201026 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24614 β€Ό

When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-25355 β€Ό

EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 improperly handle HTTP Host header values, which may lead a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with some forged reissue-password URL to EC-CUBE users.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-44566 β€Ό

A Cross Site Scripting vulnerability exists RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-25073 β€Ό

TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24582 β€Ό

Accounting Journal Management 1.0 is vulnerable to XSS-PHPSESSID-Hijacking. The parameter manage_user from User lists is vulnerable to XSS-Stored and PHPSESSID attacks. The malicious user can attack the system by using the already session which he has from inside and outside of the network.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-25082 β€Ό

TOTOLink A950RG V5.9c.4050_B20190424 and V4.1.2cu.5204_B20210112 were discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24566 β€Ό

In Checkmk <=2.0.0p19 fixed in 2.0.0p20 and Checkmk <=1.6.0p27 fixed in 1.6.0p28, the title of a Predefined condition is not properly escaped when shown as condition, which can result in Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-25076 β€Ό

TOTOLink A800R V4.1.2cu.5137_B20200730 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-3886 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-24613 β€Ό

metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-25078 β€Ό

TOTOLink A3600R V4.1.2cu.5182_B20201102 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-25360 β€Ό

WatchGuard Firebox and XTM appliances allow an authenticated remote attacker with unprivileged credentials to upload files to arbitrary locations. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-25292 β€Ό

A wgagent stack-based buffer overflow in WatchGuard Firebox and XTM appliances allows an authenticated remote attacker to potentially execute arbitrary code by initiating a firmware update with a malicious upgrade image. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2022-25074 β€Ό

TP-Link TL-WR902AC(US)_V3_191209 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2019-25058 β€Ό

An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-21179 β€Ό

Cross-site request forgery (CSRF) vulnerability in EC-CUBE plugin 'Mail Magazine Management Plugin' ver4.0.0 to 4.1.1 (for EC-CUBE 4 series) and ver1.0.0 to 1.0.4 (for EC-CUBE 3 series) allows a remote unauthenticated attacker to hijack the authentication of an administrator via a specially crafted page, and Mail Magazine Templates and/or transmitted history information may be deleted unintendedly.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25405 β€Ό

Tongda2000 v11.10 was discovered to contain a SQL injection vulnerability in change_box.php via the DELETE_STR parameter.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25401 β€Ό

The copy function of the file manager in Cuppa CMS v1.0 allows any file to be copied to the current directory, granting attackers read access to arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24407 β€Ό

In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-23916 β€Ό

Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-24374.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25098 β€Ό

ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-3876 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-25636 β€Ό

LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25638 β€Ό

In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the sig_algo field differs between the certificate_verify message and the certificate message.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-44567 β€Ό

An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25101 β€Ό

A vulnerability in the component /templates/install.php of WBCE CMS v1.5.2 allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25075 β€Ό

TOTOLink A3000RU V5.9c.2280_B20180512 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-44610 β€Ό

Multiple SQL Injection vulnerabilities exist in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) URLs, (2) lang_id, (3) tmpl_id, (4) mod_rewrite (5) eta_doctype. (6) meta_charset, (7) default_group, and (8) page group parameters in the settings mode in admin/index.php.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-44607 β€Ό

A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25640 β€Ό

In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the certificate_verify message from the handshake, and never present a certificate.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-3871 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25404 β€Ό

Tongda2000 v11.10 was discovered to contain a SQL injection vulnerability in delete.php via the DELETE_STR parameter.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-25838 β€Ό

Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.

πŸ“– Read

via "National Vulnerability Database".
14:21
⚠ S3 Ep71: VMware escapes, PHP holes, WP plugin woes, and scary scams [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
16:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft App Store Sizzling with New β€˜Electron Bot’ Malware ❌

The SEO poisoning bot, capable of full system takeover, is actively taking over social media accounts, masquerading as popular games like Temple Run.

πŸ“– Read

via "Threat Post".
16:10
πŸ•΄ 4 Simple Steps to a Modernized Threat Intelligence Approach πŸ•΄

As cybersecurity strategies continuously evolve to keep pace with attackers, the relevance of the traditional model is in need of an automation upgrade.

πŸ“– Read

via "Dark Reading".
16:14
β€Ό CVE-2021-38995 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 213073.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-38994 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 213072.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-22793 β€Ό

Cybonet - PineApp Mail Relay Local File Inclusion. Attacker can send a request to : /manage/mailpolicymtm/log/eml_viewer/email.content.body.php?filesystem_path=ENCDODED PATH and by doing that, the attacker can read Local Files inside the server.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-22349 β€Ό

IBM Sterling External Authentication Server 3.4.3.2, 6.0.2.0, and 6.0.3.0 is vulnerable to path traversals, due to not properly validating RESTAPI configuration data. An authorized user could import invalid data which could be used for an attack. IBM X-Force ID: 220144.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-22794 β€Ό

Cybonet - PineApp Mail Relay Unauthenticated Sql Injection. Attacker can send a request to: /manage/emailrichment/userlist.php?CUSTOMER_ID_INNER=1 /admin/emailrichment/userlist.php?CUSTOMER_ID_INNER=1 /manage/emailrichment/usersunlist.php?CUSTOMER_ID_INNER=1 /admin/emailrichment/usersunlist.php?CUSTOMER_ID_INNER=1 and by doing that, the attacker can run Remote Code Execution in one liner.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-39038 β€Ό

IBM WebSphere Application Server 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 213968.

πŸ“– Read

via "National Vulnerability Database".
?
17:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zenly Social-Media App Bugs Allow Account Takeover ❌

A pair of bugs in the Snap-owned tracking app reveal phone numbers and allow account hijacking.

πŸ“– Read

via "Threat Post".
17:40
πŸ•΄ Why Developers Should Care About Log4j πŸ•΄

Unless you can gain full visibility into how data flows to and through your dependencies, you can’t be sure if you are affected by this vulnerability.

πŸ“– Read

via "Dark Reading".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3596 β€Ό

A NULL pointer dereference flaw was found in ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in coders/svg.c. This issue is due to not checking the return value from libxml2's xmlCreatePushParserCtxt() and uses the value directly, which leads to a crash and segmentation fault.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2020-14481 β€Ό

The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the userÒ€ℒs operating system and certain components of FactoryTalk View SE.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-24709 β€Ό

@awsui/components-react is the main AWS UI package which contains React components, with TypeScript definitions designed for user interface development. Multiple components in versions before 3.0.367 have been found to not properly neutralize user input and may allow for javascript injection. Users are advised to upgrade to version 3.0.367 or later. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-24232 β€Ό

A local file inclusion in Hospital Patient Record Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-0544 β€Ό

An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-3700 β€Ό

A use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in the usbredirparser_serialize() in usbredirparser/usbredirparser.c. This issue occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-44662 β€Ό

A Site Scripting (XSS) vulnerability exists in the Xerte Project Xerte through 3.8.4 via the link parameter in print.php.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-44532 β€Ό

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-25148 β€Ό

The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2022-25305 β€Ό

The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the IP parameter found in the ~/includes/class-wp-statistics-ip.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-0653 β€Ό

The Profile Builder Γ’β‚¬β€œ User Profile & User Registration Forms WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2020-10640 β€Ό

Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-0651 β€Ό

The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-44663 β€Ό

A Remote Code Execution (RCE) vulnerability exists in the Xerte Project Xerte through 3.8.4 via a crafted php file through elfinder in connetor.php.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2020-10636 β€Ό

Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-25306 β€Ό

The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the browser parameter found in the ~/includes/class-wp-statistics-visitor.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2020-14502 β€Ό

The web interface of the 1734-AENTR communication module is vulnerable to stored XSS. A remote, unauthenticated attacker could store a malicious script within the web interface that, when executed, could modify some string values on the homepage of the web interface.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2020-14504 β€Ό

The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-0546 β€Ό

A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2020-14478 β€Ό

A local, authenticated attacker could use an XML External Entity (XXE) attack to exploit weakly configured XML files to access local or remote content. A successful exploit could potentially cause a denial-of-service condition and allow the attacker to arbitrarily read any local file via system-level services.

πŸ“– Read

via "National Vulnerability Database".
?
18:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Harsh Truths of Cybersecurity in 2022, Part II ❌

Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.

πŸ“– Read

via "Threat Post".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44664 β€Ό

An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-29217 β€Ό

A remote URL redirection vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2022-23701 β€Ό

A potential remote host header injection security vulnerability has been identified in HPE Integrated Lights-Out 4 (iLO 4) firmware version(s): Prior to 2.60. This vulnerability could be remotely exploited to allow an attacker to supply invalid input to the iLO 4 webserver, causing it to respond with a redirect to an attacker-controlled domain. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 4 (iLO 4).

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-39363 β€Ό

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after ARP cache poisoning has been achieved.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-29216 β€Ό

A remote cross-site scripting vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-29220 β€Ό

Multiple buffer overflow security vulnerabilities have been identified in HPE iLO Amplifier Pack version(s): Prior to 2.12. These vulnerabilities could be exploited by a highly privileged user to remotely execute code that could lead to a loss of confidentiality, integrity, and availability. HPE has provided a software update to resolve this vulnerability in HPE iLO Amplifier Pack.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-39364 β€Ό

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-44665 β€Ό

A Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-43745 β€Ό

A Denial of Service vulnerabilty exists in Trilium Notes 0.48.6 in the setupPage function

πŸ“– Read

via "National Vulnerability Database".
?
22:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fears Rise of Potential Russian Cyberattacks on US, Allies Over Sanctions πŸ•΄

If past is precedent, the cyber impact of the war in Ukraine could be broad and bruising, experts say.

πŸ“– Read

via "Dark Reading".
25 February 2022
?
03:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23835 β€Ό

** DISPUTED ** The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk."

πŸ“– Read

via "National Vulnerability Database".
?
08:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0746 β€Ό

Business Logic Errors in GitHub repository dolibarr/dolibarr prior to 16.0.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-34361 β€Ό

A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2022-24288 β€Ό

In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2022-24947 β€Ό

Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-34359 β€Ό

A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-45229 β€Ό

It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2022-24948 β€Ό

A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.

πŸ“– Read

via "National Vulnerability Database".
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ DNA data of sexual assault victims exposed in breach at US laboratory πŸ—“οΈ

Medical information included in leak after third-party compromise

πŸ“– Read

via "The Daily Swig".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25328 β€Ό

The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above

πŸ“– Read

via "National Vulnerability Database".
10:20
β€Ό CVE-2022-25327 β€Ό

The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend upgrading to version 0.3.3 or above

πŸ“– Read

via "National Vulnerability Database".
10:20
β€Ό CVE-2022-0247 β€Ό

An issue exists in Fuchsia where VMO data can be modified through access to copy-on-write snapshots. A local attacker could modify objects in the VMO that they do not have permission to. We recommend upgrading past commit d97c05d2301799ed585620a9c5c739d36e7b5d3d or any of the listed versions.

πŸ“– Read

via "National Vulnerability Database".
10:20
β€Ό CVE-2022-24612 β€Ό

An authenticated user can upload an XML file containing an XSS via the ITSM module of EyesOfNetwork 5.3.11, resulting in a stored XSS.

πŸ“– Read

via "National Vulnerability Database".
10:20
β€Ό CVE-2022-25326 β€Ό

fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.

πŸ“– Read

via "National Vulnerability Database".
10:20
β€Ό CVE-2022-24594 β€Ό

In waline 1.6.1, an attacker can submit messages using X-Forwarded-For to forge any IP address.

πŸ“– Read

via "National Vulnerability Database".
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Putting the X Factor in XDR πŸ•΄

While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin with a strong EDR foundation.

πŸ“– Read

via "Dark Reading".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Future of Cyber Insurance πŸ•΄

Having cyber insurance is a good idea if the costs make sense β€” it could be the difference between going out of business and staying afloat. But it shouldn't be your first course of action.

πŸ“– Read

via "Dark Reading".
12:20
β€Ό CVE-2022-25374 β€Ό

HashiCorp Terraform Enterprise before 202202-1 inserts Sensitive Information into a Log File.

πŸ“– Read

via "National Vulnerability Database".
12:24
πŸ—“οΈ Flurry Finance heist nets crypto thieves $295k πŸ—“οΈ

Theft topped out at six figures after DeFi platform blocked β€˜token balance multiplier’ exploit

πŸ“– Read

via "The Daily Swig".
?
14:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24334 β€Ό

In JetBrains TeamCity before 2021.2.1, the Agent Push feature allowed selection of any private key on the server.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24338 β€Ό

JetBrains TeamCity before 2021.2.1 was vulnerable to reflected XSS.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24340 β€Ό

In JetBrains TeamCity before 2021.2.1, XXE during the parsing of the configuration file was possible.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24345 β€Ό

In JetBrains IntelliJ IDEA before 2021.2.4, local code execution (without permission from a user) upon opening a project was possible.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24339 β€Ό

JetBrains TeamCity before 2021.2.1 was vulnerable to stored XSS.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24347 β€Ό

JetBrains YouTrack before 2021.4.36872 was vulnerable to stored XSS via a project icon.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24327 β€Ό

In JetBrains Hub before 2021.1.13890, integration with JetBrains Account exposed an API key with excessive permissions.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24332 β€Ό

In JetBrains TeamCity before 2021.2, a logout action didn't remove a Remember Me cookie.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2022-24329 β€Ό

In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.

πŸ“– Read

via "National Vulnerability Database".