25 February 2022
?
14:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24331 β€Ό

In JetBrains TeamCity before 2021.1.4, GitLab authentication impersonation was possible.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24346 β€Ό

In JetBrains IntelliJ IDEA before 2021.3.1, local code execution via RLO (Right-to-Left Override) characters was possible.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24337 β€Ό

In JetBrains TeamCity before 2021.2, health items of pull requests were shown to users who lacked appropriate permissions.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24328 β€Ό

In JetBrains Hub before 2021.1.13956, an unprivileged user could perform DoS.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24330 β€Ό

In JetBrains TeamCity before 2021.2.1, a redirection to an external site was possible.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24333 β€Ό

In JetBrains TeamCity before 2021.2, blind SSRF via an XML-RPC call was possible.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24343 β€Ό

In JetBrains YouTrack before 2021.4.31698, a custom logo could be set by a user who has read-only permissions.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24336 β€Ό

In JetBrains TeamCity before 2021.2.1, an unauthenticated attacker can cancel running builds via an XML-RPC request to the TeamCity server.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24344 β€Ό

JetBrains YouTrack before 2021.4.31698 was vulnerable to stored XSS on the Notification templates page.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24335 β€Ό

JetBrains TeamCity before 2021.2 was vulnerable to a Time-of-check/Time-of-use (TOCTOU) race-condition attack in agent registration via XML-RPC.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2022-24342 β€Ό

In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.

πŸ“– Read

via "National Vulnerability Database".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Top 5 Interview Questions to Ask DevOps Candidates in 2022 πŸ•΄

It's worthwhile to find candidates who have experience with models that embed security into their processes.

πŸ“– Read

via "Dark Reading".
14:50
⚠ S3 Ep71: VMware escapes, PHP holes, WP plugin woes, and scary scams [Podcast + Transcript] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Did we learn nothing from Y2K? Why are some coders still stuck on two digit numbers? ⚠

Calling all website coders: Y2K was then. V1H is now!

πŸ“– Read

via "Naked Security".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 6 Cyber-Defense Steps to Take Now to Protect Your Company ❌

Ransomware is getting worse, but Daniel Spicer, chief security officer atΒ Ivanti, offers a checklist for choosing defense solutions to meet the challenge.

πŸ“– Read

via "Threat Post".
16:14
πŸ” Friday Five 2/25 πŸ”

Ransomware hits the industrial sector, behind the scenes of stalkerware network, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
16:20
β€Ό CVE-2021-38993 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the smbcd daemon to cause a denial of service. IBM X-Force ID: 212962.

πŸ“– Read

via "National Vulnerability Database".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Russia Sanctions May Spark Escalating Cyber Conflict β™ŸοΈ

President Biden joined European leaders this week in enacting economic sanctions against Russia in response its military invasion of Ukraine. The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure.

πŸ“– Read

via "Krebs on Security".
?
17:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Exchange Bugs Exploited by β€˜Cuba’ Ransomware Gang ❌

The ransomware gang known as Cuba is increasingly shifting to exploiting Exchange bugs – including crooks' favorites, ProxyShell and ProxyLogon – as initial infection vectors.

πŸ“– Read

via "Threat Post".
17:11
πŸ•΄ Ukrainian Troops Targeted in Phishing Attacks by Suspected Belarusian APT πŸ•΄

Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.

πŸ“– Read

via "Dark Reading".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25061 β€Ό

TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_setIp6DefaultRoute.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22489 β€Ό

There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-0615 β€Ό

Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-25264 β€Ό

In JetBrains TeamCity before 2021.2.3, environment variables of the "password" type could be logged in some cases.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22429 β€Ό

There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-25019 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-38602. Reason: This candidate is a reservation duplicate of CVE-2021-38602. Notes: All CVE users should reference CVE-2021-38602 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-42952 β€Ό

All pervious versions before October 25, 2021 of Zepl Notebooks are affeced by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22426 β€Ό

There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22431 β€Ό

There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-25260 β€Ό

JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-37027 β€Ό

There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-23985 β€Ό

The affected product is vulnerable to an out-of-bounds write while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22430 β€Ό

There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-44132 β€Ό

A command injection vulnerability in the function formImportOMCIShell of C-DATA ONU4FERW V2.1.13_X139 allows attackers to execute arbitrary commands via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-21209 β€Ό

The affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-25062 β€Ό

TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain an integer overflow via the function dm_checkString. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22448 β€Ό

There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22437 β€Ό

There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-37103 β€Ό

There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-22395 β€Ό

There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
?
19:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TrickBot Takes a Break, Leaving Researchers Scratching Their Heads ❌

The infamous trojan is likely making some major operational changes, researchers believe.

πŸ“– Read

via "Threat Post".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24710 β€Ό

Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.

πŸ“– Read

via "National Vulnerability Database".
?
20:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Steps to Take Right Now to Prepare for Cyberattacks by Russia πŸ•΄

A lot of the recommended preparation involves measures organizations should have in place already.

πŸ“– Read

via "Dark Reading".
?
22:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ IBM launches security hub to help APAC firms prepare for cyber attacks πŸ“’

The tech giant also announced the opening of a second IBM Security Operation Center (SOC) in Bengaluru

πŸ“– Read

via "ITPro".
22:17
πŸ“’ Cloudflare acquires Area 1 Security for $162 million πŸ“’

The deal comes five months after the web infrastructure and website security company announced its foray into the email security market

πŸ“– Read

via "ITPro".
22:17
πŸ“’ Organisations urged to boost cyber defences in wake of Ukraine cyber attacks πŸ“’

Australia’s Cyber Security Centre warns that there has been a historical pattern of cyber attacks against Ukraine that have had international consequences

πŸ“– Read

via "ITPro".
22:17
πŸ“’ Russian cyber attacks on Ukraine: What we know so far πŸ“’

A score of additional attacks on the Ukrainian government and other critical services have been reported this week, as Russia officially declares war on the country

πŸ“– Read

via "ITPro".
22:17
πŸ“’ Darktrace acquires attack surface management startup Cybersprint πŸ“’

The €47.5 million deal marks Darktrace’s first acquisition in its nine-year history

πŸ“– Read

via "ITPro".
22:17
πŸ“’ WatchGuard Firebox M290 review: Stiff security at a great price πŸ“’

The Firebox M290 delivers an incredible range of gateway security measures priced right for SMBs

πŸ“– Read

via "ITPro".
22:17
πŸ“’ IT Pro 20/20: The new frontier of innovation πŸ“’

Businesses are putting green tech at their heart of their buying decisions, and manufacturers and paying attention

πŸ“– Read

via "ITPro".
22:17
πŸ“’ Benefits of AI and machine learning for cloud security πŸ“’

AI and machine learning may not be a silver bullet, but they can still play an important part in cloud security strategies

πŸ“– Read

via "ITPro".
22:17
πŸ“’ Microsoft releases new security controls for multi-cloud customers πŸ“’

Tech giant adds Google Cloud protections for Defender for Cloud and CloudKnox Permission management

πŸ“– Read

via "ITPro".
22:17
πŸ“’ IRS lets taxpayers bypass facial recognition with virtual interviews πŸ“’

The temporary solution will be in effect through the 2022 tax filing season

πŸ“– Read

via "ITPro".
22:17
πŸ“’ How to encrypt files and folders in Windows 10 πŸ“’

Here’s how to make your sensitive data unreadable to prying eyes

πŸ“– Read

via "ITPro".
22:17
πŸ“’ ICS and OT vulnerabilities more than doubled in 2021 πŸ“’

One in four flaws found in industrial systems had no patch, Dragos report finds

πŸ“– Read

via "ITPro".
22:17
πŸ“’ GitHub goes open source on security research πŸ“’

Community members, enthusiasts, researchers, and academics are now able to submit their own research to widen the understanding of security vulnerabilities

πŸ“– Read

via "ITPro".
22:17
πŸ“’ 100 million Samsung Galaxy devices vulnerable to cryptographic key hack πŸ“’

Widespread flaws in hardware-backed key management could enable hackers to bypass FIDO2 authentication

πŸ“– Read

via "ITPro".
22:20
β€Ό CVE-2022-25094 β€Ό

Home Owners Collection Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the parameter "cover" in SystemSettings.php.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2022-25095 β€Ό

Home Owners Collection Management System v1.0 allows unauthenticated attackers to compromise user accounts via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2022-25096 β€Ό

Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in /members/view_member.php.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2022-21706 β€Ό

Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory, you can discuss them on the [developer community Zulip server](https://zulip.com/developer-community/), or email the [Zulip security team](mailto:security@zulip.com).

πŸ“– Read

via "National Vulnerability Database".
26 February 2022
?
08:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0762 β€Ό

Business Logic Errors in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
08:21
β€Ό CVE-2022-0763 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
?
14:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0764 β€Ό

Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.

πŸ“– Read

via "National Vulnerability Database".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27958 β€Ό

The Job Composer app in Ohio Supercomputer Center Open OnDemand before 1.7.19 and 1.8.x before 1.8.18 allows remote authenticated users to provide crafted input in a job template.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-26146 β€Ό

Tricentis qTest before 10.4 allows stored XSS by an authenticated attacker.

πŸ“– Read

via "National Vulnerability Database".
?
20:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26149 β€Ό

MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2022-22908 β€Ό

SangforCSClient.exe in Sangfor VDI Client 5.4.2.1006 allows attackers, when they are able to read process memory, to discover the contents of the Username and Password fields.

πŸ“– Read

via "National Vulnerability Database".
27 February 2022
?
08:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-21708 β€Ό

In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.

πŸ“– Read

via "National Vulnerability Database".
28 February 2022
?
03:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43945 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Administrator permissions to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint. The affected versions are before version 8.20.3.

πŸ“– Read

via "National Vulnerability Database".
03:22
β€Ό CVE-2022-26159 β€Ό

The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/<domain>/en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.

πŸ“– Read

via "National Vulnerability Database".
?
09:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Bridgestone Americas β€˜disconnects’ manufacturing facilities following β€˜security incident’ πŸ—“οΈ

World’s biggest tire manufacturer yet to determine β€˜scope or nature of any potential incident’

πŸ“– Read

via "The Daily Swig".
?
12:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Boost Shift-Left Security in the SDLC πŸ•΄

Organizations will see big wins from applying security controls early in the development life cycle.

πŸ“– Read

via "Dark Reading".
12:23
β€Ό CVE-2022-24685 β€Ό

HashiCorp Nomad and Nomad Enterprise 1.x before 1.0.17, 1.1.x before 1.1.12, and 1.2.x before 1.2.6 has Uncontrolled Resource Consumption.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2022-24572 β€Ό

Car Driving School Management System v1.0 is affected by Cross Site Scripting (XSS) in the User Enrollment Form (Username Field). To exploit this Vulnerability, an admin views the registered user details.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2022-24571 β€Ό

Car Driving School Management System v1.0 is affected by SQL injection in the login page. An attacker can use simple SQL login injection payload to get admin access.

πŸ“– Read

via "National Vulnerability Database".
?
13:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies Borrow Attack Technique to Watermark Machine Learning Models πŸ•΄

Researchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up by adversarial researchers.

πŸ“– Read

via "Dark Reading".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25642 β€Ό

Obyte (formerly Byteball) Wallet before 3.4.1 allows XSS. A crafted chat message can lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2022-24711 β€Ό

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2022-26158 β€Ό

An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. It accepts and reflects arbitrary domains supplied via a client-controlled Host header. Injection of a malicious URL in the Host: header of the HTTP Request results in a 302 redirect to an attacker-controlled page.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2022-26156 β€Ό

An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. Injection of a malicious payload within the RelayState= parameter of the HTTP request body results in the hijacking of the form action. Form-action hijacking vulnerabilities arise when an application places user-supplied input into the action URL of an HTML form. An attacker can use this vulnerability to construct a URL that, if visited by another application user, will modify the action URL of a form to point to the attacker's server.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-44339 β€Ό

David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_transform_scanline() in "/ok_png.c:712".

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-44334 β€Ό

David Brackeen ok-file-formats 97f78ca is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_jpg_convert_YCbCr_to_RGB() in "/ok_jpg.c:513" .

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2022-26157 β€Ό

An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. The ASP.NET_Sessionid cookie is not protected by the Secure flag. This makes it prone to interception by an attacker if traffic is sent over unencrypted channels.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43086 β€Ό

ARM astcenc 3.2.0 is vulnerable to Buffer Overflow. When the compression function of the astc-encoder project with -cl option was used, a stack-buffer-overflow occurred in function encode_ise() in function compress_symbolic_block_for_partition_2planes() in "/Source/astcenc_compress_symbolic.cpp".

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-44340 β€Ό

David Brackeen ok-file-formats dev version is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_jpg_generate_huffman_table() in "/ok_jpg.c:403".

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2022-26155 β€Ό

An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. XSS can occur via a payload in the SAMLResponse parameter of the HTTP request body.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2022-24712 β€Ό

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing.

πŸ“– Read

via "National Vulnerability Database".
14:31
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for March 2022 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
14:31
❌ Toyota to Close Japan Plants After Suspected Cyberattack ❌

The plants will shut down on Tuesday, halting about a third of the company’s global production. Toyota doesn’t know how long the 14 plants will be unplugged.

πŸ“– Read

via "Threat Post".
14:45
πŸ•΄ Researchers Warn of Stealthy Chinese Backdoor Targeting Multiple Foreign Agencies πŸ•΄

A stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data while remaining undetected.

πŸ“– Read

via "Dark Reading".
14:51
⚠ Did we learn nothing from Y2K? Why are some coders still stuck on two digit numbers? ⚠

Calling all website coders: Y2K was then. V1H is now!

πŸ“– Read

via "Naked Security".
?
15:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Instagram scammers as busy as ever: passwords and 2FA codes at risk ⚠

Instagram scams don't seem to be dying out - we're seeing more variety and trickiness than ever...

πŸ“– Read

via "Naked Security".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44331 β€Ό

ARM astcenc 3.2.0 is vulnerable to Buffer Overflow in function encode_ise().

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-44342 β€Ό

David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow via function ok_png_transform_scanline() in "/ok_png.c:494".

πŸ“– Read

via "National Vulnerability Database".
?
17:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” New Report Pushes for Strong Intellectual Property Protection πŸ”

The report encourages the United States to engage like-minded partners on new tools to counter IP theft and better protect IP at home for trade purposes.

πŸ“– Read

via "".
18:02
❌ Ukraine-Russia Cyber Warzone Splits Cyber Underground ❌

A pro-Ukraine Conti member spilled 13 months of the ransomware group's chats, while cyber actors are rushing to align with both sides.

πŸ“– Read

via "Threat Post".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26315 β€Ό

qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-25023 β€Ό

Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-25013 β€Ό

Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the "key" and "fm" parameters in the component login.php.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2020-22845 β€Ό

A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted FTP requests.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-25014 β€Ό

Ice Hrm 30.0.0.OS was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "m" parameter in the Dashboard of the current user. This vulnerability allows attackers to compromise session credentials via user interaction with a crafted link.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-41112 β€Ό

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-25015 β€Ό

A stored cross-site scripting (XSS) vulnerability in Ice Hrm 30.0.0.OS allows attackers to steal cookies via a crafted payload inserted into the First Name field.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-41111 β€Ό

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2020-22844 β€Ό

A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted SMB requests.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-26181 β€Ό

Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.

πŸ“– Read

via "National Vulnerability Database".
?
20:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Invicti Security Adds Software Composition Analysis to Its Industry- Leading AppSec Platform πŸ•΄

Invicti SCA enables users to track and secure open-source components to reduce security risk.

πŸ“– Read

via "Dark Reading".
20:15
πŸ•΄ Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques πŸ•΄

The Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and lays out the steps organizations can take now in order to protect themselves in the future.

πŸ“– Read

via "Dark Reading".
20:23
β€Ό CVE-2021-45414 β€Ό

A Remote Code Execution (RCE) vulnerability exists in DataRobot through 2021-10-28 because it allows submission of a Docker environment or Java driver.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27014 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27013 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27009 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27011 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27015 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27012 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27010 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27008 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-27016 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
22:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISO Checklist for Offboarding Security Staff πŸ•΄

The Great Resignation strikes cybersecurity teams too. Here's a checklist for CISOs to ensure security is retained even as security staff is not.

πŸ“– Read

via "Dark Reading".
22:28
β€Ό CVE-2022-25029 β€Ό

Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter under /admin/?page=members/view_member&id=2.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-25413 β€Ό

Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-25409 β€Ό

Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the demail parameter at /admin-panel1.php.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36812 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36820 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36815 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-23907 β€Ό

CMS Made Simple v2.2.15 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the parameter m1_fmmessage.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36810 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36813 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36819 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-25411 β€Ό

A Remote Code Execution (RCE) vulnerability at /admin/options in Maxsite CMS v180 allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36818 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-25028 β€Ό

Home Owners Collection Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the collected_by parameter under the List of Collections module.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2022-0743 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36817 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-36816 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:28
β€Ό CVE-2021-27000 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-25408 β€Ό

Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the dpassword parameter at /admin-panel1.php.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-23906 β€Ό

CMS Made Simple v2.2.15 was discovered to contain a Remote Command Execution (RCE) vulnerability via the upload avatar function. This vulnerability is exploited via a crafted image file.

πŸ“– Read

via "National Vulnerability Database".
22:29
β€Ό CVE-2022-25410 β€Ό

Maxsite CMS v180 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_file_description at /admin/files.

πŸ“– Read

via "National Vulnerability Database".
1 March 2022
?
03:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25018 β€Ό

Pluxml v5.8.7 was discovered to allow attackers to execute arbitrary code via crafted PHP code inserted into static pages.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2022-25022 β€Ό

A cross-site scripting (XSS) vulnerability in Htmly v2.8.1 allows attackers to excute arbitrary web scripts HTML via a crafted payload in the content field of a blog post.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2021-43619 β€Ό

Trusted Firmware M 1.4.x through 1.4.1 has a buffer overflow issue in the Firmware Update partition. In the IPC model, a psa_fwu_write caller from SPE or NSPE can overwrite stack memory locations.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2021-44962 β€Ό

An out-of-bounds read vulnerability exists in the GCode::extrude() functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially crafted stl file could lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2020-12775 β€Ό

Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2021-42951 β€Ό

A Remote Code Execution (RCE) vulnerability exists in Algorithmia MSOL all versions before October 10 2021 of SaaS. Users can register for an account and are allocated a set number of credits to try the product. Once users authenticate, they can proceed to create a new, specially crafted Algorithm and subsequently launch remote code execution with their desired result.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2022-25020 β€Ό

A cross-site scripting (XSS) vulnerability in Pluxml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the thumbnail path of a blog post.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2022-26332 β€Ό

Cipi 3.1.15 allows Add Server stored XSS via the /api/servers name field.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2022-24446 β€Ό

An issue was discovered in Zoho ManageEngine Key Manager Plus 6.1.6. A user, with the level Operator, can see all SSH servers (and user information) even if no SSH server or user is associated to the operator.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2021-44961 β€Ό

A memory leakage flaw exists in the class PerimeterGenerator of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A Specially crafAn out-of-bounds read vulnerability exists in the GCode::extrude() functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially crafted stl file could lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.ted stl files can exhaust available memory.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2021-42767 β€Ό

A directory traversal vulnerability in the Apoc plugins in Neo4J Graph database 4.0.0 through 4.3.6 allows attackers to read local files.

πŸ“– Read

via "National Vulnerability Database".
03:23
β€Ό CVE-2022-22262 β€Ό

ROG Live ServiceÒ€ℒs function for deleting temp files created by installation has an improper link resolution before file access vulnerability. Since this function does not validate the path before deletion, an unauthenticated local attacker can create an unexpected symbolic link to system file path, to delete arbitrary system files and disrupt system service.

πŸ“– Read

via "National Vulnerability Database".
?
08:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0777 β€Ό

Weak Password Recovery Mechanism for Forgotten Password in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-35036 β€Ό

A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2022-0776 β€Ό

Cross-site Scripting (XSS) - DOM in GitHub repository hakimel/reveal.js prior to 4.3.0.

πŸ“– Read

via "National Vulnerability Database".
08:24
β€Ό CVE-2021-4039 β€Ό

A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.

πŸ“– Read

via "National Vulnerability Database".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Critical GitLab vulnerability could allow attackers to steal runner registration tokens πŸ—“οΈ

Flaw present in multiple versions of DevOps platform – update now

πŸ“– Read

via "The Daily Swig".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Beyond the Hype: AI's Future in Defensive Cybersecurity πŸ•΄

Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.

πŸ“– Read

via "Dark Reading".
12:16
πŸ—“οΈ Private chat? Chrome Skype extension with 9m installs found to be leaking user info πŸ—“οΈ

Microsoft addresses issue at eleventh hour, as researcher publicly discloses β€˜trivial’ privacy bug in browser plugin

πŸ“– Read

via "The Daily Swig".
12:23
β€Ό CVE-2022-23380 β€Ό

There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2022-23377 β€Ό

Archeevo below 5.0 is affected by local file inclusion through file=~/web.config to allow an attacker to retrieve local files.

πŸ“– Read

via "National Vulnerability Database".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Toyota shuts down production after β€˜cyber-attack’ on supplier πŸ—“οΈ

JITter in the supply chain

πŸ“– Read

via "The Daily Swig".
?
14:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ukraine Hit with Novel β€˜FoxBlade’ Trojan Hours Before Invasion ❌

Microsoft detected cyberattacks launched against Ukraine hours before Russia’s tanks and missiles began to pummel the country last week.

πŸ“– Read

via "Threat Post".
?
14:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Instagram scammers as busy as ever: passwords and 2FA codes at risk ⚠

Instagram scams don't seem to be dying out - we're seeing more variety and trickiness than ever...

πŸ“– Read

via "Naked Security".
14:23
β€Ό CVE-2021-44238 β€Ό

AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE) via /aya/module/admin/ust_tab_e.inc.php,

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-46387 β€Ό

ZyXEL ZyWALL 2 Plus Internet Security Appliance is affected by Cross Site Scripting (XSS). Insecure URI handling leads to bypass security restriction to achieve Cross Site Scripting, which allows an attacker able to execute arbitrary JavaScript codes to perform multiple attacks such as clipboard hijacking and session hijacking.

πŸ“– Read

via "National Vulnerability Database".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Daxin Espionage Backdoor Ups the Ante on Chinese Malware ❌

Via node-hopping, the espionage tool can reach computers that aren't even connected to the internet.

πŸ“– Read

via "Threat Post".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4925 β€Ό

A security vulnerability in the Spectrum Scale 5.0 and 5.1 allows a non-root user to overflow the mmfsd daemon with requests and preventing the daemon to service other requests. IBM X-Force ID: 191599.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-38986 β€Ό

IBM MQ Appliance 9.2 CD and 9.2 LTS does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 212942.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-23387 β€Ό

An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-36166 β€Ό

An improper authentication vulnerability in FortiMail before 7.0.1 may allow a remote attacker to efficiently guess one administrative account's authentication token by means of the observation of certain system's properties.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-36171 β€Ό

The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2022-22321 β€Ό

IBM MQ Appliance 9.2 CD and 9.2 LTS local messaging users stored with a password hash that provides insufficient protection. IBM X-Force ID: 218368.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2021-38955 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a local user with elevated privileges to cause a denial of service due to a file creation vulnerability in the audit commands. IBM X-Force ID: 211825.

πŸ“– Read

via "National Vulnerability Database".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Conti Ransomware Group Diaries, Part I: Evasion β™ŸοΈ

A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million in annual revenue. The chat logs offer a fascinating glimpse into the challenges of running a sprawling criminal enterprise with more than 100 salaried employees. The records also provide insight into how Conti has dealt with its own internal breaches and attacks from private security firms and foreign governments.

πŸ“– Read

via "Krebs on Security".
18:16
πŸ•΄ What Do I Need to Know for SaaS Security? πŸ•΄

Most importantly, someone needs to step forward and take it on as their job.

πŸ“– Read

via "Dark Reading".
18:23
β€Ό CVE-2021-43075 β€Ό

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the alarm dashboard and controller config handlers.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-32586 β€Ό

An improper input validation vulnerability in the web server CGI facilities of FortiMail before 7.0.1 may allow an unauthenticated attacker to alter the environment of the underlying script interpreter via specifically crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2020-15936 β€Ό

A improper input validation in Fortinet FortiGate version 6.4.3 and below, version 6.2.5 and below, version 6.0.11 and below, version 5.6.13 and below allows attacker to disclose sensitive information via SNI Client Hello TLS packets.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-24718 β€Ό

ssr-pages is an HTML page builder for the purpose of server-side rendering (SSR). In versions prior to 0.1.4, a path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function. While there is no known workaround at this time, there is a patch in version 0.1.4.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-24717 β€Ό

ssr-pages is an HTML page builder for the purpose of server-side rendering (SSR). In versions prior to 0.1.5, a cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. While there is no known workaround at this time, there is a patch in version 0.1.5.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-41193 β€Ό

wire-avs is the audio visual signaling (AVS) component of Wire, an open-source messenger. A remote format string vulnerability in versions prior to 7.1.12 allows an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 7.1.12. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2022-22300 β€Ό

A improper handling of insufficient permissions or privileges in Fortinet FortiAnalyzer version 5.6.0 through 5.6.11, FortiAnalyzer version 6.0.0 through 6.0.11, FortiAnalyzer version 6.2.0 through 6.2.9, FortiAnalyzer version 6.4.0 through 6.4.7, FortiAnalyzer version 7.0.0 through 7 .0.2, FortiManager version 5.6.0 through 5.6.11, FortiManager version 6.0.0 through 6.0.11, FortiManager version 6.2.0 through 6.2.9, FortiManager version 6.4.0 through 6.4.7, FortiManager version 7.0.0 through 7.0.2 allows attacker to bypass the device policy and force the password-change action for its user.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-43077 β€Ό

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the AP monitor handlers.

πŸ“– Read

via "National Vulnerability Database".
?
19:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ RCE Bugs in WhatsApp, Other Hugely Popular VoIP Apps: Patch Now! ❌

The flaws are in the ubiquitous open-source PJSIP multimedia communication library, used by the Asterisk PBX toolkit that's found in a massive number of VoIP implementations.

πŸ“– Read

via "Threat Post".
19:16
πŸ•΄ IRONSCALES Expands Product Offering Across Email, Communication Platforms πŸ•΄

New solutions protect customers from expanding threats to cybersecurity landscape.

πŸ“– Read

via "Dark Reading".
?
20:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyberattacks in Ukraine Soon Could Spill Over to Other Countries πŸ•΄

Email-borne attacks out of Russia have already targeted at least a few US and European organizations.

πŸ“– Read

via "Dark Reading".
20:24
β€Ό CVE-2022-24719 β€Ό

Fluture-Node is a FP-style HTTP and streaming utils for Node based on Fluture. Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing. The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin. A workaround has been identified by using a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2.

πŸ“– Read

via "National Vulnerability Database".
2 March 2022
?
03:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0577 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.

πŸ“– Read

via "National Vulnerability Database".
?
08:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22303 β€Ό

An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiManager versions prior to 7.0.2, 6.4.7 and 6.2.9 may allow a low privileged authenticated user to gain access to the FortiGate users credentials via the config conflict file.

πŸ“– Read

via "National Vulnerability Database".
08:24
β€Ό CVE-2022-22301 β€Ό

An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in FortiAP-C console 5.4.0 through 5.4.3, 5.2.0 through 5.2.1 may allow an authenticated attacker to execute unauthorized commands by running CLI commands with specifically crafted arguments.

πŸ“– Read

via "National Vulnerability Database".
08:24
β€Ό CVE-2021-44166 β€Ό

An improper access control vulnerability [CWE-284 ] in FortiToken Mobile (Android) external push notification 5.1.0 and below may allow a remote attacker having already obtained a user's password to access the protected system during the 2FA procedure, even though the deny button is clicked by the legitimate user.

πŸ“– Read

via "National Vulnerability Database".
?
09:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Remote code execution vulnerability uncovered in Hashnode blogging platform πŸ—“οΈ

A local file coding error could be exploited to trigger RCE

πŸ“– Read

via "The Daily Swig".
?
10:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23395 β€Ό

jQuery Cookie 1.4.1 is affected by parameter pollution, which can lead to DOM cross-site scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
10:23
β€Ό CVE-2022-0829 β€Ό

Improper Authorization in GitHub repository webmin/webmin prior to 1.990.

πŸ“– Read

via "National Vulnerability Database".
10:23
β€Ό CVE-2022-0824 β€Ό

Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.

πŸ“– Read

via "National Vulnerability Database".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ IT Pro News In Review: UK likely to pay ransom, OnwardMobility shuts, and Russia blamed for hacks πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
11:19
πŸ“’ Conti ransomware gang data leaked by Ukrainian cyber researcher πŸ“’

The data includes internal chat logs between members and affiliates of the group, unveiling their personal details, conflicts, and accusations

πŸ“– Read

via "ITPro".
11:19
πŸ“’ Hacking group leaks Nvidia data following alleged ransomware attack πŸ“’

LAPSU$ claims to have released Nvidia source code and highly confidential GPU driver data

πŸ“– Read

via "ITPro".
11:19
πŸ“’ Russian cyber attacks on Ukraine: What we know so far πŸ“’

A score of additional attacks on the Ukrainian government and other critical services have been reported this week, as Russia officially declares war on the country

πŸ“– Read

via "ITPro".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Ukraine invasion: WordPress-hosted university websites hacked in β€˜targeted attacks’ πŸ—“οΈ

Education institutions hit by more than 100,000 attacks in 24 hours

πŸ“– Read

via "The Daily Swig".
12:07
πŸ•΄ Reduce Risk With Better Cyber Due Diligence πŸ•΄

Done incorrectly, due diligence can result in slower integration of assets, which increases acquisition costs associated and could reduce expected gains.

πŸ“– Read

via "Dark Reading".
12:07
πŸ•΄ NeuraLegion Rebrands as Bright Security πŸ•΄

Also announces $20 million Series A funding round led by Evolution Equity Partners.

πŸ“– Read

via "Dark Reading".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware with a difference: β€œDerestrict your software, or else!” ⚠

"Change your code to improve cryptomining"... or we'll dump 1TB of stolen secrets.

πŸ“– Read

via "Naked Security".
?
14:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0819 β€Ό

Code Injection in GitHub repository dolibarr/dolibarr prior to 15.0.1.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2022-24306 β€Ό

Zoho ManageEngine SharePoint Manager Plus before 4329 allows account takeover because authorization is mishandled.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2022-25634 β€Ό

Qt through 5.15.8 and 6.x through 6.2.3 can load system library files from an unintended working directory.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2022-23779 β€Ό

Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2022-24447 β€Ό

An issue was discovered in Zoho ManageEngine Key Manager Plus before 6200. A service exposed by the application allows a user, with the level Operator, to access stored SSL certificates and associated key pairs during export.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2022-24305 β€Ό

Zoho ManageEngine SharePoint Manager Plus before 4329 is vulnerable to a sensitive data leak that leads to privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
14:34
πŸ›  GRAudit Grep Auditing Tool 3.4 πŸ› 

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

πŸ“– Read

via "Packet Storm Security".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Ways to Expand Gender Diversity in Cybersecurity πŸ•΄

Why this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.

πŸ“– Read

via "Dark Reading".
15:12
β™ŸοΈ Conti Ransomware Group Diaries, Part II: The Office β™ŸοΈ

Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves.

πŸ“– Read

via "Krebs on Security".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Protecting Field Programmable Gate Arrays From Attacks πŸ•΄

FPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be potentially serious.

πŸ“– Read

via "Dark Reading".
?
16:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25016 β€Ό

Home Owners Collection Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /student_attendance/index.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2021-43070 β€Ό

Multiple relative path traversal vulnerabilities [CWE-23] in FortiWLM management interface 8.6.2 and below, 8.5.2 and below, 8.4.2 and below, 8.3.3 and below, 8.2.2 may allow an authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-22350 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in CAA to cause a denial of service. IBM X-Force ID: 220394.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2021-38996 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 213076.

πŸ“– Read

via "National Vulnerability Database".
16:38
πŸ•΄ Companies' Code Leaking More Passwords and Secrets πŸ•΄

Software code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations' security at risk.

πŸ“– Read

via "Dark Reading".
16:52
πŸ” Senate Passes Act That Would Require Disclosing Cyberattacks πŸ”

The Senate has passed legislation that among other requirements, would require critical infrastructure entities to report to the federal government when they are hacked.

πŸ“– Read

via "".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Devise Attack for Stealing Data During Homomorphic Encryption πŸ•΄

A vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.

πŸ“– Read

via "Dark Reading".
18:25
β€Ό CVE-2021-38268 β€Ό

The Dynamic Data Mapping module in Liferay Portal through v7.3.6 and Liferay DXP through v7.3 incorrectly sets default permissions for site members, allowing authenticated attackers to add and duplicate forms via the UI or the API.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2022-23878 β€Ό

seacms V11.5 is affected by an arbitrary code execution vulnerability in admin_config.php.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2022-23640 β€Ό

Excel-Streaming-Reader is an easy-to-use implementation of a streaming Excel reader using Apache POI. Prior to xlsx-streamer 2.1.0, the XML parser that was used did apply all the necessary settings to prevent XML Entity Expansion issues. Upgrade to version 2.1.0 to receive a patch. There is no known workaround.

πŸ“– Read

via "National Vulnerability Database".
18:38
πŸ•΄ 7 Ways to Secure Collaboration Tools in Your Organization πŸ•΄

The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.

πŸ“– Read

via "Dark Reading".
?
20:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TeaBot Trojan Haunts Google Play Store, Again ❌

Malicious Google Play apps have circumvented censorship by hiding trojans in software updates.

πŸ“– Read

via "Threat Post".
20:25
β€Ό CVE-2022-23958 β€Ό

Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2021-41001 β€Ό

An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-0711 β€Ό

A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23954 β€Ό

Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23656 β€Ό

Zulip is an open source team chat app. The `main` development branch of Zulip Server from June 2021 and later is vulnerable to a cross-site scripting vulnerability on the recent topics page. An attacker could maliciously craft a full name for their account and send messages to a topic with several participants; a victim who then opens an overflow tooltip including this full name on the recent topics page could trigger execution of JavaScript code controlled by the attacker. Users running a Zulip server from the main branch should upgrade from main (2022-03-01 or later) again to deploy this fix.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2021-41003 β€Ό

Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-0675 β€Ό

In certain situations it is possible for an unmanaged rule to exist on the target system that has the same comment as the rule specified in the manifest. This could allow for unmanaged rules to exist on the target system and leave the system in an unsafe state.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23957 β€Ό

Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-22944 β€Ό

VMware Workspace ONE Boxer contains a stored cross-site scripting (XSS) vulnerability. Due to insufficient sanitization and validation, in VMware Workspace ONE Boxer calendar event descriptions, a malicious actor can inject script tags to execute arbitrary script within a user's window.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2021-45074 β€Ό

JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23955 β€Ό

Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23956 β€Ό

Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-25045 β€Ό

Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2021-46270 β€Ό

JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2021-41000 β€Ό

Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2021-41002 β€Ό

Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2022-23953 β€Ό

Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.

πŸ“– Read

via "National Vulnerability Database".
3 March 2022
?
03:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23849 β€Ό

The biometric lock in Devolutions Password Hub for iOS before 2021.3.4 allows attackers to access the application because of authentication bypass. An attacker must rapidly make failed biometric authentication attempts.

πŸ“– Read

via "National Vulnerability Database".
03:25
β€Ό CVE-2021-42950 β€Ό

Remote Code Execution (RCE) vulnerability exists in Zepl Notebooks all previous versions before October 25 2021. Users can register for an account and are allocated a set number of credits to try the product. Once users authenticate, they can proceed to create a new organization by which additional users can be added for various collaboration abilities, which allows malicious user to create new Zepl Notebooks with various languages, contexts, and deployment scenarios. Upon creating a new notebook with specially crafted malicious code, a user can then launch remote code execution.

πŸ“– Read

via "National Vulnerability Database".
03:25
β€Ό CVE-2022-24563 β€Ό

In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.

πŸ“– Read

via "National Vulnerability Database".
03:25
β€Ό CVE-2022-24573 β€Ό

A stored cross-site scripting (XSS) vulnerability in the admin interface in Element-IT HTTP Commander 7.0.0 allows unauthenticated users to get admin access by injecting a malicious script in the User-Agent field.

πŸ“– Read

via "National Vulnerability Database".
?
08:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Ransomware with a difference: β€œDerestrict your software, or else!” ⚠

"Change your code to improve cryptomining"... or we'll dump 1TB of stolen secrets.

πŸ“– Read

via "Naked Security".
08:26
β€Ό CVE-2022-0528 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository transloadit/uppy prior to 3.3.1.

πŸ“– Read

via "National Vulnerability Database".
?
10:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ β€˜We’re firefighters for victims of armed conflict’ – Hackers Without Borders co-founder on NGO’s timely arrival πŸ—“οΈ

β€˜We had NGOs for press, medical staff, and mental health issues, but not for cyber-attack victims’

πŸ“– Read

via "The Daily Swig".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Retailers Can Address 'Buy Now, Pay Later' Fraud πŸ•΄

As BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.

πŸ“– Read

via "Dark Reading".
11:23
⚠ S3 Ep72: AirTag stalking, web server coding woes and Instascams [Podcast + Transcript] ⚠

Latest episode - listen now (or read it, if that's your preference)...

πŸ“– Read

via "Naked Security".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Securing Data With a Frenzied Remote Workforce–Podcast ❌

Stock the liquor cabinet and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say β€œZero Trust.”

πŸ“– Read

via "Threat Post".
12:09
πŸ•΄ How to Get One Step Ahead of Mobile Attacks πŸ•΄

The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.

πŸ“– Read

via "Dark Reading".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40635 β€Ό

OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch.php, ChooseRequestSearch.php. An attacker can inject a SQL query to extract information from the database.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2022-23648 β€Ό

containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerdΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerdΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-40636 β€Ό

OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database.

πŸ“– Read

via "National Vulnerability Database".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Russia Leaks Data From a Thousand Cuts–Podcast ❌

It’s not just Ukraine: There's a flood of intel on Russian military, nukes and crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware gang shuttering its leaking Jabber chat server.

πŸ“– Read

via "Threat Post".
13:34
πŸ—“οΈ Nvidia hackers allegedly attempting to blackmail company into open-sourcing GPU drivers πŸ—“οΈ

Unusual demand follows request that hardware firm removes mining hashrate limiters on GPUs

πŸ“– Read

via "The Daily Swig".
?
14:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40637 β€Ό

OS4ED openSIS 8.0 is affected by cross-site scripting (XSS) in EmailCheckOthers.php. An attacker can inject JavaScript code to get the user's cookie and take over the working session of user.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-43774 β€Ό

A risky-algorithm issue was discovered on Fujifilm DocuCentre-VI C4471 1.8 devices. An attacker that obtained access to the administrative web interface of a printer (e.g., by using the default credentials) can download the address book file, which contains the list of users (domain users, FTP users, etc.) stored on the printer, together with their encrypted passwords. The passwords are protected by a weak cipher, such as ROT13, which requires minimal effort to instantly retrieve the original password, giving the attacker a list of valid domain or FTP usernames and passwords.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2022-0753 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.9.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2022-0841 β€Ό

OS Command Injection in GitHub repository ljharb/npm-lockfile prior to v2.0.5.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2022-22706 β€Ό

An Arm product family through 2022-01-03 has an Exposed Dangerous Method or Function.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-45819 β€Ό

Wordline HIDCCEMonitorSVC before v5.2.4.3 contains an unquoted service path which allows attackers to escalate privileges to the system level.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2022-25031 β€Ό

Remote Desktop Commander Suite Agent before v4.8 contains an unquoted service path which allows attackers to escalate privileges to the system level.

πŸ“– Read

via "National Vulnerability Database".
14:39
πŸ•΄ Attivo Expands Active Directory Protection from Unmanaged Devices, Including Mac, Linux, IoT/OT πŸ•΄

Attivo Networks ADSecure-DC solution joins the company’s existing suite of Active Directory protection products.

πŸ“– Read

via "Dark Reading".
14:39
πŸ•΄ 8-Character Passwords Can Be Cracked in Less than 60 Minutes πŸ•΄

Researchers say passwords with less than seven characters can be hacked "instantly."

πŸ“– Read

via "Dark Reading".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Google WAF bypassed via oversized POST requests πŸ—“οΈ

Security research highlights web application firewall security risk

πŸ“– Read

via "The Daily Swig".
?
16:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26128 β€Ό

A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-26126 β€Ό

Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a non-zero-terminated binary string in isis_nb_notifications.c.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-26125 β€Ό

Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-26129 β€Ό

Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-25138 β€Ό

Axelor Open Suite v5.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Name parameter.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-26127 β€Ό

A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to missing a check on the input packet length in the babel_packet_examin function in babeld/message.c.

πŸ“– Read

via "National Vulnerability Database".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” OCR Urges Organizations to Secure Health Information in 2022 πŸ”

The Director of HHS OCR called on healthcare organizations this week to strengthen their cyber posture in 2022.

πŸ“– Read

via "".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Mesh Architecture: Hope or Hype? πŸ•΄

Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?

πŸ“– Read

via "Dark Reading".
18:26
β€Ό CVE-2021-3620 β€Ό

A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2021-3602 β€Ό

An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD environment, environment variables may include sensitive information that was shared with the container in order to be used only by Buildah itself (e.g. container registry credentials).

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2022-23899 β€Ό

MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via search.do in the file /web/MCmsAction.java.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2022-0492 β€Ό

A vulnerability was found in the Linux kernelÒ€ℒs cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2022-25125 β€Ό

MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via search.do in the file /mdiy/dict/listExcludeApp.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2022-23898 β€Ό

MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2021-3609 β€Ό

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2022-24724 β€Ό

cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.

πŸ“– Read

via "National Vulnerability Database".
18:26
β€Ό CVE-2022-22700 β€Ό

CyberArk Identity versions up to and including 22.1 in the 'StartAuthentication' resource, exposes the response header 'X-CFY-TX-TM'. In certain configurations, that response header contains different, predictable value ranges which can be used to determine whether a user exists in the tenant.

πŸ“– Read

via "National Vulnerability Database".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Accelerated Ransomware Attacks Pressure Targeted Companies to Speed Response πŸ•΄

Threat actors have focused on two ends of the spectrum β€” quick, impactful attacks or stealthy intrusions β€” making strong prevention and faster response more important for enterprises.

πŸ“– Read

via "Dark Reading".
?
20:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21716 β€Ό

Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22691 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-23709 β€Ό

A flaw was discovered in Kibana in which users with Read access to the Uptime feature could modify alerting rules. A user with this privilege would be able to create new alerting rules or overwrite existing ones. However, any new or modified rules would not be enabled, and a user with this privilege could not modify alerting connectors. This effectively means that Read users could disable existing alerting rules.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22692 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-23710 β€Ό

A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victimÒ€ℒs browser.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-38577 β€Ό

Heap Overflow in BaseBmpSupportLib.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22693 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22686 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-23052 β€Ό

PeteReport Version 0.5 contains a Cross Site Request Forgery (CSRF) vulnerability allowing an attacker to trick users into deleting users, products, reports and findings on the application.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-38578 β€Ό

Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-22943 β€Ό

VMware Tools for Windows (11.x.y and 10.x.y prior to 12.0.0) contains an uncontrolled search path vulnerability. A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22687 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-0265 β€Ό

Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast prior to 5.1.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22695 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22690 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-22689 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-23051 β€Ό

PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code while adding an 'Attack Tree' by modifying the 'svg_file' parameter.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-22947 β€Ό

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2022-23708 β€Ό

A flaw was discovered in Elasticsearch 7.17.0Ò€ℒs upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with Ò€œ*Ҁ� index permissions access to this index.

πŸ“– Read

via "National Vulnerability Database".
20:26
β€Ό CVE-2021-4002 β€Ό

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.

πŸ“– Read

via "National Vulnerability Database".
4 March 2022
?
09:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Equifax data breach: Consumers unlikely to benefit financially from final settlement πŸ—“οΈ

Potential claimants would face an β€˜uphill battle in order to establish standing’, says US privacy law expert

πŸ“– Read

via "The Daily Swig".
?
10:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23327 β€Ό

A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-0752 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository hestiacp/hestiacp prior to 1.5.9.

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2022-23328 β€Ό

A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ RCE vulnerability in Dynamicweb enterprise software could allow server compromise πŸ—“οΈ

β€˜Extremely easy to exploit’ bug introduced to codebase in 2018, say researchers

πŸ“– Read

via "The Daily Swig".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DORA's Global Reach and Why Enterprises Need to Prepare πŸ•΄

The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.

πŸ“– Read

via "Dark Reading".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46393 β€Ό

There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v10 variable is directly retrieved from the http request parameter startIp. Then v10 will be splice to stack by function sscanf without any security check,which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-46394 β€Ό

There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v13 variable is directly retrieved from the http request parameter startIp. Then v13 will be splice to stack by function sscanf without any security check, which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-43392 β€Ό

STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to obtain information on cryptographic secrets. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2022-26201 β€Ό

Victor CMS v1.0 was discovered to contain a SQL injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-44321 β€Ό

Mini-Inventory-and-Sales-Management-System is affected by Cross Site Request Forgery (CSRF), where an attacker can update/delete items in the inventory. The attacker must be logged into the application create a malicious file for updating the inventory details and items.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2022-0831 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-43393 β€Ό

STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to abuse signature verification. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2022-0832 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.

πŸ“– Read

via "National Vulnerability Database".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Japanese beauty retailer Acro blames third-party hack for breach of 100k payment cards πŸ—“οΈ

Company traces compromise to vulnerability in payment processor’s systems

πŸ“– Read

via "The Daily Swig".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep72: AirTag stalking, web server coding woes and Instascams [Podcast + Transcript] ⚠

Latest episode - listen now (or read it, if that's your preference)...

πŸ“– Read

via "Naked Security".
14:04
❌ Free HermeticRansom Ransomware Decryptor Released ❌

Cruddy cryptography means victims whose files have been encrypted by the Ukraine-tormenting ransomware can break the chains without paying extortionists.

πŸ“– Read

via "Threat Post".
?
14:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-18327 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Alfresco Alfresco Community Edition v5.2.0 via the action parameter in the alfresco/s/admin/admin-nodebrowser API. Fixed in v6.2

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2022-23729 β€Ό

When the device is in factory state, it can be access the shell without adb authentication process. The LG ID is LVE-SMP-210010.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-46381 β€Ό

Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-46379 β€Ό

DLink DIR850 ET850-1.08TRb03 is affected by an incorrect access control vulnerability through URL redirection to untrusted site.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-46382 β€Ό

Unauthenticated cross-site scripting (XSS) in Netgear WAC120 AC Access Point may lead to mulitple attacks like session hijacking even clipboard hijacking.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-18324 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2022-26336 β€Ό

A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-46380 β€Ό

Chained Cross Site Request Forgery (CSRF) with Reflected Cross Site Scripting (XSS) vulnerability in WAGO 750-8212 PFC200 G2 2ETH RS leads to session hijacking.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-3744 β€Ό

A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2022-0839 β€Ό

Improper Restriction of XML External Entity Reference in GitHub repository liquibase/liquibase prior to 4.8.0.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2022-23397 β€Ό

The Cedar Gate EZ-NET portal 6.5.5 6.8.0 Internet portal has a call to display messages to users which does not properly sanitize data sent in through a URL parameter. This leads to a Reflected Cross-Site Scripting vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-18325 β€Ό

Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-18326 β€Ό

Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-23214 β€Ό

When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2022-22946 β€Ό

In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-46378 β€Ό

DLink DIR850 ET850-1.08TRb03 is affected by an incorrect access control vulnerability through an unauthenticated remote configuration download.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-3743 β€Ό

An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 3/4 πŸ”

Utah latest state poised to pass privacy law, the Conti ransomware leaks, and more - catch up on the week's infosec news with the Friday Five!

πŸ“– Read

via "".
16:30
β€Ό CVE-2022-25623 β€Ό

The Symantec Management Agent is susceptible to a privilege escalation vulnerability. A low privilege local account can be elevated to the SYSTEM level through registry manipulations.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2022-24727 β€Ό

Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-20319 β€Ό

An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-3575 β€Ό

A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2022-23233 β€Ό

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are susceptible to a vulnerability which when successfully exploited could lead to Denial of Service (DoS) of the Local Distribution Router (LDR) service.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-20300 β€Ό

A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2022-21828 β€Ό

A user with high privilege access to the Incapptic Connect web console can remotely execute code on the Incapptic Connect server using a unspecified attack vector in Incapptic Connect version 1.40.0, 1.39.1, 1.39.0, 1.38.1, 1.38.0, 1.37.1, 1.37.0, 1.36.0, 1.35.5, 1.35.4 and 1.35.3.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-3428 β€Ό

A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-20303 β€Ό

A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-20302 β€Ό

A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2022-23232 β€Ό

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are susceptible to a vulnerability which when successfully exploited could allow disabled, expired, or locked external user accounts to access S3 data to which they previously had access. StorageGRID 11.6.0 obtains the user account status from Active Directory or Azure and will block S3 access for disabled user accounts during the subsequent background synchronization. User accounts that are expired or locked for Active Directory or Azure, or user accounts that are disabled, expired, or locked in identity sources other than Active Directory or Azure must be manually removed from group memberships or have their S3 keys manually removed from Tenant Manager in all versions of StorageGRID (formerly StorageGRID Webscale).

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2022-26318 β€Ό

On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.

πŸ“– Read

via "National Vulnerability Database".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ China's "most advanced" malware uncovered after nine years in operation πŸ“’

Daxin appears to be have used in a long-running espionage campaign against select government and critical infrastructure targets

πŸ“– Read

via "ITPro".
17:23
πŸ“’ Nvidia confirms data breach as hackers make additional demands πŸ“’

Nvidia has confirmed a rumoured hack on its systems for the first time as the first part of the alleged 1TB of company secrets is made available to download

πŸ“– Read

via "ITPro".
17:23
πŸ“’ The importance of a zero-trust model for hybrid working πŸ“’

How identity-based security solutions can help protect our dispersed workforces

πŸ“– Read

via "ITPro".
17:23
πŸ“’ Conti source code leaked by Ukrainian researcher πŸ“’

Source code hits the public domain as fallout continues over ransomware group's support for Russia

πŸ“– Read

via "ITPro".
17:23
πŸ“’ Why is the healthcare industry so vulnerable to ransomware? πŸ“’

Hospitals and other healthcare institutions must invest in cutting-edge backup solutions to protect themselves and their patients’ data

πŸ“– Read

via "ITPro".
17:23
πŸ“’ Singapore to launch digital defence agency to counter growing cyber threats πŸ“’

Russian cyber tactics in Ukraine cited as reason behind new military arm

πŸ“– Read

via "ITPro".
17:23
πŸ“’ How Telegram became Ukraine's biggest digital ally in the war πŸ“’

The messaging app has experienced a surge in demand as users flock to the platform for news and instructions on how to participate in the effort to thwart Russia's invasion

πŸ“– Read

via "ITPro".
17:23
πŸ“’ Big Tech enters fight against Russia's multi-pronged cyber offensive πŸ“’

Microsoft, Google, Meta, and Twitter have implemented measures to help dampen the impact of Russia's cyber attacks on Ukraine

πŸ“– Read

via "ITPro".
17:23
πŸ“’ MWC 2022: Ukrainian protesters call for Russian tech boycott πŸ“’

The protestors are urging AWS to β€œshut down” servers being used by Russian entities

πŸ“– Read

via "ITPro".
17:23
πŸ“’ Cyber attacks against the BBC increase 35% in two years πŸ“’

The broadcaster said it fended off nearly 50 million cyber attacks in just four months across 2021 and 2022

πŸ“– Read

via "ITPro".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Conti Ransomware Group Diaries, Part III: Weaponry β™ŸοΈ

Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it's like to be an employee of Conti's sprawling organization. Today's Part III looks at how Conti abused a panoply of popular commercial security services to undermine the security of their targets, as well as how the team’s leaders strategized for the upper hand in ransom negotiations with victims.

πŸ“– Read

via "Krebs on Security".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26484 β€Ό

An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-3737 β€Ό

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2022-26483 β€Ό

An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. A reflected cross-site scripting (XSS) vulnerability in admin/cgi-bin/listdir.pl allows authenticated remote administrators to inject arbitrary web script or HTML into an HTTP GET parameter (which reflect the user input without sanitization).

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-27757 β€Ό

" Insecure password storage issue.The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Since the information is stored in cleartext, attackers could potentially read it and gain access to sensitive information."

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-3656 β€Ό

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2022-25106 β€Ό

D-Link DIR-859 v1.05 was discovered to contain a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2022-23915 β€Ό

The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2022-0855 β€Ό

Improper Resolution of Path Equivalence in GitHub repository microweber-dev/whmcs_plugin prior to 0.0.4.

πŸ“– Read

via "National Vulnerability Database".
?
19:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Most Cybersecurity Vendors at Risk Due to Internet-Exposed IT Assets πŸ•΄

Study shows more than 97% have exposed assets on AWS β€” among a wide range of other issues.

πŸ“– Read

via "Dark Reading".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Companies Can't Just Train Their Way to More Secure Endpoints πŸ•΄

Criminals will keep stealing end-user credentials despite employee awareness, so organizations need high-tech solutions as well.

πŸ“– Read

via "Dark Reading".
19:40
πŸ•΄ More Than 70% of SOC Analysts Experiencing Burnout πŸ•΄

Nearly 65% of security operations center (SOC) analysts are likely to change jobs in the next year, survey shows.

πŸ“– Read

via "Dark Reading".
?
20:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Massive Meris Botnet Embeds Ransomware Notes from REvil ❌

Notes threatening to tank targeted companies' stock price were embedded into the DDoS ransomware attacks as a string_of_text directed to CEOs and webops_geeks in the URL.

πŸ“– Read

via "Threat Post".
?
20:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46353 β€Ό

An information disclosure in web interface in D-Link DIR-X1860 before 1.03 RevA1 allows a remote unauthenticated attacker to send a specially crafted HTTP request and gain knowledge of different absolute paths that are being used by the web application.

πŸ“– Read

via "National Vulnerability Database".
20:27
β€Ό CVE-2021-46384 β€Ό

https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¢¢ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.

πŸ“– Read

via "National Vulnerability Database".
20:27
β€Ό CVE-2021-44827 β€Ό

There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.

πŸ“– Read

via "National Vulnerability Database".
20:27
β€Ό CVE-2021-40846 β€Ό

An issue was discovered in Rhinode Trading Paints through 2.0.36. TP Updater.exe uses cleartext HTTP to check, and request, updates. Thus, attackers can man-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.

πŸ“– Read

via "National Vulnerability Database".
20:27
β€Ό CVE-2021-27756 β€Ό

"TLS-RSA cipher suites are not disabled in BigFix Compliance up to v2.0.5. If TLS 2.0 and secure ciphers are not enabled then an attacker can passively record traffic and later decrypt it."

πŸ“– Read

via "National Vulnerability Database".
20:27
β€Ό CVE-2021-43590 β€Ό

Dell EMC Enterprise Storage Analytics for vRealize Operations, versions 4.0.1 to 6.2.1, contain a Plain-text password storage vulnerability. A local high privileged malicious user may potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

πŸ“– Read

via "National Vulnerability Database".
20:27
β€Ό CVE-2021-32008 β€Ό

This issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Improper Limitation of a Pathname to restricted directory, allows logged in GateManager admin to delete system Files or Directories.

πŸ“– Read

via "National Vulnerability Database".
?
22:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25312 β€Ό

An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7.

πŸ“– Read

via "National Vulnerability Database".
5 March 2022
?
03:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ The new rules of ransomware πŸ“’

The rise in working from home has brought with it a rise in ransomware attacks, but an effective backup routine can guard against disaster

πŸ“– Read

via "ITPro".
03:20
πŸ“’ Microsoft releases Defender for Azure Cosmos DB in preview πŸ“’

The database protection service is exclusive to Microsoft Defender for Cloud users

πŸ“– Read

via "ITPro".
03:20
πŸ“’ Anonymous hacks website of Russian Space Research Institute πŸ“’

Russia’s lunar missions files were obtained through a brute-force attack on a private service hosted by Roscosmos

πŸ“– Read

via "ITPro".
03:20
πŸ“’ Cisco patches critical bugs in collaboration products πŸ“’

Attackers could exploit the flaw to run their own code on Cisco's video conferencing servers

πŸ“– Read

via "ITPro".
03:20
πŸ“’ IT Pro News In Review: Compromised Nvidia data, protesters boycott Russian tech, Conti data breach πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
03:25
πŸ“’ OneWeb suspends satellite launch from Russian spaceport πŸ“’

The decision follows Roscosmos’ demand that the UK sell its 20% stake in OneWeb purchased in 2020

πŸ“– Read

via "ITPro".
03:28
β€Ό CVE-2022-25069 β€Ό

Mark Text v0.16.3 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to perform remote code execution (RCE) via injecting a crafted payload into /lib/contentState/pasteCtrl.js.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2022-25465 β€Ό

Espruino 2v11 release was discovered to contain a stack buffer overflow via src/jsvar.c in jsvGetNextSibling.

πŸ“– Read

via "National Vulnerability Database".
03:29
β€Ό CVE-2022-25044 β€Ό

Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.

πŸ“– Read

via "National Vulnerability Database".
?
08:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0849 β€Ό

Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.

πŸ“– Read

via "National Vulnerability Database".
?
16:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Firefox patches two in-the-wild exploits – update now! ⚠

Firefox just published a double-zero-day patch - "remote code execution" combined with "sandbox escape". Update now!

πŸ“– Read

via "Naked Security".
6 March 2022
?
03:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26487 β€Ό

Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allow remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic).

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2022-26490 β€Ό

st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.

πŸ“– Read

via "National Vulnerability Database".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0868 β€Ό

Open Redirect in GitHub repository medialize/uri.js prior to 1.19.10.

πŸ“– Read

via "National Vulnerability Database".
?
18:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44748 β€Ό

A vulnerability affecting F-Secure SAFE browser was discovered whereby browsers loads images automatically this vulnerability can be exploited remotely by an attacker to execute the JavaScript can be used to trigger universal cross-site scripting through the browser. User interaction is required prior to exploitation, such as entering a malicious website to trigger the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:29
β€Ό CVE-2021-44749 β€Ό

A vulnerability affecting F-Secure SAFE browser protection was discovered improper URL handling can be triggered to cause universal cross-site scripting through browsing protection in a SAFE web browser. User interaction is required prior to exploitation. A successful exploitation may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
?
22:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0697 β€Ό

Open Redirect in GitHub repository archivy/archivy prior to 1.7.0.

πŸ“– Read

via "National Vulnerability Database".
7 March 2022
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4199 β€Ό

Incorrect Permission Assignment for Critical Resource vulnerability in the crash handling component BDReinit.exe as used in Bitdefender Total Security, Internet Security, Antivirus Plus, Endpoint Security Tools for Windows allows a remote attacker to escalate local privileges to SYSTEM. This issue affects: Bitdefender Total Security versions prior to 26.0.10.45. Bitdefender Internet Security versions prior to 26.0.10.45. Bitdefender Antivirus Plus versions prior to 26.0.10.45. Bitdefender Endpoint Security Tools for Windows versions prior to 7.4.3.146.

πŸ“– Read

via "National Vulnerability Database".
10:34
β€Ό CVE-2021-4198 β€Ό

A NULL Pointer Dereference vulnerability in the messaging_ipc.dll component as used in Bitdefender Total Security, Internet Security, Antivirus Plus, Endpoint Security Tools, VPN Standalone allows an attacker to arbitrarily crash product processes and generate crashdump files. This issue affects: Bitdefender Total Security versions prior to 26.0.3.29. Bitdefender Internet Security versions prior to 26.0.3.29. Bitdefender Antivirus Plus versions prior to 26.0.3.29. Bitdefender Endpoint Security Tools versions prior to 7.2.2.92. Bitdefender VPN Standalone versions prior to 25.5.0.48.

πŸ“– Read

via "National Vulnerability Database".
10:44
πŸ•΄ After a Busy December, Attacks on Log4J Vulnerability Dropped πŸ•΄

While attackers and researchers shift their attention to the next new vulnerability, security teams make sure they finish patching vulnerable Log4j versions in their applications and services .

πŸ“– Read

via "Dark Reading".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Utah privacy bill places tighter controls on consumer data πŸ—“οΈ

Policymakers move forward with new data privacy legislation

πŸ“– Read

via "The Daily Swig".
12:14
πŸ•΄ Why the World Needs a Global Collective Cyber Defense πŸ•΄

This sort of approach would enable cross-company and cross-sector threat information sharing, an effort that would allow companies to easily turn data into actionable insights.

πŸ“– Read

via "Dark Reading".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0754 β€Ό

SQL Injection in GitHub repository salesagility/suitecrm prior to 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2022-0755 β€Ό

Improper Access Control in GitHub repository salesagility/suitecrm prior to 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2022-0756 β€Ό

Improper Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Firefox Zero-Day Bugs Allow RCE, Sandbox Escape ❌

Both vulnerabilities are use-after-free issues in Mozilla's popular web browser.

πŸ“– Read

via "Threat Post".
14:06
πŸ—“οΈ Fresh flaws in Facebook Canvas earn bug bounty hunter a second payday πŸ—“οΈ

Next-level account takeover

πŸ“– Read

via "The Daily Swig".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Nvidia’s Stolen Code-Signing Certs Used to Sign Malware ❌

Nvidia certificates are being used to sign malware, enabling malicious programs to pose as legitimate and slide past security safeguards on Windows machines.

πŸ“– Read

via "Threat Post".
?
15:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Industrial Systems See More Vulnerabilities, Greater Threat πŸ•΄

The makers of operational technology and connected devices saw reported vulnerabilities grow by half in 2021, but other trends may be more disturbing.

πŸ“– Read

via "Dark Reading".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Samsung Confirms Lapsus$ Ransomware Hit, Source Code Leak ❌

The move comes just a week after GPU-maker NVIDIA was hit by Lapsus$ and every employee credential was leaked.

πŸ“– Read

via "Threat Post".
16:39
β€Ό CVE-2021-38989 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212951.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2022-22351 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged trusted host user to exploit a vulnerability in the nimsh daemon to cause a denial of service in the nimsh daemon on another trusted host. IBM X-Force ID: 220396

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-38988 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212950.

πŸ“– Read

via "National Vulnerability Database".
?
17:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” SEC Mulling New Cybersecurity Rules πŸ”

Recently proposed SEC cybersecurity rules could affect how U.S. securities markets, including issuers, registrants, and service providers, approach compliance efforts.

πŸ“– Read

via "".
?
18:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Novel Attack Turns Amazon Devices Against Themselves ❌

Researchers have discovered how to remotely manipulate the Amazon Echo through its own speakers.

πŸ“– Read

via "Threat Post".
?
19:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Edge Toon: Animal Instincts πŸ•΄

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
19:14
πŸ•΄ Samsung Source Code Compromised in Hack πŸ•΄

Mobile vendor confirms that some source code used with its Galaxy devices was breached.

πŸ“– Read

via "Dark Reading".
?
20:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google in Talks to Acquire Mandiant πŸ•΄

Last month, Microsoft was interested in buying Mandiant. Now, it's Google that is looking at a deal to boost Google Cloud.

πŸ“– Read

via "Dark Reading".
?
21:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trio of Vendors Offer Free Services to Organizations at Risk of Russian Cyberattacks πŸ•΄

CrowdStrike, Cloudflare, and Ping Identity have teamed up with tools and services for the healthcare, power, and water industries as a way to quickly bolster their security on several fronts.

πŸ“– Read

via "Dark Reading".
?
22:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24737 β€Ό

HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didnΓƒΒ’Γ’β€šΒ¬Γ‹Ε“t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
22:40
β€Ό CVE-2021-36809 β€Ό

A local attacker can overwrite arbitrary files on the system with VPN client logs using administrator privileges, potentially resulting in a denial of service and data loss, in all versions of Sophos SSL VPN client.

πŸ“– Read

via "National Vulnerability Database".
22:44
β™ŸοΈ Conti Ransomware Group Diaries, Part IV: Cryptocrime β™ŸοΈ

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies.

πŸ“– Read

via "Krebs on Security".
8 March 2022
?
03:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43944 β€Ό

This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.

πŸ“– Read

via "National Vulnerability Database".
?
09:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Breaking the Bias for International Women’s Day 2022 πŸ•΄

The theme of International Women’s Day 2022 is β€œBreak the bias." This is what #BreaktheBias means to me.

πŸ“– Read

via "Dark Reading".
09:15
πŸ•΄ 8 More Women in Security You May Not Know But Should πŸ•΄

Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up to now.

πŸ“– Read

via "Dark Reading".
?
11:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Concerns raised over bug disclosure program aimed at tackling Russia’s β€˜propaganda machine’ πŸ—“οΈ

Some cybersecurity professionals express unease about β€˜red team’ VDP launched alongside defense-focused program

πŸ“– Read

via "The Daily Swig".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ SQL injection vulnerability in e-learning platform Moodle could enable database takeover πŸ—“οΈ

Security flaw could risk data leak

πŸ“– Read

via "The Daily Swig".
12:06
❌ Bug in the Linux Kernel Allows Privilege Escalation, Container Escape ❌

A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel.

πŸ“– Read

via "Threat Post".
12:15
πŸ•΄ 7 Essentials for More Security-Aware Design Automation πŸ•΄

Electronic design automation solutions, software programs that help designers develop electronic systems and semiconductor chips, can be used in service of security assurance.

πŸ“– Read

via "Dark Reading".
?
12:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zero-Click Flaws in Widely Used UPS Devices Threaten Critical Infratructure ❌

The 'TLStorm' vulnerabilities, found in APC Smart-UPS products, could allow attackers to cause both cyber and physical damage by taking down critical infrastructure.

πŸ“– Read

via "Threat Post".
12:40
πŸ›  Samhain File Integrity Checker 4.4.7 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Read

via "Packet Storm Security".
12:40
β€Ό CVE-2022-0877 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository bookstackapp/bookstack prior to v22.02.3.

πŸ“– Read

via "National Vulnerability Database".
?
13:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Uncertain Future of IT Automation ❌

While IT automation is growing, big challenges remain. Chris Hass, director of information security and research at Automox, discusses how the future looks.

πŸ“– Read

via "Threat Post".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Aspiring women in infosec need role models and collective strength, industry panel hears πŸ—“οΈ

Another panelist urged young security pros to consider starting out as generalists before specializing

πŸ“– Read

via "The Daily Swig".
14:36
πŸ—“οΈ Electronics retailer Adafruit apologises after training data containing real customer info leaks onto GitHub πŸ—“οΈ

IoT hardware vendor promises to tighten up procedures

πŸ“– Read

via "The Daily Swig".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Adafruit suffers GitHub data breach – don’t let this happen to you ⚠

Training data stashed in GitHub by mistake... unfortunately, it was *real* data

πŸ“– Read

via "Naked Security".
14:55
⚠ β€œDirty Pipe” Linux kernel bug lets anyone to write to any file ⚠

Even read-only files can be written to, leading to a dangerously general purpose elevation-of-privilege attack.

πŸ“– Read

via "Naked Security".
?
15:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google to Buy Mandiant, Aims to Automate Security Response πŸ•΄

In a deal worth $5.4 billion, Google would expand its security portfolio with managed detection and response (MDR) and threat intelligence, with an increasing focus on automation.

πŸ“– Read

via "Dark Reading".
?
16:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dark Reading Reflects on Breaking the Bias for International Women's Day πŸ•΄

A look at how far the information security industry has come - and how far it still has to go.

πŸ“– Read

via "Dark Reading".
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41239 β€Ό

Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2021-41181 β€Ό

Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2021-41180 β€Ό

Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Improve security and compliance πŸ“’

Adopting an effective security and compliance risk management approach

πŸ“– Read

via "ITPro".
17:57
πŸ“’ Microsoft suspends sales in Russia amid mass tech boycott πŸ“’

Russia is also limiting its citizens’ access to apps that are in any way supporting Ukraine

πŸ“– Read

via "ITPro".
17:57
πŸ“’ Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive πŸ“’

So, you want to be a hacker? We share the best advice and resources for getting started

πŸ“– Read

via "ITPro".
17:57
πŸ“’ Nvidia hackers leak 190GB of data allegedly stolen from Samsung πŸ“’

The LAPSUS$ hacking group claims to have breached the tech giant to steal internal data and source code

πŸ“– Read

via "ITPro".
17:57
πŸ“’ Mozilla patches two Firefox zero-day vulnerabilities πŸ“’

Memory bugs fixed in Firefox desktop and mobile browsers along with Mozilla's Thunderbird client

πŸ“– Read

via "ITPro".
17:57
πŸ“’ Anonymous hijacks Russian broadcasts with footage of Ukraine war πŸ“’

The hacking group said it managed to manipulate the broadcasts of three major Russian state-backed media organisations

πŸ“– Read

via "ITPro".
17:57
πŸ“’ Leaked Nvidia certificates used to sign malware bypassing Windows detection πŸ“’

Windows admins are advised to implement custom policies to avoid seemingly legitimate malware making its way into corporate environments

πŸ“– Read

via "ITPro".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Even 'Perfect' APIs Can be Abused πŸ•΄

Broad-scale API abuse is occurring every day as businesses make their data available to trading partners β€” and even the public.

πŸ“– Read

via "Dark Reading".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24713 β€Ό

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-24715 β€Ό

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-41241 β€Ό

Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-24716 β€Ό

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-24714 β€Ό

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2.

πŸ“– Read

via "National Vulnerability Database".
?
19:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Addresses 3 Zero-Days & 3 Critical Bugs for March Patch Tuesday ❌

The computing giant patched 71 security vulnerabilities in an uncharacteristically light scheduled update, including its first Xbox bug.

πŸ“– Read

via "Threat Post".
?
19:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Patches Critical Exchange Server Flaw πŸ•΄

Remote code execution vulnerability among 71 bug fixes issued in March Patch Tuesday.

πŸ“– Read

via "Dark Reading".
?
20:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26337 β€Ό

Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.

πŸ“– Read

via "National Vulnerability Database".
20:41
β€Ό CVE-2022-26319 β€Ό

An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:41
β€Ό CVE-2022-24739 β€Ό

alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:44
β™ŸοΈ Internet Backbone Giant Lumen Shuns .RU β™ŸοΈ

Lumen Technologies, an American company that operates one of the largest Internet backbones and carries a significant percentage of the world's Internet traffic, said today it will stop routing traffic for organizations based in Russia. Lumen's decision comes just days after a similar exit by backbone provider Cogent, and amid a news media crackdown in Russia that has already left millions of Russians in the dark about what is really going on with their president's war in Ukraine.

πŸ“– Read

via "Krebs on Security".
9 March 2022
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0881 β€Ό

Insecure Storage of Sensitive Information in GitHub repository chocobozzz/peertube prior to 4.1.1.

πŸ“– Read

via "National Vulnerability Database".
?
09:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€œDirty Pipe” Linux kernel bug lets anyone write to any file ⚠

Even read-only files can be written to, leading to a dangerously general purpose elevation-of-privilege attack.

πŸ“– Read

via "Naked Security".
?
10:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0482 β€Ό

Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.

πŸ“– Read

via "National Vulnerability Database".
10:11
β€Ό CVE-2022-0896 β€Ό

Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Government agencies in Ukraine targeted in cyber-attacks deploying MicroBackdoor malware πŸ—“οΈ

A number of state bodies have been attacked since Russia’s invasion began

πŸ“– Read

via "The Daily Swig".
11:37
❌ Russian APTs Furiously Phish Ukraine – Google ❌

Also on the rise: DDoS attacks against Ukrainian sites and phishing activity capitalizing on the conflict, with China's Mustang Panda targeting Europe.

πŸ“– Read

via "Threat Post".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zero Trust Can't Stop at the Federal Level πŸ•΄

The federal government must step in to help local and state governments implement zero trust.

πŸ“– Read

via "Dark Reading".
?
12:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Critical Axeda vulnerabilities pose takeover risk to hundreds of IoT devices πŸ—“οΈ

Serious supply chain threat posed to downstream medical devices in particular

πŸ“– Read

via "The Daily Swig".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  UFONet 1.8 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Read

via "Packet Storm Security".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Most ServiceNow Instances Misconfigured, Exposed ❌

Customers aren't locking down access correctly, leading to ~70 percent of ServiceNow implementations being vulnerable to malicious data extraction.

πŸ“– Read

via "Threat Post".
13:45
β™ŸοΈ Microsoft Patch Tuesday, March 2022 Edition β™ŸοΈ

Microsoft on Tuesday released software updates to plug at least 70 security holes in its Windows operating systems and related software. For the second month running, there are no scary zero-day threats looming for Windows users (that we know of), and relatively few "critical" fixes. And yet we know from experience that attackers are already trying to work out how to turn these patches into a roadmap for exploiting the flaws they fix. Here's a look at the security weaknesses Microsoft says are most likely to be targeted first.

πŸ“– Read

via "Krebs on Security".
?
15:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Exploit chain allows security researchers to pwn phone system πŸ—“οΈ

Cloudy with a chance of exploits

πŸ“– Read

via "The Daily Swig".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-23265 β€Ό

Microsoft Defender for IoT Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-24464 β€Ό

.NET and Visual Studio Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-24453 β€Ό

HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24452, CVE-2022-24456.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-23286 β€Ό

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:11
β€Ό CVE-2022-23297 β€Ό

Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24507 β€Ό

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24522 β€Ό

Skype Extension for Chrome Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24520 β€Ό

Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24517.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24510 β€Ό

Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24509.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24471 β€Ό

Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24517, CVE-2022-24520.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24505 β€Ό

Windows ALPC Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23283, CVE-2022-23287.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-23288 β€Ό

Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23291.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-23298 β€Ό

Windows NT OS Kernel Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-21967 β€Ό

Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-23296 β€Ό

Windows Installer Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24502 β€Ό

Windows HTML Platforms Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24461 β€Ό

Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24509, CVE-2022-24510.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24511 β€Ό

Microsoft Office Word Tampering Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24503 β€Ό

Remote Desktop Protocol Client Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-24512 β€Ό

.NET and Visual Studio Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-24517 β€Ό

Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24520.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2022-21973 β€Ό

Windows Media Center Update Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24519 β€Ό

Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24506, CVE-2022-24515, CVE-2022-24518.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24515 β€Ό

Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24506, CVE-2022-24518, CVE-2022-24519.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24518 β€Ό

Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24506, CVE-2022-24515, CVE-2022-24519.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-22007 β€Ό

HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-23301, CVE-2022-24452, CVE-2022-24453, CVE-2022-24456.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-21990 β€Ό

Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23285.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-23283 β€Ό

Windows ALPC Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23287, CVE-2022-24505.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24470 β€Ό

Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24471, CVE-2022-24517, CVE-2022-24520.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-36777 β€Ό

A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-21977 β€Ό

Media Foundation Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22010.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24509 β€Ό

Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24510.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-23291 β€Ό

Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23288.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-23278 β€Ό

Microsoft Defender for Endpoint Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24462 β€Ό

Microsoft Word Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24526 β€Ό

Visual Studio Code Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-23281 β€Ό

Windows Common Log File System Driver Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24469 β€Ό

Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24506, CVE-2022-24515, CVE-2022-24518, CVE-2022-24519.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24525 β€Ό

Windows Update Stack Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-24508 β€Ό

Windows SMBv3 Client/Server Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
17:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Palo Alto Networks Introduces Prisma Cloud Supply Chain Security πŸ•΄

Threat modeling visualization, code repository scanning, and pipeline configuration analysis help prioritize vulnerabilities.

πŸ“– Read

via "Dark Reading".
17:22
πŸ•΄ 10 Signs of a Poor Security Leader πŸ•΄

Weak leadership can demotivate and demoralize the security workforce. Here's what to look out for.

πŸ“– Read

via "Dark Reading".
17:22
πŸ•΄ Bitdefender Launches New Password Manager Solution for Consumers πŸ•΄

Simplifies the creation and management of secure passwords for all online accounts across multiple platforms including mobile.

πŸ“– Read

via "Dark Reading".
?
18:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24919 β€Ό

An authenticated user can create a link with reflected Javascript code inside it for graphsΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-22806 β€Ό

A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause an unauthenticated connection to the UPS when a malformed connection is sent. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-22805 β€Ό

A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists that could cause remote code execution when an improperly handled TLS packet is reassembled. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-24918 β€Ό

An authenticated user can create a link with reflected Javascript code inside it for itemsΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-24349 β€Ό

An authenticated user can create a link with reflected XSS payload for actionsΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victimΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-0715 β€Ό

A CWE-287: Improper Authentication vulnerability exists that could cause an attacker to arbitrarily change the behavior of the UPS when a key is leaked and used to upload malicious firmware. Affected Product: APC Smart-UPS Family: SMT Series (SMT Series ID=18: UPS 09.8 and prior / SMT Series ID=1040: UPS 01.2 and prior / SMT Series ID=1031: UPS 03.1 and prior), SMC Series (SMC Series ID=1005: UPS 14.1 and prior / SMC Series ID=1007: UPS 11.0 and prior / SMC Series ID=1041: UPS 01.1 and prior), SCL Series (SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior), SMX Series (SMX Series ID=20: UPS 10.2 and prior / SMX Series ID=23: UPS 07.0 and prior), SRT Series (SRT Series ID=1010/1019/1025: UPS 08.3 and prior / SRT Series ID=1024: UPS 01.0 and prior / SRT Series ID=1020: UPS 10.4 and prior / SRT Series ID=1021: UPS 12.2 and prior / SRT Series ID=1001/1013: UPS 05.1 and prior / SRT Series ID=1002/1014: UPSa05.2 and prior), APC SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-22511 β€Ό

Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-24732 β€Ό

Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2022-24917 β€Ό

An authenticated user can create a link with reflected Javascript code inside it for servicesΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.

πŸ“– Read

via "National Vulnerability Database".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ APT41 Spies Broke Into 6 US State Networks via a Livestock App ❌

The China-affiliated state-sponsored threat actor used Log4j and zero-day bugs in the USAHerds animal-tracking software to hack into multiple government networks.

πŸ“– Read

via "Threat Post".
19:22
πŸ•΄ FBI Alert: Ransomware Attacks Hit Critical Infrastructure Organizations πŸ•΄

Bureau releases indicators of compromise for the RagnarLocker ransomware that has hit 10 different critical infrastructure sectors.

πŸ“– Read

via "Dark Reading".
?
20:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24741 β€Ό

Nextcloud server is an open source, self hosted cloud style services platform. In affected versions an attacker can cause a denial of service by uploading specially crafted files which will cause the server to allocate too much memory / CPU. It is recommended that the Nextcloud Server is upgraded to 21.0.8 , 22.2.4 or 23.0.1. Users unable to upgrade should disable preview generation with the `'enable_previews'` config flag.

πŸ“– Read

via "National Vulnerability Database".
20:12
β€Ό CVE-2022-24734 β€Ό

MyBB is a free and open source forum software. In affected versions the Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type `php` with PHP code, executed on on _Change Settings_ pages. This results in a Remote Code Execution (RCE) vulnerability. The vulnerable module requires Admin CP access with the `Can manage settings?` permission. MyBB's Settings module, which allows administrators to add, edit, and delete non-default settings, stores setting data in an options code string ($options_code; mybb_settings.optionscode database column) that identifies the setting type and its options, separated by a new line character (\n). In MyBB 1.2.0, support for setting type php was added, for which the remaining part of the options code is PHP code executed on Change Settings pages (reserved for plugins and internal use). MyBB 1.8.30 resolves this issue. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
10 March 2022
?
03:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0890 β€Ό

NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
?
08:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-38296 β€Ό

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later

πŸ“– Read

via "National Vulnerability Database".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Middleboxes now being used for DDoS attacks in the wild, Akamai finds πŸ—“οΈ

Malicious actors are starting to add TCP middlebox reflection to their arsenal

πŸ“– Read

via "The Daily Swig".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Qakbot Botnet Sprouts Fangs, Injects Malware into Email Threads ❌

The ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things.

πŸ“– Read

via "Threat Post".
10:12
β€Ό CVE-2022-0895 β€Ό

Static Code Injection in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
10:23
πŸ•΄ What Security Controls Do I Need for My Kubernetes Cluster? πŸ•΄

This Tech Tip offers some security controls to embed in your organization's CI/CD pipeline to protect Kubernetes clusters and corporate networks.

πŸ“– Read

via "Dark Reading".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Multi-Ransomwared Victims Have It Coming–Podcast ❌

Let's blame the victim. IT decision makers' confidence about security doesn't jibe with their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.

πŸ“– Read

via "Threat Post".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” RagnarLocker Ransomware Connected to Hacks at 52 Organizations πŸ”

New guidance from the FBI contains IOCs and technical details on how the ransomware spreads.

πŸ“– Read

via "".
11:38
❌ Russia May Use Ransomware Payouts to Avoid Sanctions ❌

FinCEN warns financial institutions to beware of unusual cryptocurrency payments or illegal transactions Russia may use to evade restrictions imposed due to its invasion of Ukraine.

πŸ“– Read

via "Threat Post".
11:53
πŸ•΄ Log4j and Livestock Apps: APT41 Wages Persistent Cyberattack Campaign on US Government πŸ•΄

The group's attack methods have included exploits for a zero-day vulnerability in a livestock-tracking apps as well as for the Apache Log4 flaw.

πŸ“– Read

via "Dark Reading".
12:07
πŸ—“οΈ 1Password increases bug bounty reward to $1 million πŸ—“οΈ

Researchers offered record incentive for vulnerabilities found on Bugcrowd programs

πŸ“– Read

via "The Daily Swig".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why You Should Be Using CISA's Catalog of Exploited Vulns πŸ•΄

It's a great starting point for organizations that want to ride the wave of risk-based vulnerability management rather than drowning beneath it.

πŸ“– Read

via "Dark Reading".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Most Orgs Would Take Security Bugs Over Ethical Hacking Help ❌

A new survey suggests that security is becoming more important for enterprises, but they’re still falling back on old "security by obscurity" ways.

πŸ“– Read

via "Threat Post".
?
13:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ RagnarLocker ransomware struck 52 critical infrastructure entities within two years – FBI πŸ—“οΈ

Agency issues mitigation advice to help organizations tighten network defenses

πŸ“– Read

via "The Daily Swig".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep73: Ransomware with a difference, dirty Linux pipes, and much more [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0905 β€Ό

Improper Authorization in GitHub repository go-gitea/gitea prior to 1.16.4.

πŸ“– Read

via "National Vulnerability Database".
14:13
β€Ό CVE-2022-0906 β€Ό

Unrestricted file upload leads to stored XSS in GitHub repository microweber/microweber prior to 1.1.12.

πŸ“– Read

via "National Vulnerability Database".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Falco 0.31.1 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyber Insurance and Business Risk: How the Relationship Is Changing Reinsurance & Policy Guidance πŸ•΄

While cyber insurance will continue to exist, it will cost more and cover less β€” and that's changing the risk your company faces.

πŸ“– Read

via "Dark Reading".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0725 β€Ό

A flaw was found in KeePass. The vulnerability occurs due to logging the plain text passwords in the system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-43970 β€Ό

An arbitrary file upload vulnerability exists in albumimages.jsp in Quicklert for Digium 10.0.0 (1043) via a .mp3;.jsp filename for a file that begins with audio data bytes. It allows an authenticated (low privileged) attacker to execute remote code on the target server within the context of application's permissions (SYSTEM).

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-34122 β€Ό

The function bitstr_tell at bitstr.c in ffjpeg commit 4ab404e has a NULL pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2020-14112 β€Ό

Information Leak Vulnerability exists in the Xiaomi Router AX6000. The vulnerability is caused by incorrect routing configuration. Attackers can exploit this vulnerability to download part of the files in Xiaomi Router AX6000.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44750 β€Ό

An arbitrary code execution vulnerability was found in the F-Secure Support Tool. A standard user can craft a special configuration file, which when run by administrator can execute any commands.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44421 β€Ό

The pointer-validation logic in util/mem_util.rs in Occlum before 0.26.0 for Intel SGX acts as a confused deputy that allows a local attacker to access unauthorized information via side-channel analysis.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2020-14115 β€Ό

A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-40048 β€Ό

There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2022-20049 β€Ό

In vpu, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05954679; Issue ID: ALPS05954679.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-40057 β€Ό

There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-24193 β€Ό

CasaOS before v0.2.7 was discovered to contain a command injection vulnerability via the component leave or join zerotier api.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-40054 β€Ό

There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-44628 β€Ό

A Buffer Overflow vulnerabiltiy exists in TP-LINK WR-886N 20190826 2.3.8 in thee /cloud_config/router_post/login feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-40059 β€Ό

There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-21146 β€Ό

Persistent cross-site scripting in the web interface of ipDIO allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into a specific parameter. The XSS payload will be executed when a legitimate user attempts to review history.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-42787 β€Ό

It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/configuration" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-25219 β€Ό

A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-40064 β€Ό

There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2021-3981 β€Ό

A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.

πŸ“– Read

via "National Vulnerability Database".
16:13
β€Ό CVE-2022-0618 β€Ό

A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS or HTTP/2 PUSH_PROMISE frame where the frame contains padding information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame or PUSH_PROMISE frame with HTTP/2 padding information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted frames, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the frame in memory-safe code, so the crash is safe. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-3558 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-20058 β€Ό

In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160485.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-34338 β€Ό

Ming 0.4.8 has an out-of-bounds buffer overwrite issue in the function getName() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-42857 β€Ό

It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDaServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/da/pcf" API. The affected endpoint does not have any validation of the user's input that allows a malicious payload to be injected.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2022-21170 β€Ό

Improper check for certificate revocation in i-FILTER Ver.10.45R01 and earlier, i-FILTER Ver.9.50R10 and earlier, i-FILTER Browser & Cloud MultiAgent for Windows Ver.4.93R04 and earlier, and D-SPA (Ver.3 / Ver.4) using i-FILTER allows a remote unauthenticated attacker to conduct a man-in-the-middle attack and eavesdrop on an encrypted communication.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-43969 β€Ό

The login.jsp page of Quicklert for Digium 10.0.0 (1043) is affected by both Blind SQL Injection with Out-of-Band Interaction (DNS) and Blind Time-Based SQL Injections. Exploitation can be used to disclose all data within the database (up to and including the administrative accounts' login IDs and passwords) via the login.jsp uname parameter.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-20059 β€Ό

In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160781.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-24995 β€Ό

Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the time parameter.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-24606 β€Ό

Luocms v2.0 is affected by SQL Injection in /admin/news/sort_ok.php.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-40052 β€Ό

There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-25244 β€Ό

Vault Enterprise clusters using the tokenization transform feature can expose the tokenization key through the tokenization key configuration endpoint to authorized operators with `read` permissions on this endpoint. Fixed in Vault Enterprise 1.9.4, 1.8.9 and 1.7.10.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-26102 β€Ό

Due to missing authorization check, SAP NetWeaver Application Server for ABAP - versions 700, 701, 702, 731, allows an authenticated attacker, to access content on the start screen of any transaction that is available with in the same SAP system even if he/she isn't authorized for that transaction. A successful exploitation could expose information and in worst case manipulate data before the start screen is executed, resulting in limited impact on confidentiality and integrity of the application.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2020-36517 β€Ό

An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-24915 β€Ό

The absence of filters when loading some sections in the web application of the vulnerable device allows attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section where the information is displayed. Injection can be done on specific parameters. The injected code is executed when a legitimate user attempts to upload, copy, download, or delete an existing configuration (Administrative Services).

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-25814 β€Ό

PendingIntent hijacking vulnerability in Wearable Manager Installer prior to SMR Mar-2022 Release 1 allows local attackers to perform unauthorized action without permission via hijacking the PendingIntent.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-0891 β€Ό

A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-32006 β€Ό

This issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Permission Issues vulnerability in LinkManager web portal of Secomea GateManager allows logged in LinkManager user to access stored SiteManager backup files.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-24601 β€Ό

Luocms v2.0 is affected by SQL Injection in /admin/manager/admin_mod.php. An attacker can obtain sensitive information through SQL injection statements.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-44215 β€Ό

Northern.tech CFEngine Enterprise 3.15.4 before 3.15.5 has Insecure Permissions that may allow unauthorized local users to have an unspecified impact.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2022-26311 β€Ό

Couchbase Operator 2.2.x before 2.2.3 exposes Sensitive Information to an Unauthorized Actor. Secrets are not redacted in logs collected from Kubernetes environments.

πŸ“– Read

via "National Vulnerability Database".
16:22
β€Ό CVE-2022-26488 β€Ό

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

πŸ“– Read

via "National Vulnerability Database".
16:22
β€Ό CVE-2021-41657 β€Ό

SmartBear CodeCollaborator v6.1.6102 was discovered to contain a vulnerability in the web UI which would allow an attacker to conduct a clickjacking attack.

πŸ“– Read

via "National Vulnerability Database".
16:22
β€Ό CVE-2022-20060 β€Ό

In preloader (usb), there is a possible permission bypass due to a missing proper image authentication. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06137462.

πŸ“– Read

via "National Vulnerability Database".
16:22
β€Ό CVE-2022-26661 β€Ό

An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.

πŸ“– Read

via "National Vulnerability Database".
16:22
β€Ό CVE-2022-25558 β€Ό

Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function formSetProvince. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ProvinceCode parameter.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2022-25549 β€Ό

Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function formSetSysToolDDNS. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ddnsEn parameter.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-3660 β€Ό

Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an <iFrame> HTML entry. This may be used by a malicious website in clickjacking or similar attacks.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-35251 β€Ό

Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-32505 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-32435 β€Ό

Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-3698 β€Ό

A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-44625 β€Ό

A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in /cloud_config/cloud_device/info interface, which allows a malicious user to executee arbitrary code on the system via a crafted post request.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2022-0433 β€Ό

A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-40056 β€Ό

There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2022-25830 β€Ό

Information Exposure vulnerability in Galaxy Watch3 Plugin prior to version 2.2.09.22012751 allows attacker to access password information of connected WiFiAp in the log

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-28488 β€Ό

Ericsson Network Manager 20.2 has Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2022-24608 β€Ό

Luocms v2.0 is affected by Cross Site Scripting (XSS) in /admin/news/sort_add.php and /inc/function.php.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2022-25225 β€Ό

Network Olympus version 1.8.0 allows an authenticated admin user to inject SQL queries in '/api/eventinstance' via the 'sqlparameter' JSON parameter. It is also possible to achieve remote code execution in the default installation (PostgreSQL) by exploiting this issue.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2022-21132 β€Ό

Directory traversal vulnerability in pfSense-pkg-WireGuard pfSense-pkg-WireGuard 0.1.5 versions prior to 0.1.5_4 and pfSense-pkg-WireGuard 0.1.6 versions prior to 0.1.6_1 allows a remote authenticated attacker to lead a pfSense user to view a file outside the public folder.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-33293 β€Ό

Panorama Tools libpano13 v2.9.20 was discovered to contain an out-of-bounds read in the function panoParserFindOLine() in parser.c.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-0856 β€Ό

libcaca is affected by a Divide By Zero issue via img2txt, which allows a remote malicious user to cause a Denial of Service

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-26355 β€Ό

Citrix Federated Authentication Service (FAS) 7.17 - 10.6 causes deployments that have been configured to store a registration authority certificate's private key in a Trusted Platform Module (TPM) to incorrectly store that key in the Microsoft Software Key Storage Provider (MSKSP). This issue only occurs if PowerShell was used when configuring FAS to store the registration authority certificateÒ€ℒs private key in the TPM. It does not occur if the TPM was not selected for use or if the FAS administration console was used for configuration.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-24605 β€Ό

Luocms v2.0 is affected by SQL Injection in /admin/link/link_ok.php.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2021-42854 β€Ό

It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) PluginServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/plugin/pmx" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2022-21158 β€Ό

A stored cross-site scripting vulnerability in marktext versions prior to v0.17.0 due to improper handling of the link (with javascript: scheme) inside the document may allow an attacker to execute an arbitrary script on the PC of the user using marktext.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-26520 β€Ό

** DISPUTED ** In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-40060 β€Ό

There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-24930 β€Ό

An Improper access control vulnerability in StRetailModeReceiver in Wear OS 3.0 prior to Firmware update MAR-2022 Release allows untrusted applications to reset default app settings without a proper permission

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-25816 β€Ό

Improper authentication in Samsung Lock and mask apps setting prior to SMR Mar-2022 Release 1 allows attacker to change enable/disable without authentication

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-26104 β€Ό

SAP Financial Consolidation - version 10.1, does not perform necessary authorization checks for updating homepage messages, resulting for an unauthorized user to alter the maintenance system message.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-40055 β€Ό

There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-24609 β€Ό

Luocms v2.0 is affected by an incorrect access control vulnerability. Through /admin/templates/template_manage.php, an attacker can write an arbitrary shell file.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-25555 β€Ό

Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ntpServer parameter.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-25826 β€Ό

Information Exposure vulnerability in Galaxy S3 Plugin prior to version 2.2.03.22012751 allows attacker to access password information of connected WiFiAp in the log

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-24607 β€Ό

Luocms v2.0 is affected by SQL Injection in /admin/news/news_ok.php.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-24397 β€Ό

SAP NetWeaver Enterprise Portal - versions 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.This reflected cross-site scripting attack can be used to non-permanently deface or modify displayed content of portal Website. The execution of the script content by a victim registered on the portal could compromise the confidentiality and integrity of victimÒ€ℒs web browser.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-25547 β€Ό

Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the time parameter.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-44632 β€Ό

A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/upgrade_info feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2022-22795 β€Ό

Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.

πŸ“– Read

via "National Vulnerability Database".
16:26
β€Ό CVE-2021-40047 β€Ό

There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity.

πŸ“– Read

via "National Vulnerability Database".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Malware Posing as Russia DDoS Tool Bites Pro-Ukraine Hackers ❌

Be careful when downloading a tool to cyber-target Russia: It could be an infostealer wolf dressed in sheep's clothing that grabs your cryptocurrency info instead.

πŸ“– Read

via "Threat Post".
?
17:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ex-Canadian Government Employee Charged in NetWalker Ransomware Attacks πŸ•΄

Sebastien Vachon-Desjardins of Gatineau, Quebec, Canada, allegedly responsible for some $28 million in ransomware losses from victims in the US.

πŸ“– Read

via "Dark Reading".
17:23
πŸ•΄ Spotlight on First Dan Kaminsky Fellow: Jonathan Leitschuh πŸ•΄

Human Security honors its late co-founder with a fellowship to fund smart and passionate cybersecurity advocates to do open source work for common good.

πŸ“– Read

via "Dark Reading".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-39022 β€Ό

IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by spreadsheet software. IBM X-Force ID: 213858.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2021-39025 β€Ό

IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 could disclose internal IP address information when the web backend is down. IBM X-Force 213863.

πŸ“– Read

via "National Vulnerability Database".
18:12
β€Ό CVE-2022-23036 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23040 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23041 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23042 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23039 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23037 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2022-23038 β€Ό

Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-38910 β€Ό

IBM DataPower Gateway V10CD, 10.0.1, and 2108.4.1 could allow a remote attacker to bypass security restrictions, caused by the improper validation of input. By sending a specially crafted JSON message, an attacker could exploit this vulnerability to modify structure and fields. IBM X-Force ID: 209824.

πŸ“– Read

via "National Vulnerability Database".
?
20:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44585 β€Ό

A Cross Site Scripting (XSS) vulnerabilitiy exits in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-24750 β€Ό

UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugins from the installed directory. Affected users should upgrade their UltraVNC to 1.3.8.0. Users unable to upgrade should not install and run UltraVNC server as a service. It is advisable to create a scheduled task on a low privilege account to launch WinVNC.exe instead. There are no known workarounds if wincnc needs to be started as a service.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-41233 β€Ό

Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2022-24726 β€Ό

Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing when the validating webhook for a cluster is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [external istiod](https://istio.io/latest/docs/setup/install/external-controlplane/) topologies, this port is exposed over the public internet. This issue has been patched in versions 1.13.2, 1.12.5 and 1.11.8. Users are advised to upgrade. Users unable to upgrade should disable access to a validating webhook that is exposed to the public internet or restrict the set of IP addresses that can query it to a set of known, trusted entities.

πŸ“– Read

via "National Vulnerability Database".
20:13
β€Ό CVE-2021-44597 β€Ό

An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in project_configure function.

πŸ“– Read

via "National Vulnerability Database".
?
20:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Over 40% of Log4j Downloads Are Vulnerable Versions of the Software πŸ•΄

The data point is a reminder of why fixing the widespread vulnerability will take a long time.

πŸ“– Read

via "Dark Reading".
?
22:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-25512 β€Ό

FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-25511 β€Ό

An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-0280 β€Ό

A race condition vulnerability exists in the QuickClean feature of McAfee Total Protection for Windows prior to 16.0.43 that allows a local user to gain privilege elevation and perform an arbitrary file delete. This could lead to sensitive files being deleted and potentially cause denial of service. This attack exploits the way symlinks are created and how the product works with them.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-0821 β€Ό

Improper Authorization in GitHub repository orchardcms/orchardcore prior to 1.3.0.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-0815 β€Ό

Improper access control vulnerability in McAfee WebAdvisor Chrome and Edge browser extensions up to 8.1.0.1895 allows a remote attacker to gain access to McAfee WebAdvisor settings and other details about the userÒ€ℒs system. This could lead to unexpected behaviors including; settings being changed, fingerprinting of the system leading to targeted scams, and not triggering the malicious software if McAfee software is detected.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-25507 β€Ό

FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-0820 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.3.0.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-25506 β€Ό

FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-25510 β€Ό

FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to create crafted cookies to bypass authentication or escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
22:14
β€Ό CVE-2022-25508 β€Ό

An access control issue in the component /ManageRoute/postRoute of FreeTAKServer v1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false routes for legitimate users.

πŸ“– Read

via "National Vulnerability Database".
11 March 2022
?
03:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0822 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository orchardcms/orchardcore prior to 1.3.0.

πŸ“– Read

via "National Vulnerability Database".
?
08:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22151 β€Ό

CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-23401 β€Ό

The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-22729 β€Ό

CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-21194 β€Ό

The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-21177 β€Ό

There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-0912 β€Ό

Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-26878 β€Ό

drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-21808 β€Ό

Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-22141 β€Ό

'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-22145 β€Ό

CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumption. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2021-46708 β€Ό

The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2018-25031 β€Ό

Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-23402 β€Ό

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-0913 β€Ό

Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-26874 β€Ό

lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows XSS via an OpenOffice document, leading to account takeover in Horde Groupware Webmail Edition. This occurs after XSLT rendering.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2020-36518 β€Ό

jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.

πŸ“– Read

via "National Vulnerability Database".
08:14
β€Ό CVE-2022-22148 β€Ό

'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

πŸ“– Read

via "National Vulnerability Database".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Microsoft praised for quickly resolving Azure Automation cloud security vulnerability πŸ—“οΈ

Automatic for the people

πŸ“– Read

via "The Daily Swig".
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0870 β€Ό

Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.

πŸ“– Read

via "National Vulnerability Database".
10:14
β€Ό CVE-2022-0871 β€Ό

Improper Authorization in GitHub repository gogs/gogs prior to 0.12.5.

πŸ“– Read

via "National Vulnerability Database".
10:14
β€Ό CVE-2022-0928 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.12.

πŸ“– Read

via "National Vulnerability Database".
10:27
πŸ” Friday Five 3/11 πŸ”

Why the healthcare industry should invest in cybersecurity, a critical Azure bug fixed, and more - catch up on the infosec news of the week!

πŸ“– Read

via "".
?
10:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep73: Ransomware with a difference, dirty Linux pipes, and much more [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
11:07
πŸ—“οΈ UK ferry operator Wightlink flags potential data breach after β€˜highly sophisticated’ cyber-attack πŸ—“οΈ

Personal data potentially compromised, but English Channel crossings unaffected

πŸ“– Read

via "The Daily Swig".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Raccoon Stealer Crawls Into Telegram ❌

The credential-stealing trash panda is using the chat app to store and update C2 addresses as crooks find creative new ways to distribute the malware.

πŸ“– Read

via "Threat Post".
12:14
β€Ό CVE-2022-21819 β€Ό

NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. Such an attack could result in denial of service, code execution, escalation of privileges, and impact to data integrity and confidentiality. The scope impact may extend to other components.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2022-0860 β€Ό

Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.

πŸ“– Read

via "National Vulnerability Database".
12:23
πŸ•΄ How to Combat the No. 1 Cause of Security Breaches: Complexity πŸ•΄

The scaling of hardware, software and people has created an ever-growing complexity problem.

πŸ“– Read

via "Dark Reading".
12:27
⚠ Alleged Kaseya ransomware attacker arrives in Texas for trial ⚠

The US Independence Day weekend of 2021 wasn't much of a holiday for cybersecurity staff. That was when the Kaseya attack unfolded...

πŸ“– Read

via "Naked Security".
?
13:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Stats widget hacked in attempt to breach Russian government agency websites πŸ—“οΈ

The software was reportedly used as part of a short-lived software supply chain attack

πŸ“– Read

via "The Daily Swig".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44618 β€Ό

A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic 3.4.12 in src/helpers/UrlHelper.php via the host header.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2022-0932 β€Ό

Improper Authorization in GitHub repository saleor/saleor prior to 3.1.2.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-44620 β€Ό

A Command Injection vulnerability exits in TOTOLINK A3100R <=V4.1.2cu.5050_B20200504 in adm/ntm.asp via the hosTime parameters.

πŸ“– Read

via "National Vulnerability Database".
14:17
β™ŸοΈ Report: Recent 10x Increase in Cyberattacks on Ukraine β™ŸοΈ

As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks targeting Ukrainians.

πŸ“– Read

via "Krebs on Security".
?
16:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Russia Issues Its Own TLS Certs ❌

The country’s citizens are being blocked from the internet because foreign certificate authorities can't accept payments due to Ukraine-related sanctions,Β so it created its own CA.

πŸ“– Read

via "Threat Post".
16:14
β€Ό CVE-2021-26401 β€Ό

LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-24095 β€Ό

Adobe After Effects versions 22.2 (and earlier) and 18.4.4 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-23930 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-23928 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2022-24090 β€Ό

Adobe Photoshop versions 23.1.1 (and earlier) and 22.5.5 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-24094 β€Ό

Adobe After Effects versions 22.2 (and earlier) and 18.4.4 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-24097 β€Ό

Adobe After Effects versions 22.2 (and earlier) and 18.4.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-32472 β€Ό

Teachers exporting a forum in CSV format could receive a CSV of forums from all courses in some circumstances. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6 and 3.8 to 3.8.8 are affected.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-0924 β€Ό

Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-23246 β€Ό

In ACE2 ColorOS11, the attacker can obtain the foreground package name through permission promotion, resulting in user information disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-23924 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-23934 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-25216 β€Ό

An absolute path traversal vulnerability allows a remote attacker to download any file on the Windows file system for which the user account running DVDFab 12 Player (recently renamed PlayerFab) has read-access, by means of an HTTP GET request to http://<IP_ADDRESS>:32080/download/<URL_ENCODED_PATH>.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-24096 β€Ό

Adobe After Effects versions 22.2 (and earlier) and 18.4.4 (and earlier) are affected by an Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-23929 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-25621 β€Ό

UUNIVERGE WA 1020 Ver8.2.11 and prior, UNIVERGE WA 1510 Ver8.2.11 and prior, UNIVERGE WA 1511 Ver8.2.11 and prior, UNIVERGE WA 1512 Ver8.2.11 and prior, UNIVERGE WA 2020 Ver8.2.11 and prior, UNIVERGE WA 2021 Ver8.2.11 and prior, UNIVERGE WA 2610-AP Ver8.2.11 and prior, UNIVERGE WA 2611-AP Ver8.2.11 and prior, UNIVERGE WA 2611E-AP Ver8.2.11 and prior, UNIVERGE WA WA2612-AP Ver8.2.11 and prior allows a remote attacker to execute arbitrary OS commands.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-23187 β€Ό

Adobe Illustrator version 26.0.3 (and earlier) is affected by a buffer overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Illustrator.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-25601 β€Ό

Reflected Cross-Site Scripting (XSS) vulnerability affecting parameter &tab discovered in Contact Form X WordPress plugin (versions <= 2.4).

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-32475 β€Ό

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2022-23731 β€Ό

V8 javascript engine (heap vulnerability) can cause privilege escalation ,which can impact on some webOS TV models.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2021-26341 β€Ό

Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2021-32476 β€Ό

A denial-of-service risk was identified in the draft files area, due to it not respecting user file upload limits. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2022-24433 β€Ό

The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2022-23933 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
16:21
β€Ό CVE-2022-25600 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability affecting Delete Marker Category, Delete Map, and Copy Map functions in WP Google Map plugin (versions <= 4.2.3).

πŸ“– Read

via "National Vulnerability Database".
16:21
β€Ό CVE-2022-0921 β€Ό

Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.

πŸ“– Read

via "National Vulnerability Database".
16:21
β€Ό CVE-2021-32474 β€Ό

An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected.

πŸ“– Read

via "National Vulnerability Database".
16:21
β€Ό CVE-2022-23931 β€Ό

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
?
16:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ukrainian Man Arrested for Alleged Role in Ransomware Attack on Kaseya, Others πŸ•΄

He's the fifth member of the REvil ransomware gang to get busted in the past year.

πŸ“– Read

via "Dark Reading".
?
17:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is XDR Right for My Organization? πŸ•΄

Well ... it depends on what you're trying to accomplish, at least for now. The good news is that many modern SIEMs are starting to adopt XDR-like capabilities.

πŸ“– Read

via "Dark Reading".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24754 β€Ό

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-44667 β€Ό

A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2022-25839 β€Ό

The package url-js before 2.1.0 are vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.

πŸ“– Read

via "National Vulnerability Database".
?
19:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Enterprises Can Get Used to Deploying AI for Security πŸ•΄

It's important to take a "trust journey" to see how AI technology can benefit an organization's cybersecurity.

πŸ“– Read

via "Dark Reading".
19:24
πŸ•΄ When IT Spending Plans Don't Reflect Security Priorities πŸ•΄

Data shows a disconnect between what decisionmakers consider top endpoint security priorities and how they focus their budget.

πŸ“– Read

via "Dark Reading".
?
20:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24416 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2022-24415 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2022-24421 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2022-24419 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2022-24420 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.

πŸ“– Read

via "National Vulnerability Database".
12 March 2022
?
03:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26276 β€Ό

An issue in index.php of OneNav v0.9.14 allows attackers to perform directory traversal.

πŸ“– Read

via "National Vulnerability Database".
03:15
β€Ό CVE-2022-0880 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.

πŸ“– Read

via "National Vulnerability Database".
03:15
β€Ό CVE-2022-26533 β€Ό

Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist.

πŸ“– Read

via "National Vulnerability Database".
?
20:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26967 β€Ό

GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.

πŸ“– Read

via "National Vulnerability Database".
20:16
β€Ό CVE-2022-26966 β€Ό

An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.

πŸ“– Read

via "National Vulnerability Database".
13 March 2022
?
03:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45889 β€Ό

An issue was discovered in PONTON X/P Messenger before 3.11.2. Several functions are vulnerable to reflected XSS, as demonstrated by private/index.jsp?partners/ShowNonLocalPartners.do?localID= or private/index.jsp or private/index.jsp?database/databaseTab.jsp or private/index.jsp?activation/activationMainTab.jsp or private/index.jsp?communication/serverTab.jsp or private/index.jsp?emailNotification/notificationTab.jsp.

πŸ“– Read

via "National Vulnerability Database".
03:16
β€Ό CVE-2021-45886 β€Ό

An issue was discovered in PONTON X/P Messenger before 3.11.2. Anti-CSRF tokens are globally valid, making the web application vulnerable to a weakened version of CSRF, where an arbitrary token of a low-privileged user (such as operator) can be used to confirm actions of higher-privileged ones (such as xpadmin).

πŸ“– Read

via "National Vulnerability Database".
03:16
β€Ό CVE-2021-45887 β€Ό

An issue was discovered in PONTON X/P Messenger before 3.11.2. Due to path traversal in private/SchemaSetUpload.do for uploaded ZIP files, an executable script can be uploaded by web application administrators, giving the attacker remote code execution on the underlying server via an imgs/*.jsp URI.

πŸ“– Read

via "National Vulnerability Database".
03:16
β€Ό CVE-2021-45888 β€Ό

An issue was discovered in PONTON X/P Messenger before 3.11.2. The navigation tree that is shown on the left side of every page of the web application is vulnerable to XSS: it allows injection of JavaScript into its nodes. Creating such nodes is only possible for users who have the role Configuration Administrator or Administrator.

πŸ“– Read

via "National Vulnerability Database".
?
22:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Alleged Kaseya ransomware attacker arrives in Texas for trial ⚠

The US Independence Day weekend of 2021 wasn't much of a holiday for cybersecurity staff. That was when the Kaseya attack unfolded...

πŸ“– Read

via "Naked Security".
14 March 2022
?
07:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0938 β€Ό

Stored XSS via file upload in GitHub repository star7th/showdoc prior to v2.10.4.

πŸ“– Read

via "National Vulnerability Database".
?
09:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0940 β€Ό

Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2022-22721 β€Ό

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2022-22720 β€Ό

Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2022-22719 β€Ό

A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2022-23943 β€Ό

Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ β€˜Cybersecurity incident’ at Ubisoft disrupts operations, forces company-wide password reset πŸ—“οΈ

Lapsu$ threat actors have been linked to the cyber-attack

πŸ“– Read

via "The Daily Swig".
11:11
❌ Cybercrooks’ Political In-Fighting Threatens the West ❌

They’re choosing sides in the Russia-Ukraine war, beckoning previously shunned ransomware groups and thereby reinvigorating those groups' once-diminished power.

πŸ“– Read

via "Threat Post".
11:18
β€Ό CVE-2022-0941 β€Ό

Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2022-24385 β€Ό

A Direct Object Access vulnerability in SmarterTools SmarterTrack leads to information disclosure This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2022-24387 β€Ό

With administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file. THis is possible in SmarterTrack v100.0.8019.14010

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2022-24386 β€Ό

Stored XSS in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2022-24384 β€Ό

Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.

πŸ“– Read

via "National Vulnerability Database".
11:28
πŸ•΄ Governments Should Decide Who Gets to Buy Spyware πŸ•΄

And the world must face the fact that offensive cyber tools have evolved into weapons that are no different from tanks, drones, or missiles.

πŸ“– Read

via "Dark Reading".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Data breach at US heart disease treatment center impacts 287,000 individuals πŸ—“οΈ

South Denver Cardiology Associates admits hack

πŸ“– Read

via "The Daily Swig".
?
13:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0700 β€Ό

The Simple Tracking WordPress plugin before 1.7 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0165 β€Ό

The Page Builder KingComposer WordPress plugin through 2.9.6 does not validate the id parameter before redirecting the user to it via the kc_get_thumbn AJAX action available to both unauthenticated and authenticated users

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0254 β€Ό

The WordPress Zero Spam WordPress plugin before 5.2.11 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0478 β€Ό

The Event Manager and Tickets Selling for WooCommerce WordPress plugin before 3.5.8 does not validate and escape the post_author_gutenberg parameter before using it in a SQL statement when creating/editing events, which could allow users with a role as low as contributor to perform SQL Injection attacks

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2021-25006 β€Ό

The MOLIE WordPress plugin through 0.5 does not escape the course_id parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0147 β€Ό

The Cookie Information | Free GDPR Consent Solution WordPress plugin before 2.0.8 does not escape user data before outputting it back in attributes in the admin dashboard, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0701 β€Ό

The SEO 301 Meta WordPress plugin through 1.9.1 does not escape its Request and Destination settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0593 β€Ό

The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation.

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0703 β€Ό

The GD Mylist WordPress plugin through 1.1.1 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0399 β€Ό

The Advanced Product Labels for WooCommerce WordPress plugin before 1.2.3.7 does not sanitise and escape the tax_color_set_type parameter before outputting it back in the berocket_apl_color_listener AJAX action's response, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-22735 β€Ό

The Simple Quotation WordPress plugin through 1.3.2 does not have authorisation (and CSRF) checks in various of its AJAX actions and is lacking escaping of user data when using it in SQL statements, allowing any authenticated users, such as subscriber to perform SQL injection attacks

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0684 β€Ό

The WP Home Page Menu WordPress plugin before 3.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0449 β€Ό

The Flexi WordPress plugin before 4.20 does not sanitise and escape various parameters before outputting them back in some pages such as the user dashboard, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2021-24996 β€Ό

The IDPay for Contact Form 7 WordPress plugin through 2.1.2 does not sanitise and escape the idpay_error parameter before outputting it back in the page leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0648 β€Ό

The Team Circle Image Slider With Lightbox WordPress plugin before 1.0.16 does not sanitize and escape the order_pos parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-0248 β€Ό

The Contact Form Submissions WordPress plugin before 1.7.3 does not sanitise and escape additional fields in contact form requests before outputting them in the related submission. As a result, unauthenticated attacker could perform Cross-Site Scripting attacks against admins viewing the malicious submission

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-24575 β€Ό

GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box.

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2021-41952 β€Ό

Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-22734 β€Ό

The Simple Quotation WordPress plugin through 1.3.2 does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2022-24574 β€Ό

GPAC 1.0.1 is affected by a NULL pointer dereference in gf_dump_vrml_field.isra ().

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2022-0702 β€Ό

The Petfinder Listings WordPress plugin through 1.0.18 does not escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2022-24577 β€Ό

GPAC 1.0.1 is affected by a NULL pointer dereference in gf_utf8_wcslen ().

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2022-0327 β€Ό

The Master Addons for Elementor WordPress plugin before 1.8.5 does not sanitise and escape the error_message parameter before outputting it back in the response of the jltma_restrict_content AJAX action, available to unauthenticated and authenticated users, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2022-0946 β€Ό

Stored XSS viva cshtm file upload in GitHub repository star7th/showdoc prior to v2.10.4.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2022-24576 β€Ό

GPAC 1.0.1 is affected by Use After Free through MP4Box.

πŸ“– Read

via "National Vulnerability Database".
?
14:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cryptocoin ATMs ruled illegal – β€œShut down at once”, says regulator ⚠

If you live in the UK and hadn't yet heard of cryptocoin ATMs... it's too late now!

πŸ“– Read

via "Naked Security".
14:57
πŸ•΄ Mobile Threats Skyrocket πŸ•΄

A new report shows an explosion of zero-day attacks and malware focused on mobile devices just as companies adopted widespread bring-your-own device policies.

πŸ“– Read

via "Dark Reading".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-39051 β€Ό

IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerable to server-side request forgery, caused by improper input of application server registration function. A remote attacker could exploit this vulnerability using the host address and port fields of the application server registration form in the portal UI to enumerate and attack services that are running on those hosts. IBM X-Force ID: 214441.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2022-22346 β€Ό

IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.13.xxx is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 220048.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2022-22353 β€Ό

IBM Big SQL on IBM Cloud Pak for Data 7.1.0, 7.1.1, 7.2.0, and 7.2.3 could allow an authenticated user with appropriate permissions to obtain sensitive information by bypassing data masking rules using a CREATE TABLE SELECT statement. IBM X-Force ID: 220480.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-38971 β€Ό

IBM Data Virtualization on Cloud Pak for Data 1.3.0, 1.4.1, 1.5.0, 1.7.1 and 1.7.3 could allow an authorized user to bypass data masking rules and obtain sensitve information. IBM X-Force ID: 212620.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2022-22344 β€Ό

IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 220038

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2022-22354 β€Ό

IBM Spectrum Protect Plus 10.1.0.0 through 10.1.9.2 and IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 do not limit the length of a connection which could allow for a Slowloris HTTP denial of service attack to take place. This can cause the Admin Console to become unresponsive. IBM X-Force ID: 220485.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-39055 β€Ό

IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214534.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2022-0962 β€Ό

Stored XSS viva .webma file upload in GitHub repository star7th/showdoc prior to 2.10.4.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2022-22348 β€Ό

IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.13.xxx is vulnerable to reverse tabnabbing where it could allow a page linked to from within Operations Center to rewrite it. An administrator could enter a link to a malicious URL that another administrator could then click. Once clicked, that malicious URL could then rewrite the original page with a phishing page. IBM X-Force ID: 220139.

πŸ“– Read

via "National Vulnerability Database".
15:28
πŸ•΄ Catching the Evasive REvil Ransomware Gang With AI πŸ•΄

Ransomware-as-a-service gangs are difficult to shut down, but sophisticated, AI-driven defenses may finally be killing their profits.

πŸ“– Read

via "Dark Reading".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Embracing Security by Design: Security Isn't a Pretty Picture πŸ•΄

A starting point for secure UI and UX? Remember that security measures should frustrate attackers, not users.

πŸ“– Read

via "Dark Reading".
?
17:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26351 β€Ό

Canon imagePROGRAF and imageRUNNER devices through 2022-03-14 generate RSA keys that can be broken with Fermat's factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2022-21187 β€Ό

The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2022-24733 β€Ό

Sylius is an open source eCommerce platform. Prior to versions 1.9.10, 1.10.11, and 1.11.2, it is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. A workaround is available. Every response from app should have an X-Frame-Options header set to: ``sameorigin``. To achieve that, add a new `subscriber` in the app.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2022-26320 β€Ό

The Rambus SafeZone Basic Crypto Module, as used in certain Fujifilm (formerly Fuji Xerox) devices before 2022-03-01 and potentially many other devices, generates RSA keys that can be broken with Fermat's factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2022-24578 β€Ό

GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2022-20001 β€Ό

fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt.

πŸ“– Read

via "National Vulnerability Database".
?
19:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Staff Think Conti Group Is a Legit Employer – Podcast ❌

The ransomware group’s benefits – bonuses, employee of the month, performance reviews & top-notch training – might be better than yours, says BreachQuest’s Marco Figueroa.

πŸ“– Read

via "Threat Post".
19:18
β€Ό CVE-2022-24743 β€Ό

Sylius is an open source eCommerce platform. Prior to versions 1.10.11 and 1.11.2, the reset password token was not set to null after the password was changed. The same token could be used several times, which could result in leak of the existing token and unauthorized password change. The issue is fixed in versions 1.10.11 and 1.11.2. As a workaround, overwrite the `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class with code provided by the maintainers and register it in a container. More information about this workaround is available in the GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2022-24742 β€Ό

Sylius is an open source eCommerce platform. Prior to versions 1.9.10, 1.10.11, and 1.11.2, any other user can view the data if browser tab remains unclosed after log out. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. A workaround is available. The application must strictly redirect to login page even browser back button is pressed. Another possibility is to set more strict cache policies for restricted content.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2022-0943 β€Ό

Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
15 March 2022
?
02:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0945 β€Ό

Stored XSS viva axd and cshtml file upload in star7th/showdoc in GitHub repository star7th/showdoc prior to v2.10.4.

πŸ“– Read

via "National Vulnerability Database".
02:18
β€Ό CVE-2022-0944 β€Ό

Template injection in connection test endpoint leads to RCE in GitHub repository sqlpad/sqlpad prior to 6.10.1.

πŸ“– Read

via "National Vulnerability Database".
?
09:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Israeli government websites temporarily knocked offline by β€˜massive’ cyber-attack πŸ—“οΈ

DDoS assault blamed on Iran, local media reports

πŸ“– Read

via "The Daily Swig".
09:19
β€Ό CVE-2022-0893 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.

πŸ“– Read

via "National Vulnerability Database".
09:19
β€Ό CVE-2022-0894 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.

πŸ“– Read

via "National Vulnerability Database".
?
10:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Pandora Ransomware Hits Giant Automotive Supplier Denso ❌

Denso confirmed that cybercriminals leaked stolen, classified information from the Japan-based car-components manufacturer after an attack on one of its offices in Germany.

πŸ“– Read

via "Threat Post".
?
10:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SentinelOne to Buy Attivo Networks in $616.5M Deal πŸ•΄

Attivo's identity threat detection and response is "an integral part" of SentinelOne's XDR strategy, SentinelOne CEO says.

πŸ“– Read

via "Dark Reading".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0957 β€Ό

Stored XSS via File Upload in GitHub repository star7th/showdoc prior to 2.10.4.

πŸ“– Read

via "National Vulnerability Database".
11:19
β€Ό CVE-2022-0954 β€Ό

Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in GitHub repository microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
11:19
β€Ό CVE-2021-45010 β€Ό

Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager 2.4.1 allows remote attackers with valid user accounts to upload malicious PHP files to the webroot and achieve code execution on the target server.

πŸ“– Read

via "National Vulnerability Database".
11:19
β€Ό CVE-2022-0956 β€Ό

Stored XSS via File Upload in GitHub repository star7th/showdoc prior to v.2.10.4.

πŸ“– Read

via "National Vulnerability Database".
11:29
πŸ•΄ Windstream Enterprise Delivers Comprehensive Managed SASE Solution With Cato Networks πŸ•΄

Windstream Enterprise’s convergence of networking and security addresses modern-day challenges of digital business transformation, cybersecurity and workforce mobility.​

πŸ“– Read

via "Dark Reading".
11:29
πŸ•΄ As Log4j Continues to Remind Us, What's Old Is New Again πŸ•΄

We need to focus on the bad guys and their methods instead of playing whack-a-mole with indicators of compromise.

πŸ“– Read

via "Dark Reading".
11:29
πŸ•΄ Cowbell Cyber Raises $100M in Series B Funding to Further Develop Cyber-Risk Underwriting πŸ•΄

Led by Anthemis Group, funding fuels investment in go-to-market expansion, closed-loop risk management, and risk-bearing capabilities.

πŸ“– Read

via "Dark Reading".
11:29
πŸ•΄ e2e-assure Launches New Microsoft Defender-Focused SOC Services πŸ•΄

They are aimed at helping organizations kickstart their cyber-risk management.

πŸ“– Read

via "Dark Reading".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Node.js security: Parse Server remote code execution vulnerability resolved πŸ—“οΈ

GitHub has awarded the bug a severity score of 10 – the highest available

πŸ“– Read

via "The Daily Swig".
?
13:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24755 β€Ό

Bareos is open source software for backup, archiving, and recovery of data for operating systems. When Bareos Director >= 18.2 >= 18.2 but prior to 21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication, it will skip authorization checks completely. Expired accounts and accounts with expired passwords can still login. This problem will affect users that have PAM enabled. Currently there is no authorization (e.g. check for expired or disabled accounts), but only plain authentication (i.e. check if username and password match). Bareos Director versions 21.1.0, 20.0.6 and 19.2.12 implement the authorization check that was previously missing. The only workaround is to make sure that authentication fails if the user is not authorized.

πŸ“– Read

via "National Vulnerability Database".
13:19
β€Ό CVE-2022-0961 β€Ό

The microweber application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in GitHub repository microweber/microweber prior to 1.2.12.

πŸ“– Read

via "National Vulnerability Database".
13:19
β€Ό CVE-2022-0942 β€Ό

Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to 2.10.4.

πŸ“– Read

via "National Vulnerability Database".
13:19
β€Ό CVE-2022-24752 β€Ό

SyliusGridBundle is a package of generic data grids for Symfony applications. Prior to versions 1.10.1 and 1.11-rc2, values added at the end of query sorting were passed directly to the database. The maintainers do not know if this could lead to direct SQL injections but took steps to remediate the vulnerability. The issue is fixed in versions 1.10.1 and 1.11-rc2. As a workaround, overwrite the`Sylius\Component\Grid\Sorting\Sorter.php` class and register it in the container. More information about this workaround is available in the GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
13:19
β€Ό CVE-2022-24721 β€Ό

CometD is a scalable comet implementation for web messaging. In any version prior to 5.0.11, 6.0.6, and 7.0.6, internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other users' (possibly sensitive) data. By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure. A fix is available in versions 5.0.11, 6.0.6, and 7.0.6. As a workaround, install a custom `SecurityPolicy` that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.

πŸ“– Read

via "National Vulnerability Database".
13:19
β€Ό CVE-2022-0430 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.

πŸ“– Read

via "National Vulnerability Database".
13:19
β€Ό CVE-2022-24756 β€Ό

Bareos is open source software for backup, archiving, and recovery of data for operating systems. When Bareos Director >= 18.2 but prior to 21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication, a failed PAM authentication will leak a small amount of memory. An attacker that is able to use the PAM Console (i.e. by knowing the shared secret or via the WebUI) can flood the Director with failing login attempts which will eventually lead to an out-of-memory condition in which the Director will not work anymore. Bareos Director versions 21.1.0, 20.0.6 and 19.2.12 contain a Bugfix for this problem. Users who are unable to upgrade may disable PAM authentication as a workaround.

πŸ“– Read

via "National Vulnerability Database".
?
13:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Lawmakers Probe Early Release of Top RU Cybercrook β™ŸοΈ

Aleksei Burkov, a cybercriminal who long operated two of Russia's most exclusive underground hacking forums, was arrested in 2015 by Israeli authorities. The Russian government fought Burkov's extradition to the U.S. for four years -- even arresting and jailing an Israeli woman to force a prisoner swap. That effort failed: Burkov was sent to America, pleaded guilty, and was sentenced to nine years in prison. But a little more than a year later, he was quietly released and deported back to Russia. Now some Republican lawmakers are asking why a Russian hacker once described as "an asset of supreme importance" was allowed to shorten his stay.

πŸ“– Read

via "Krebs on Security".
13:57
⚠ Apple patches 87 security holes – from iPhones and Macs to Windows ⚠

Lots of fixes, with data leakage flaws and code execution bugs patched on iPhones, Macs and even Windows.

πŸ“– Read

via "Naked Security".
14:11
❌ Most QNAP NAS Devices Affected by β€˜Dirty Pipe’ Linux Flaw ❌

The β€œDirty Pipe” Linux kernel flaw – a high-severity vulnerability in all major distros that grants root access to unprivileged users who have local access – affects most of QNAP’s network-attached storage (NAS) appliances, the Taiwanese manufacturer warned on Monday. Dirty Pipe, a recently reported local privilege escalation vulnerability, affects the Linux kernel on QNAP […]

πŸ“– Read

via "Threat Post".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-27214 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27195 β€Ό

Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-0778 β€Ό

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27202 β€Ό

Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27207 β€Ό

Jenkins global-build-stats Plugin 1.5 and earlier does not escape multiple fields in the chart configuration on the 'Global Build Stats' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-0965 β€Ό

Stored XSS viva .ofd file upload in GitHub repository star7th/showdoc prior to 2.10.4.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-22771 β€Ό

The Server component of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Library: version 7.9.0, TIBCO JasperReports Library for ActiveMatrix BPM: version 7.9.0, TIBCO JasperReports Server: versions 7.9.0 and 7.9.1, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and 7.9.1, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and 7.9.1, and TIBCO JasperReports Server for Microsoft Azure: version 7.9.1.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27215 β€Ό

A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27205 β€Ό

A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-0967 β€Ό

Stored XSS via File Upload in star7th/showdoc in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.10.4.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27208 β€Ό

Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27204 β€Ό

A cross-site request forgery vulnerability in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers to connect to an attacker-specified URL.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27197 β€Ό

Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27199 β€Ό

A missing permission check in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27212 β€Ό

Jenkins List Git Branches Parameter Plugin 0.0.9 and earlier does not escape the name of the 'List Git branches (and more)' parameter, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27213 β€Ό

Jenkins Environment Dashboard Plugin 1.1.10 and earlier does not escape the Environment order and the Component order configuration values in its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-0964 β€Ό

Stored XSS viva .webmv file upload in GitHub repository star7th/showdoc prior to 2.10.4.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-26779 β€Ό

Apache CloudStack prior to 4.16.1.0 used insecure random number generation for project invitation tokens. If a project invite is created based only on an email address, a random token is generated. An attacker with knowledge of the project ID and the fact that the invite is sent, could generate time deterministic tokens and brute force attempt to use them prior to the legitimate receiver accepting the invite. This feature is not enabled by default, the attacker is required to know or guess the project ID for the invite in addition to the invitation token, and the attacker would need to be an existing authorized user of CloudStack.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27200 β€Ό

Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

πŸ“– Read

via "National Vulnerability Database".
15:19
β€Ό CVE-2022-27218 β€Ό

Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
15:29
πŸ•΄ Praetorian Launches Chariot Total Attack Life Cycle Solution πŸ•΄

New platform combines AI-based attack surface management automation with offensive security managed services to identify exposures and prioritize risk management.

πŸ“– Read

via "Dark Reading".
15:29
πŸ•΄ OneLayer Secures $8.2M Seed Round to Protect Private 5G Networks πŸ•΄

OneLayer plans to use the funds to build its product suite.

πŸ“– Read

via "Dark Reading".
15:29
πŸ•΄ Incognia Introduces New Location Identity Fraud Detection Tools πŸ•΄

Modules include Location Spoofing Detection, Global Mobile Address Validation, and Trusted Device Intelligence.

πŸ“– Read

via "Dark Reading".
?
16:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Utah Set to Pass U.S.'s Next Data Privacy Bill πŸ”

Utah looks like it will become the fourth U.S. state, after California, Virginia, and Colorado, to pass comprehensive consumer privacy legislation.

πŸ“– Read

via "".
?
17:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyberattacks Against Israeli Government Sites: β€˜Largest in the Country’s History’ ❌

DDoS attacks against Israel telecom companies took down government sites, sparking a temporary state of emergency.

πŸ“– Read

via "Threat Post".
17:19
β€Ό CVE-2022-25488 β€Ό

Atom CMS v2.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/ajax/avatar.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25497 β€Ό

CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2021-45848 β€Ό

Denial of service (DoS) vulnerability in Nicotine+ 3.0.3 and later allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25494 β€Ό

Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via staff_login.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25485 β€Ό

CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertLightbox.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25486 β€Ό

CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25492 β€Ό

HMS v1.0 was discovered to contain a SQL injection vulnerability via the medicineid parameter in ajaxmedicine.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25491 β€Ό

HMS v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in appointment.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25489 β€Ό

Atom CMS v2.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "A" parameter in /widgets/debug.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25498 β€Ό

CuppaCMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the saveConfigData function in /classes/ajax/Functions.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25490 β€Ό

HMS v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in department.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25495 β€Ό

The component /jquery_file_upload/server/php/index.php of CuppaCMS v1.0 allows attackers to upload arbitrary files and execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25493 β€Ό

HMS v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via treatmentrecord.php.

πŸ“– Read

via "National Vulnerability Database".
17:19
β€Ό CVE-2022-25487 β€Ό

Atom CMS v2.0 was discovered to contain a remote code execution (RCE) vulnerability via /admin/uploads.php.

πŸ“– Read

via "National Vulnerability Database".
?
18:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mobile App Developers Leave Behind 2,100 Open Databases πŸ•΄

A simple request to the VirusTotal scanning service reveals thousands of mobile-application databases left open to the public by developers in a three-month period.

πŸ“– Read

via "Dark Reading".
18:30
πŸ•΄ NAS Vendor Says Several of Its Products Likely Contain Linux 'Dirty Pipe' Flaw πŸ•΄

QNAP's disclosure this week is the latest reminder of the potentially wide impact of privilege escalation flaw in the Linux kernel.

πŸ“– Read

via "Dark Reading".
?
19:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-29134 β€Ό

The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL.

πŸ“– Read

via "National Vulnerability Database".
19:19
β€Ό CVE-2022-23989 β€Ό

In Stormshield Network Security (SNS) 3.7.6 through 3.7.24, 3.11.1 through 3.11.12, 4.2.1 through 4.2.9, and 4.3.0 through 4.3.4, a flood of connections to the SSLVPN service might lead to saturation of the loopback interface. This could result in the blocking of almost all network traffic, making the firewall unreachable. An attacker could exploit this via forged and properly timed traffic to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:29
πŸ•΄ Private Equity Firm Snaps Up RSA Conference πŸ•΄

Crosspoint Capital Partners, along with Clearlake Capital Group and Symphony Technology Group, are setting up RSA Conference as a separate company from RSA Security.

πŸ“– Read

via "Dark Reading".
?
21:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-27004 β€Ό

Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the Tunnel 6in4 function via the remote6in4 parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26206 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setLanguageCfg, via the langType parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26214 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function NTPSyncWithHost. This vulnerability allows attackers to execute arbitrary commands via the host_time parameter.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-27000 β€Ό

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the time and time zone function via the h_primary_ntp_server, h_backup_ntp_server, and h_time_zone parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-27001 β€Ό

Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the dhcp function via the hostname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26208 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setWebWlanIdx, via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26211 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function CloudACMunualUpdate, via the deviceMac and deviceName parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26991 β€Ό

Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ntp function via the TimeZone parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26207 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setDiagnosisCfg, via the ipDoamin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:19
β€Ό CVE-2022-26999 β€Ό

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26213 β€Ό

Totolink X5000R_Firmware v9.1.0u.6118_B20201102 was discovered to contain a command injection vulnerability in the function setNtpCfg, via the tz parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26210 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUpgradeFW, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26993 β€Ό

Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pppoe function via the pppoeUserName, pppoePassword, and pppoe_Service parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26994 β€Ό

Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pptp function via the pptpUserName and pptpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26996 β€Ό

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pppoe function via the pppoe_username, pppoe_passwd, and pppoe_servicename parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26997 β€Ό

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the upnp function via the upnp_ttl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26992 β€Ό

Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26998 β€Ό

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-26212 β€Ό

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setDeviceName, via the deviceMac and deviceName parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
21:20
β€Ό CVE-2022-27002 β€Ό

Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the ddns function via the ddns_name, ddns_pwd, h_ddns?ddns_host parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
16 March 2022
?
01:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ US law passed forcing companies to report cyber attacks, ransomware payments πŸ“’

Operators of critical infrastructure will face a subpoena for failing to report cyber incidents

πŸ“– Read

via "ITPro".
01:29
πŸ“’ Ukraine given access to Clearview AI's controversial facial recognition tech πŸ“’

The tech will be used to recognise Russian soldiers, tackle misinformation, and identify the deceased

πŸ“– Read

via "ITPro".
01:29
πŸ“’ Vodafone and Ericsson complete UK's first 5G network slicing trial πŸ“’

Network slicing allows businesses and app developers to carve out a β€˜slice’ of the network suited to specific use cases

πŸ“– Read

via "ITPro".
01:29
πŸ“’ What is Strong Customer Authentication (SCA) under PSD2? πŸ“’

An in-depth look at the EU directive that aims to harmonise online payment protection

πŸ“– Read

via "ITPro".
01:29
πŸ“’ IoT security market to hit $59 billion by 2029 πŸ“’

The Asia Pacific region is projected to lead the market during the forecast period

πŸ“– Read

via "ITPro".
01:29
πŸ“’ Cyber security certification overhaul brings new questions and longer exams πŸ“’

Fresh changes to the examination format of the prestigious CISSP exam will come into effect later this year

πŸ“– Read

via "ITPro".
01:29
πŸ“’ China overhauls ISP rules to better protect children online πŸ“’

New rules include 'youth modes' for all video services and mandatory security software for all new devices

πŸ“– Read

via "ITPro".
?
02:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-27225 β€Ό

Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an http:// link to the server, despite the real server requiring HTTPS.

πŸ“– Read

via "National Vulnerability Database".
02:19
β€Ό CVE-2022-27223 β€Ό

In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.

πŸ“– Read

via "National Vulnerability Database".
02:19
β€Ό CVE-2021-43955 β€Ό

The /rest-service-fecru/server-v1 resource in Fisheye and Crucible before version 4.8.9 allowed authenticated remote attackers to obtain information about installation directories via information disclosure vulnerability.

πŸ“– Read

via "National Vulnerability Database".
02:19
β€Ό CVE-2021-43957 β€Ό

Affected versions of Atlassian Fisheye & Crucible allowed remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory and bypass the fix for CVE-2020-29446 due to a lack of url decoding. The affected versions are before version 4.8.9.

πŸ“– Read

via "National Vulnerability Database".
02:20
β€Ό CVE-2021-43956 β€Ό

The jQuery deserialize library in Fisheye and Crucible before version 4.8.9 allowed remote attackers to to inject arbitrary HTML and/or JavaScript via a prototype pollution vulnerability.

πŸ“– Read

via "National Vulnerability Database".
02:20
β€Ό CVE-2021-43958 β€Ό

Various rest resources in Fisheye and Crucible before version 4.8.9 allowed remote attackers to brute force user login credentials as rest resources did not check if users were beyond their max failed login limits and therefore required solving a CAPTCHA in addition to providing user credentials for authentication via a improper restriction of excess authentication attempts vulnerability.

πŸ“– Read

via "National Vulnerability Database".
02:20
β€Ό CVE-2020-36519 β€Ό

Mimecast Email Security before 2020-01-10 allows any admin to spoof any domain, and pass DMARC alignment via SPF. This occurs through misuse of the address rewrite feature. (The domain being spoofed must be a customer in the Mimecast grid from which the spoofing occurs.)

πŸ“– Read

via "National Vulnerability Database".
?
07:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ OpenSSL drops update addressing β€˜high severity’ denial of service issue in ubiquitous encryption library πŸ—“οΈ

The race is on for maintainers of downstream applications

πŸ“– Read

via "The Daily Swig".
?
09:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45851 β€Ό

A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.

πŸ“– Read

via "National Vulnerability Database".
09:20
β€Ό CVE-2022-0704 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.

πŸ“– Read

via "National Vulnerability Database".
09:20
β€Ό CVE-2022-21946 β€Ό

A Improper Privilege Management vulnerability in the sudoers configuration in cscreen of openSUSE Factory allows any local users to gain the privileges of the tty and dialout groups and access and manipulate any running cscreen seesion. This issue affects: openSUSE Factory cscreen version 1.2-1.3 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
09:20
β€Ό CVE-2022-21945 β€Ό

A Insecure Temporary File vulnerability in cscreen of openSUSE Factory allows local attackers to cause DoS for cscreen and a system DoS for non-default systems. This issue affects: openSUSE Factory cscreen version 1.2-1.3 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
09:20
β€Ό CVE-2021-46705 β€Ό

A Insecure Temporary File vulnerability in grub-once of grub2 in SUSE Linux Enterprise Server 15 SP4, openSUSE Factory allows local attackers to truncate arbitrary files. This issue affects: SUSE Linux Enterprise Server 15 SP4 grub2 versions prior to 2.06-150400.7.1. SUSE openSUSE Factory grub2 versions prior to 2.06-18.1.

πŸ“– Read

via "National Vulnerability Database".
09:20
β€Ό CVE-2021-45852 β€Ό

An issue was discovered in Projectworlds Hospital Management System v1.0. Unauthorized malicious attackers can add patients without restriction via add_patient.php.

πŸ“– Read

via "National Vulnerability Database".
09:20
β€Ό CVE-2022-0705 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.

πŸ“– Read

via "National Vulnerability Database".
09:29
πŸ•΄ What Kind Of Security Tools Should I Provide My Developers? πŸ•΄

Who says developers don't care about security? Give them the tools to help them build security into their code.

πŸ“– Read

via "Dark Reading".
?
10:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Should My Security Analyst Use the MITRE ATT&CK Framework? πŸ•΄

As a curated knowledgebase for adversary behavior, the MITRE ATT&CK framework can guide defenders on how to conduct an investigation and the order of things to look for.

πŸ“– Read

via "Dark Reading".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45787 β€Ό

There is a stored Cross Site Scripting (XSS) vulnerability in maccms v10 through adding videos. XSS code can be inserted at parameter positions including name and remarks.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-42552 β€Ό

Cross-site Scripting (XSS) vulnerability in ArchivistaBox webclient allows an attacker to craft a malicious link, executing JavaScript in the context of a victim's browser. This issue affects all ArchivistaBox versions prior to 2022/I.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2022-0986 β€Ό

Reflected Cross-site Scripting (XSS) Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.11.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-45786 β€Ό

In maccms v10, an attacker can log in through /index.php/user/login in the "col" and "openid" parameters to gain privileges.

πŸ“– Read

via "National Vulnerability Database".
11:30
πŸ•΄ Would 'Cyber Geneva Conventions' Defuse Online Aggression? πŸ•΄

International treaties could force nation-states to police bad actors within their borders to avoid penalties.

πŸ“– Read

via "Dark Reading".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ HackerOne lifts β€˜sanctions’ against Ukrainian hackers πŸ—“οΈ

Platform apologizes for β€˜poor communication’ over bug bounty payouts

πŸ“– Read

via "The Daily Swig".
?
13:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-39711 β€Ό

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-40767 β€Ό

Adobe Character Animator version 4.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-40787 β€Ό

Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39712 β€Ό

In TBD of TBD, there is a possible user after free vulnerability due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176918884References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39792 β€Ό

In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2022-0811 β€Ό

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39713 β€Ό

Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-42722 β€Ό

Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39715 β€Ό

In __show_regs of process.c, there is a possible leak of kernel memory and addresses due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178379135References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39725 β€Ό

In gasket_free_coherent_memory_all of gasket_page_table.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151454974References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-20257 β€Ό

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39692 β€Ό

In onCreate of SetupLayoutActivity.java, there is a possible way to setup a work profile bypassing user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209611539

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39720 β€Ό

Product: AndroidVersions: Android kernelAndroid ID: A-207433926References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-40742 β€Ό

Adobe Audition version 14.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2022-25246 β€Ό

Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-40788 β€Ό

Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-39714 β€Ό

In ion_buffer_kmap_get of ion.c, there is a possible use-after-free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205573273References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2022-26660 β€Ό

RunAsSpc 4.0 uses a universal and recoverable encryption key. In possession of a file encrypted by RunAsSpc, an attacker can recover the credentials that were used.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-40781 β€Ό

Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:20
β€Ό CVE-2021-40763 β€Ό

Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-40786 β€Ό

Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-40777 β€Ό

Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39724 β€Ό

In TuningProviderBase::GetTuningTreeSet of tuning_provider_base.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205753190References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39727 β€Ό

In eicPresentationRetrieveEntryValue of acropora/app/identity/libeic/EicPresentation.c, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196388042References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-40740 β€Ό

Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2022-26354 β€Ό

A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-42730 β€Ό

Adobe Bridge version 11.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious PSD file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-40741 β€Ό

Adobe Audition version 14.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-42724 β€Ό

Adobe Bridge version 11.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-42527 β€Ό

Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39709 β€Ό

In sendSipAccountsRemovedNotification of SipAccountRegistry.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208817618

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2022-24751 β€Ό

Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39722 β€Ό

In ProtocolStkProactiveCommandAdapter::Init of protocolstkadapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204585345References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39707 β€Ό

In onReceive of AppRestrictionsFragment.java, there is a possible way to start a phone call without permissions due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-200688991

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2022-25251 β€Ό

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain XML messages to a specific port without proper authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to read and modify the affected productÒ€ℒs configuration.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39694 β€Ό

In parse of RoleParser.java, there is a possible way for default apps to get permissions explicitly denied by the user due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-202312327

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-40778 β€Ό

Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39721 β€Ό

In TBD of TBD, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195726151References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-42720 β€Ό

Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39710 β€Ό

Product: AndroidVersions: Android kernelAndroid ID: A-202160245References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:30
β€Ό CVE-2021-42728 β€Ό

Adobe Bridge 11.1.1 (and earlier) is affected by a stack overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Bridge.

πŸ“– Read

via "National Vulnerability Database".
13:30
β€Ό CVE-2021-39734 β€Ό

In sendMessage of OneToOneChatImpl.java (? TBD), there is a possible way to send an RCS message without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208650395References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:30
β€Ό CVE-2021-39701 β€Ό

In serviceConnection of ControlsProviderLifecycleManager.kt, there is a possible way to keep service running in foreground without notification or permission due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-212286849

πŸ“– Read

via "National Vulnerability Database".
13:30
β€Ό CVE-2021-39695 β€Ό

In createOrUpdate of BasePermission.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-209607944

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2022-0918 β€Ό

A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-39733 β€Ό

In amcs_cdev_unlocked_ioctl of audiometrics.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206128522References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2022-25249 β€Ό

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated attacker to obtain file system read access via web server..

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-39726 β€Ό

In cd_ParseMsg of cd_codec.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-181782896References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-39708 β€Ό

In gatt_process_notification of gatt_cl.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-206128341

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-39703 β€Ό

In updateState of UsbDeviceManager.java, there is a possible unauthorized access of files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-207057578

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-40796 β€Ό

Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-39729 β€Ό

In the TitanM chip, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-202006191References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-40779 β€Ό

Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2022-0982 β€Ό

The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-40764 β€Ό

Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-40738 β€Ό

Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-40782 β€Ό

Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-20299 β€Ό

A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
13:33
β€Ό CVE-2021-39702 β€Ό

In onCreate of RequestManageCredentials.java, there is a possible way for a third party app to install certificates without user approval due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-205150380

πŸ“– Read

via "National Vulnerability Database".
13:36
β€Ό CVE-2021-40780 β€Ό

Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:36
β€Ό CVE-2021-39667 β€Ό

In ih264d_parse_decode_slice of ih264d_parse_slice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-205702093

πŸ“– Read

via "National Vulnerability Database".
13:36
β€Ό CVE-2021-33853 β€Ό

A Cross-Site Scripting (XSS) attack can cause arbitrary code (javascript) to run in a userÒ€ℒs browser while the browser is connected to a trusted website. As the vehicle for the attack, the application targets the users and not the application itself. Additionally, the XSS payload is executed when the user attempts to access any page of the CRM.

πŸ“– Read

via "National Vulnerability Database".
13:36
β€Ό CVE-2021-40768 β€Ό

Adobe Character Animator version 4.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
13:36
β€Ό CVE-2021-40739 β€Ό

Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:39
πŸ—“οΈ Unpatched plugins threaten millions of WordPress websites πŸ—“οΈ

Number of vulnerabilities found in WordPress plugins and themes jumped 150% between 2020 and 2021

πŸ“– Read

via "The Daily Swig".
13:46
❌ Another Destructive Wiper Targets Organizations in Ukraine ❌

CaddyWiper is one in a barrage of data-wiping cyber-attacks to hit the country since January as the war on the ground with Russia marches on.

πŸ“– Read

via "Threat Post".
14:01
πŸ•΄ Russia State-Sponsored Hackers Used Misconfigured MFA to Breach NGO πŸ•΄

FBI and CISA warn of attack on multifactor authentication account to exploit "PrintNightmare" exploit.

πŸ“– Read

via "Dark Reading".
?
14:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenSSL Toolkit 1.1.1n πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Read

via "Packet Storm Security".
14:45
πŸ›  nfstream 6.4.3 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".