βΌ CVE-2021-45978 βΌ
π Read
via "National Vulnerability Database".
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via xfa.host.gotoURL in the XFA API.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3842 βΌ
π Read
via "National Vulnerability Database".
nltk is vulnerable to Inefficient Regular Expression Complexityπ Read
via "National Vulnerability Database".
βΌ CVE-2022-20014 βΌ
π Read
via "National Vulnerability Database".
In vow driver, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05857308; Issue ID: ALPS05857308.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20015 βΌ
π Read
via "National Vulnerability Database".
In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40148 βΌ
π Read
via "National Vulnerability Database".
In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.π Read
via "National Vulnerability Database".
β Apple Home software bug could lock you out of your iPhone β
π Read
via "Naked Security".
The finder of this bug insists it "poses a serious risk". We're not so sure, but we recommend you take steps to avoid it anyway.π Read
via "Naked Security".
Naked Security
Apple Home software bug could lock you out of your iPhone
The finder of this bug insists it βposes a serious riskβ. Weβre not so sure, but we recommend you take steps to avoid it anyway.
π΄ Mobile Application Security: 2021's Breaches π΄
π Read
via "Dark Reading".
Many of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.π Read
via "Dark Reading".
Dark Reading
Mobile Application Security: 2021's Breaches
Many of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.
βΌ CVE-2021-3845 βΌ
π Read
via "National Vulnerability Database".
ws-scrcpy is vulnerable to External Control of File Name or Pathπ Read
via "National Vulnerability Database".
βΌ CVE-2022-0086 βΌ
π Read
via "National Vulnerability Database".
uppy is vulnerable to Server-Side Request Forgery (SSRF)π Read
via "National Vulnerability Database".
βΌ CVE-2021-39143 βΌ
π Read
via "National Vulnerability Database".
Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.π Read
via "National Vulnerability Database".
β Data Skimmer Hits 100+ Sothebyβs Real-Estate Websites β
π Read
via "Threat Post".
The campaign was an opportunistic supply-chain attack abusing a weaponized cloud video player.π Read
via "Threat Post".
Threat Post
Data Skimmer Hits 100+ Sothebyβs Real-Estate Websites
The campaign was an opportunistic supply-chain attack abusing a weaponized Brightcove cloud video player.
β SEGAβs Sloppy Security Confession: Exposed AWS S3 Bucket Offers Up Steam API Access & More β
π Read
via "Threat Post".
SEGA's disclosure underscores a common, potentially catastrophic, flub β misconfigured Amazon Web Services (AWS) S3 buckets.π Read
via "Threat Post".
Threat Post
SEGAβs Sloppy Security Confession: Exposed AWS S3 Bucket Offers Up Steam API Access & More
SEGA's disclosure underscores a common, potentially catastrophic, flub β misconfigured Amazon Web Services (AWS) S3 buckets.
π΄ Google Buys Siemplify to Get Ahead in Cloud Security π΄
π Read
via "Dark Reading".
Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.π Read
via "Dark Reading".
Dark Reading
Google Buys Siemplify to Get Ahead in Cloud Security
Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.
βΌ CVE-2021-41236 βΌ
π Read
via "National Vulnerability Database".
OroPlatform is a PHP Business Application Platform. In affected versions the email template preview is vulnerable to XSS payload added to email template content. An attacker must have permission to create or edit an email template. For successful payload, execution the attacked user must preview a vulnerable email template. There are no workarounds that address this vulnerability. Users are advised to upgrade as soon as is possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43832 βΌ
π Read
via "National Vulnerability Database".
Spinnaker is an open source, multi-cloud continuous delivery platform. Spinnaker has improper permissions allowing pipeline creation & execution. This lets an arbitrary user with access to the gate endpoint to create a pipeline and execute it without authentication. If users haven't setup Role-based access control (RBAC) with-in spinnaker, this enables remote execution and access to deploy almost any resources on any account. Patches are available on the latest releases of the supported branches and users are advised to upgrade as soon as possible. Users unable to upgrade should enable RBAC on ALL accounts and applications. This mitigates the ability of a pipeline to affect any accounts. Block application access unless permission are enabled. Users should make sure ALL application creation is restricted via appropriate wildcards.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43850 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open source platform for community discussion. In affected versions admins users can trigger a Denial of Service attack via the `/message-bus/_diagnostics` path. The impact of this vulnerability is greater on multisite Discourse instances (where multiple forums are served from a single application server) where any admin user on any of the forums are able to visit the `/message-bus/_diagnostics` path. The problem has been patched. Please upgrade to 2.8.0.beta10 or 2.7.12. No workarounds for this issue exist.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43677 βΌ
π Read
via "National Vulnerability Database".
Fluxbb v1.4.12 is affected by a Cross Site Scripting (XSS) vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21648 βΌ
π Read
via "National Vulnerability Database".
Latte is an open source template engine for PHP. Versions since 2.8.0 Latte has included a template sandbox and in affected versions it has been found that a sandbox escape exists allowing for injection into web pages generated from Latte. This may lead to XSS attacks. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. Users unable to upgrade should not accept template input from untrusted sources.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21647 βΌ
π Read
via "National Vulnerability Database".
CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `old()` function and form_helper nor `RedirectResponse::withInput()` and `redirect()->withInput()`.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43852 βΌ
π Read
via "National Vulnerability Database".
OroPlatform is a PHP Business Application Platform. In affected versions by sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. This issue has been patched in version 4.2.8. Users unable to upgrade may configure a firewall to drop requests containing next strings: `__proto__` , `constructor[prototype]`, and `constructor.prototype` to mitigate this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21643 βΌ
π Read
via "National Vulnerability Database".
USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via register.php. In particular usernames, email addresses, and passwords provided by the user were not sanitized and were used directly to construct a sql statement. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.π Read
via "National Vulnerability Database".