βΌ CVE-2022-23993 βΌ
π Read
via "National Vulnerability Database".
/usr/local/www/pkg.php in pfSense through 2.5.2 uses $_REQUEST['pkg_filter'] in a PHP echo call.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22850 βΌ
π Read
via "National Vulnerability Database".
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_types.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21686 βΌ
π Read
via "National Vulnerability Database".
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23990 βΌ
π Read
via "National Vulnerability Database".
Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46114 βΌ
π Read
via "National Vulnerability Database".
jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22852 βΌ
π Read
via "National Vulnerability Database".
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_list.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46385 βΌ
π Read
via "National Vulnerability Database".
https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: SQL Injection. The impact is: obtain sensitive information (remote). The component is: net.mingsoft.mdiy.action.FormDataAction#queryData. The attack vector is: 0 or sleep(3). ΓΒΆΓΒΆ MCMS has a sql injection vulnerability through which attacker can get sensitive information from the database.π Read
via "National Vulnerability Database".
β βDark Herringβ Billing Malware Swims onto 105M Android Devices β
π Read
via "Threat Post".
The mobile malware heisted hundreds of millions of dollars from unsuspecting users, thanks to 470 different well-crafted malicious app in Google Play.π Read
via "Threat Post".
Threat Post
βDark Herringβ Billing Malware Swims onto 105M Android Devices
The mobile malware heisted hundreds of millions of dollars from unsuspecting users, thanks to 470 different well-crafted malicious app in Google Play.
π’ Dark Souls servers taken offline after RCE flaw identified π’
π Read
via "ITPro".
Experts say PowerShell scripts could have been launched on other players' machines as a resultπ Read
via "ITPro".
IT PRO
Dark Souls servers taken offline after RCE flaw identified | IT PRO
Experts say PowerShell scripts could have been launched on other players' machines as a result
π’ DDoS attacks are still a key weapon for corporate extortion π’
π Read
via "ITPro".
Ransomware isnβt the only rotten fruit, with DDoS attacks deployed both as an extra twist of the knife β and on their ownπ Read
via "ITPro".
IT PRO
DDoS attacks are still a key weapon for corporate extortion | IT PRO
Ransomware isnβt the only rotten fruit, with DDoS attacks deployed both as an extra twist of the knife β and on their own
π’ UK's first government cyber strategy aims to bolster public sector defences π’
π Read
via "ITPro".
The NCSC found that almost half of all cyber incidents recorded between 2020 and 2021 were aimed at the public sectorπ Read
via "ITPro".
IT PRO
UK's first government cyber strategy aims to bolster public sector defences | IT PRO
The NCSC found that almost half of all cyber incidents recorded between 2020 and 2021 were aimed at the public sector
π’ Microsoft warns of phishing campaign targeting OAuth tokens π’
π Read
via "ITPro".
The attack, which gives hackers persistent access to email accounts, has targeted hundreds of organizationsπ Read
via "ITPro".
ITPro
Microsoft warns of phishing campaign targeting OAuth tokens
The attack, which gives hackers persistent access to email accounts, has targeted hundreds of organizations
π’ IT Pro Podcast: Learning to live with risk π’
π Read
via "ITPro".
Taking shortcuts is part of human nature, but it doesnβt have to be a threat to your businessπ Read
via "ITPro".
IT PRO
IT Pro Podcast Special Edition: Learning to live with risk | IT PRO
Taking shortcuts is part of human nature, but it doesnβt have to be a threat to your business
π’ Belarusian hacktivists target railway in bid to halt Russian military π’
π Read
via "ITPro".
The incident is thought to be one of the first times ransomware has been used in hacktivismπ Read
via "ITPro".
IT PRO
Belarusian hacktivists target railway in bid to halt Russian military | IT PRO
The incident is thought to be one of the first times ransomware has been used in hacktivism
β Apple Fixes 2 Zero-Day Security Bugs, One Exploited in the Wild β
π Read
via "Threat Post".
iOS 15.3 & iPadOS 15.3 fix the Safari browser flaw that could have spilled usersβ browsing data, plus a zero day IOMobileFrameBuffer bug exploited in the wild.π Read
via "Threat Post".
Threat Post
Apple Fixes 2 Zero-Day Security Bugs, One Exploited in the Wild
iOS 15.3 & iPadOS 15.3 fix the Safari browser flaw that could have spilled usersβ browsing data, plus a zero day IOMobileFrameBuffer bug exploited in the wild.
π΄ OMB Issues Zero-Trust Strategy for Federal Agencies π΄
π Read
via "Dark Reading".
Federal officials tout the strategy as a more proactive approach to securing government networks.π Read
via "Dark Reading".
Dark Reading
OMB Issues Zero-Trust Strategy for Federal Agencies
Federal officials tout the strategy as a more proactive approach to securing government networks.
β TrickBot Crashes Security Researchersβ Browsers in Latest Upgrade β
π Read
via "Threat Post".
The malware has added an anti-debugging tool that crashes browser tabs when researchers use code beautifying for analysis.π Read
via "Threat Post".
Threat Post
TrickBot Crashes Security Researchersβ Browsers in Latest Upgrade
The malware has added an anti-debugging tool that crashes browser tabs when researchers use code beautifying for analysis.
βΌ CVE-2021-32849 βΌ
π Read
via "National Vulnerability Database".
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32840 βΌ
π Read
via "National Vulnerability Database".
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32841 βΌ
π Read
via "National Vulnerability Database".
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23967 βΌ
π Read
via "National Vulnerability Database".
In TightVNC 1.3.10, there is an integer signedness error and resultant heap-based buffer overflow in InitialiseRFBConnection in rfbproto.c (for the vncviewer component). There is no check on the size given to malloc, e.g., -1 is accepted. This allocates a chunk of size zero, which will give a heap pointer. However, one can send 0xffffffff bytes of data, which can have a DoS impact or lead to remote code execution.π Read
via "National Vulnerability Database".