π΄ IT Pros May Use Cloud, But They Trust On-Prem More π΄
π Read
via "Dark Reading".
While opinions about the trustworthiness of the cloud are split, everyone believes that's where hackers will focus their efforts.π Read
via "Dark Reading".
Dark Reading
IT Pros May Use Cloud, But They Trust On-Prem More
While opinions about the trustworthiness of the cloud are split, everyone believes that's where hackers will focus their efforts.
βΌ CVE-2022-21722 βΌ
π Read
via "National Vulnerability Database".
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41166 βΌ
π Read
via "National Vulnerability Database".
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. An issue in versions prior to 3.17.1 may lead to sensitive information disclosure. An unauthorized app that does not have the otherwise required `MANAGE_DOCUMENTS` permission may view image thumbnails for images it does not have permission to view. Version 3.17.1 contains a patch. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21723 βΌ
π Read
via "National Vulnerability Database".
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0370 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22828 βΌ
π Read
via "National Vulnerability Database".
An insecure direct object reference for the file-download URL in Synametrics SynaMan before 5.0 allows a remote attacker to access unshared files via a modified base64-encoded filename string.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0387 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0372 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in Packagist bytefury/crater prior to 6.0.2.π Read
via "National Vulnerability Database".
β How to Secure Your SaaS Stack with a SaaS Security Posture Management Solution β
π Read
via "Threat Post".
SaaS Security Posture Management (SSPM) named a must have solution by Gartner. Adaptive Shields SSPM solution allows security teams full visibility and control.π Read
via "Threat Post".
Threat Post
How to Secure Your SaaS Stack with a SaaS Security Posture Management Solution
SaaS Security Posture Management (SSPM) named a must have solution by Gartner. Adaptive Shields SSPM solution allows security teams full visibility and control.
ποΈ DeepDotWeb administrator gets eight-year stretch in US prison for money laundering ποΈ
π Read
via "The Daily Swig".
Tal Prihar pleaded guilty to his role in darknet kickback scheme last yearπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
DeepDotWeb administrator gets eight-year stretch in US prison for money laundering
Tal Prihar pleaded guilty to his role in darknet kickback scheme last year
β βPwnKitβ security bug gets you root on most Linux distros β what to do β
π Read
via "Naked Security".
An elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shellπ Read
via "Naked Security".
Naked Security
βPwnKitβ security bug gets you root on most Linux distros β what to do
An elevation of privilege bug that could let a βmostly harmlessβ user give themselves a instant root shell
β Apple patches Safari data leak (oh, and a zero-day) β patch now! β
π Read
via "Naked Security".
That infamous "supercookie" bug in Safari has now been fixed. Oh, and there was a zero-day kernel hole as well.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
ποΈ Solarwinds fixes code execution bug in enterprise helpdesk software ποΈ
π Read
via "The Daily Swig".
Exploit gave attackers access to corporate databases, although local access was requiredπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Solarwinds fixes code execution bug in enterprise helpdesk software
Exploit gave attackers access to corporate databases, although local access was required
β Shipment-Delivery Scams a Fav Way to Spread Malware β
π Read
via "Threat Post".
Attackers increasingly are spoofing the courier DHL and using socially engineered messages related to packages to trick users into downloading Trickbot and other malicious payloads.π Read
via "Threat Post".
Threat Post
Shipment-Delivery Scams Become the Favored Way to Spread Malware
Attackers increasingly are spoofing the courier DHL and using socially engineered messages related to packages to trick users into downloading Trickbot and other malicious payloads.
π American Fuzzy Lop plus plus 4.00c π
π Read
via "Packet Storm Security".
Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.π Read
via "Packet Storm Security".
Packetstormsecurity
American Fuzzy Lop plus plus 4.00c β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Zeek 4.2.0 π
π Read
via "Packet Storm Security".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Zeek 4.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2021-44795 βΌ
π Read
via "National Vulnerability Database".
Single Connect does not perform an authorization check when using the "sc-assigned-credential-ui" module. A remote attacker could exploit this vulnerability to modify users permissions. The exploitation of this vulnerability might allow a remote attacker to delete permissions from other users without authenticating.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28096 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Stormshield SNS before 4.2.3 (when the proxy is used). An attacker can saturate the proxy connection table. This would result in the proxy denying any new connections.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44794 βΌ
π Read
via "National Vulnerability Database".
Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23181 βΌ
π Read
via "National Vulnerability Database".
The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44793 βΌ
π Read
via "National Vulnerability Database".
Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.π Read
via "National Vulnerability Database".