βΌ CVE-2022-24124 βΌ
π Read
via "National Vulnerability Database".
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0273 βΌ
π Read
via "National Vulnerability Database".
Improper Access Control in Pypi calibreweb prior to 0.6.16.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0339 βΌ
π Read
via "National Vulnerability Database".
Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.π Read
via "National Vulnerability Database".
π₯1
βΌ CVE-2022-0407 βΌ
π Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in Conda vim prior to 8.2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0408 βΌ
π Read
via "National Vulnerability Database".
Stack-based Buffer Overflow in Conda vim prior to 8.2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0413 βΌ
π Read
via "National Vulnerability Database".
Use After Free in Conda vim prior to 8.2.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23520 βΌ
π Read
via "National Vulnerability Database".
The package juce-framework/juce before 6.1.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) via the ZipFile::uncompressEntry function in juce_ZipFile.cpp. This vulnerability is triggered when the archive is extracted upon calling uncompressTo() on a ZipFile object.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0414 βΌ
π Read
via "National Vulnerability Database".
Business Logic Errors in Packagist dolibarr/dolibarr prior to 16.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23521 βΌ
π Read
via "National Vulnerability Database".
This affects the package juce-framework/JUCE before 6.1.5. This vulnerability is triggered when a malicious archive is crafted with an entry containing a symbolic link. When extracted, the symbolic link is followed outside of the target dir allowing writing arbitrary files on the target host. In some cases, this can allow an attacker to execute arbitrary code. The vulnerable code is in the ZipFile::uncompressEntry function in juce_ZipFile.cpp and is executed when the archive is extracted upon calling uncompressTo() on a ZipFile object.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44255 βΌ
π Read
via "National Vulnerability Database".
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.π Read
via "National Vulnerability Database".
π΄ The Looming CISO Mental Health Crisis β and What to Do About It, Part 2 π΄
π Read
via "Dark Reading".
Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.π Read
via "Dark Reading".
Dark Reading
The Looming CISO Mental Health Crisis β and What to Do About It, Part 2
Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.
ποΈ No smoke without fire? βCriticalβ Loguru security flaw turns out to be non-issue ποΈ
π Read
via "The Daily Swig".
Invalid CVE saga highlights potential problems in the automated vulnerability alert processπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
No smoke without fire? βCriticalβ Loguru security flaw turns out to be non-issue
Invalid CVE saga highlights potential problems in the automated vulnerability alert process
π΄ Crypto Agility: Solving for the Inevitable π΄
π Read
via "Dark Reading".
The advent of viable quantum computers will threaten todayβs encryption standards, which are the basis of Internet security. Cryptographic agility is the key to post-quantum computing security, although implementing it will be a formidable challenge.π Read
via "Dark Reading".
Dark Reading
Crypto Agility: Solving for the Inevitable
The advent of viable quantum computers will threaten todayβs encryption standards, which are the basis of Internet security. Cryptographic agility is the key to post-quantum computing security, although implementing it will be a formidable challenge.
βΌ CVE-2021-28962 βΌ
π Read
via "National Vulnerability Database".
Stormshield Network Security (SNS) before 4.2.2 allows a read-only administrator to gain privileges via CLI commands.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46101 βΌ
π Read
via "National Vulnerability Database".
In Git for windows through 2.34.1 when using git pull to update the local warehouse, git.cmd can be run directly.π Read
via "National Vulnerability Database".
βΌ CVE-2020-36056 βΌ
π Read
via "National Vulnerability Database".
Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option.π Read
via "National Vulnerability Database".
βΌ CVE-2020-36064 βΌ
π Read
via "National Vulnerability Database".
Online Course Registration v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised.π Read
via "National Vulnerability Database".
π΄ The Zero Trust Timer Is on for Federal Agencies β How Ready Are They? π΄
π Read
via "Dark Reading".
A new study coincides with OMBβs finalization of its zero-trust strategy through 2024.π Read
via "Dark Reading".
Dark Reading
The Zero-Trust Timer Is on for Federal Agencies β How Ready Are They?
A new study coincides with OMBβs finalization of its zero-trust strategy through 2024.
π΄ 7 Privacy Tips for Security Pros π΄
π Read
via "Dark Reading".
How best to integrate privacy into your organization's security program.π Read
via "Dark Reading".
Dark Reading
7 Privacy Tips for Security Pros
How best to integrate privacy into your organization's security program.
ποΈ Bug Bounty Radar // The latest bug bounty programs for February 2022 ποΈ
π Read
via "The Daily Swig".
New web targets for the discerning hackerπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Bug Bounty Radar // The latest bug bounty programs for February 2022
New web targets for the discerning hacker
π OpenStego Free Steganography Solution 0.8.3 π
π Read
via "Packet Storm Security".
OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).π Read
via "Packet Storm Security".
Packetstormsecurity
OpenStego Free Steganography Solution 0.8.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers