‼ CVE-2022-21995 ‼
📖 Read
via "National Vulnerability Database".
Windows Hyper-V Remote Code Execution Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-21993 ‼
📖 Read
via "National Vulnerability Database".
Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23254 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Power BI Information Disclosure Vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-21844 ‼
📖 Read
via "National Vulnerability Database".
HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21926, CVE-2022-21927.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-21981 ‼
📖 Read
via "National Vulnerability Database".
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22000.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22712 ‼
📖 Read
via "National Vulnerability Database".
Windows Hyper-V Denial of Service Vulnerability.📖 Read
via "National Vulnerability Database".
🔏 Telecom Alleges Theft of Radio Technology Trade Secrets 🔏
📖 Read
via "".
New charges unsealed this week allege a China-based company stole valuable trade secrets – source code and hardware designs - over the course of 13 years.📖 Read
via "".
Digital Guardian
Telecom Alleges Theft of Radio Technology Trade Secrets
New charges unsealed this week allege a China-based company stole valuable trade secrets – source code and hardware designs - over the course of 13 years.
‼ CVE-2022-22566 ‼
📖 Read
via "National Vulnerability Database".
Select Dell Client Commercial and Consumer platforms contain a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41442 ‼
📖 Read
via "National Vulnerability Database".
An HTTP smuggling attack in the web application of D-Link DIR-X1860 before v1.10WWB09_Beta allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22567 ‼
📖 Read
via "National Vulnerability Database".
Select Dell Client Commercial and Consumer platforms are vulnerable to an insufficient verification of data authenticity vulnerability. An authenticated malicious user may exploit this vulnerability in order to install modified BIOS firmware.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36302 ‼
📖 Read
via "National Vulnerability Database".
All Dell EMC Integrated System for Microsoft Azure Stack Hub versions contain a privilege escalation vulnerability. A remote malicious user with standard level JEA credentials may potentially exploit this vulnerability to elevate privileges and take over the system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-21660 ‼
📖 Read
via "National Vulnerability Database".
Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45286 ‼
📖 Read
via "National Vulnerability Database".
Directory Traversal vulnerability exists in ZZCMS 2021 via the skin parameter in 1) index.php, 2) bottom.php, and 3) top_index.php.📖 Read
via "National Vulnerability Database".
❌ 3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I ❌
📖 Read
via "Threat Post".
Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.📖 Read
via "Threat Post".
Threat Post
3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I
Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.
❌ Cybercriminals Swarm Windows Utility Regsvr32 to Spread Malware ❌
📖 Read
via "Threat Post".
The living-off-the-land binary (LOLBin) is anchoring a rash of cyberattacks bent on evading security detection to drop Qbot and Lokibot.📖 Read
via "Threat Post".
Threat Post
Cybercriminals Swarm Windows Utility Regsvr32 to Spread Malware
The living-off-the-land binary (LOLBin) is anchoring a rash of cyberattacks bent on evading security detection to drop Qbot and Lokibot.
🕴 Linux Malware on the Rise 🕴
📖 Read
via "Dark Reading".
Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.📖 Read
via "Dark Reading".
Dark Reading
Linux Malware on the Rise
Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.
🕴 Auth0 Credential Guard Detects Breached Passwords to Prevent Account Takeover 🕴
📖 Read
via "Dark Reading".
New feature adds a dedicated security team and support for multiple languages to prevent fraudulent access with stolen credentials.📖 Read
via "Dark Reading".
Dark Reading
Auth0 Credential Guard Detects Breached Passwords to Prevent Account Takeover
New feature adds a dedicated security team and support for multiple languages to prevent fraudulent access with stolen credentials.
‼ CVE-2022-23621 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23628 ‼
📖 Read
via "National Vulnerability Database".
OPA is an open source, general-purpose policy engine. Under certain conditions, pretty-printing an abstract syntax tree (AST) that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths. **All of these** three conditions have to be met to create an adverse effect: 1. An AST of Rego had to be **created programmatically** such that it ends up containing terms without a location (such as wildcard variables). 2. The AST had to be **pretty-printed** using the `github.com/open-policy-agent/opa/format` package. 3. The result of the pretty-printing had to be **parsed and evaluated again** via an OPA instance using the bundles, or the Golang packages. If any of these three conditions are not met, you are not affected. Notably, all three would be true if using **optimized bundles**, i.e. bundles created with `opa build -O=1` or higher. In that case, the optimizer would fulfil condition (1.), the result of that would be pretty-printed when writing the bundle to disk, fulfilling (2.). When the bundle was then used, we'd satisfy (3.). As a workaround users may disable optimization when creating bundles.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23617 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23616 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for an unprivileged user to perform a remote code execution by injecting a groovy script in her own profile and by calling the Reset password feature since the feature is performing a save of the user profile with programming rights in the impacted versions of XWiki. The issue has been patched in XWiki 13.1RC1. There are two different possible workarounds, each consisting of modifying the XWiki/ResetPassword page. 1. The Reset password feature can be entirely disabled by deleting the XWiki/ResetPassword page. 2. The script in XWiki/ResetPassword can also be modified or removed: an administrator can replace it with a simple email contact to ask an administrator to reset the password.📖 Read
via "National Vulnerability Database".