βΌ CVE-2022-0660 βΌ
π Read
via "National Vulnerability Database".
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.π Read
via "National Vulnerability Database".
β Iranian State Broadcaster Clobbered by βClumsy, Buggyβ Code β
π Read
via "Threat Post".
Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of Iranβs Supreme Leader was a clumsy and unsophisticated wiper attack.π Read
via "Threat Post".
Threat Post
Iranian State Broadcaster Clobbered by βClumsy, Buggyβ Code
Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of Iranβs Supreme Leader was a clumsy and unsophisticated wiper attack.
β Severe WordPress Plug-In UpdraftPlus Bug Threatens Backups β
π Read
via "Threat Post".
An oversight in a WordPress plug-in exposes PII and authentication data to malicious insiders.π Read
via "Threat Post".
Threat Post
Severe WordPress Plug-In UpdraftPlus Bug Threatens Backups
An oversight in a WordPress plug-in exposes PII and authentication data to malicious insiders.
ποΈ Critical vulnerabilities in Zabbix Web Frontend allow authentication bypass, code execution on servers ποΈ
π Read
via "The Daily Swig".
Patch now to protect, say researchersπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Critical vulnerabilities in Zabbix Web Frontend allow authentication bypass, code execution on servers
Patch now to protect, say researchers
π΄ If the Cloud Is More Secure, Then Why Is Everything Still Broken? π΄
π Read
via "Dark Reading".
The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.π Read
via "Dark Reading".
Dark Reading
If the Cloud Is More Secure, Then Why Is Everything Still Broken?
The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.
π΄ Ransomware Adds New Wrinkle in Russian Cybercrime Market π΄
π Read
via "Dark Reading".
Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.π Read
via "Dark Reading".
Dark Reading
Ransomware Adds New Wrinkle in Russian Cybercrime Market
Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.
βΌ CVE-2022-0664 βΌ
π Read
via "National Vulnerability Database".
Use of Hard-coded Cryptographic Key in Go github.com/gravitl/netmaker prior to 0.8.5,0.9.4,0.10.0,0.10.1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25299 βΌ
π Read
via "National Vulnerability Database".
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25298 βΌ
π Read
via "National Vulnerability Database".
This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0451 βΌ
π Read
via "National Vulnerability Database".
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46372 βΌ
π Read
via "National Vulnerability Database".
Scoold 1.47.2 is a Q&A/knowledge base platform written in Java. When writing a Q&A, the markdown editor is vulnerable to a XSS attack when using uppercase letters.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0631 βΌ
π Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.π Read
via "National Vulnerability Database".
β S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript] β
π Read
via "Naked Security".
Latest episode - listen and learn!π Read
via "Naked Security".
Naked Security
S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript]
Latest episode β listen and learn!
π΄ Enterprises Look Beyond Antivirus Software for Remote Workers π΄
π Read
via "Dark Reading".
Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.π Read
via "Dark Reading".
Dark Reading
Enterprises Look Beyond Antivirus Software for Remote Workers
Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.
β New Critical RCE Bug Found in Adobe Commerce, Magento β
π Read
via "Threat Post".
Adobe updated its recent out-of-band security advisory to add another critical bug, while researchers put out a PoC for the one it emergency-fixed last weekend.π Read
via "Threat Post".
Threat Post
New Critical RCE Bug Found in Adobe Commerce, Magento
Adobe updated its recent out-of-band security advisory to add another critical bug, while researchers put out a PoC for the one it emergency-fixed last weekend.
βΌ CVE-2022-0666 βΌ
π Read
via "National Vulnerability Database".
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23647 βΌ
π Read
via "National Vulnerability Database".
Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.π Read
via "National Vulnerability Database".
ποΈ Red Cross servers βwere hacked via unpatched ManageEngine flawβ ποΈ
π Read
via "The Daily Swig".
Humanitarian organization failed to apply fix rolled out a couple of months earlierπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Red Cross servers βwere hacked via unpatched ManageEngine flawβ
Humanitarian organization failed to apply fix rolled out a couple of months earlier
β Irony alert! PHP fixes security flaw in input validation code β
π Read
via "Naked Security".
What's wrong with this sequence? 1. Step into the road 2. Check if it's safe 3. Keep on walki...π Read
via "Naked Security".
Naked Security
Irony alert! PHP fixes security flaw in input validation code
Whatβs wrong with this sequence? 1. Step into the road 2. Check if itβs safe 3. Keep on walkiβ¦
π΄ Free Cybersecurity Tools and Services List Published by CISA π΄
π Read
via "Dark Reading".
The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.π Read
via "Dark Reading".
Dark Reading
Free Cybersecurity Tools and Services List Published by CISA
The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.
π΄ Why You Need An Adversary-First Approach to Threats in the Cloud π΄
π Read
via "Dark Reading".
Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.π Read
via "Dark Reading".
Dark Reading
Why You Need An Adversary-First Approach to Threats in the Cloud
Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.