βΌ CVE-2022-27240 βΌ
π Read
via "National Vulnerability Database".
scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a buffer overflow associated with a webauthn assertion.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45966 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Pascom Cloud Phone System before 7.20.x. In the management REST API, /services/apply in exd.pl allows remote attackers to execute arbitrary code via shell metacharacters.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45967 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Pascom Cloud Phone System before 7.20.x. A configuration error between NGINX and a backend Tomcat server leads to a path traversal in the Tomcat server, exposing unintended endpoints.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45868 βΌ
π Read
via "National Vulnerability Database".
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45968 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in xmppserver jar in the XMPP Server component of the JIve platform, as used in Pascom Cloud Phone System before 7.20.x (and in other products). An endpoint in the backend Tomcat server of the Pascom allows SSRF, a related issue to CVE-2019-18394.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27191 βΌ
π Read
via "National Vulnerability Database".
golang.org/x/crypto/ssh before 0.0.0-20220314234659-1baeb1ce4c0b in Go through 1.16.15 and 1.17.x through 1.17.8 allows an attacker to crash a server in certain circumstances involving AddHostKey.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22571 βΌ
π Read
via "National Vulnerability Database".
A local attacker could read files from some other users' SA360 reports stored in the /tmp folder during staging process before the files are loaded in BigQuery. We recommend upgrading to version 1.0.3 or above.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2021-45834 βΌ
π Read
via "National Vulnerability Database".
An attacker can upload or transfer files of dangerous types to the OpenDocMan 1.4.4 portal via add.php using MIME-bypass, which may be automatically processed within the product's environment or lead to arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45835 βΌ
π Read
via "National Vulnerability Database".
The Online Admission System 1.0 allows an unauthenticated attacker to upload or transfer files of dangerous types to the application through documents.php, which may be used to execute malicious code or lead to code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24655 βΌ
π Read
via "National Vulnerability Database".
A stack overflow vulnerability exists in the upnpd service in Netgear EX6100v1 201.0.2.28, CAX80 2.1.2.6, and DC112A 1.0.0.62, which may lead to the execution of arbitrary code without authentication.π Read
via "National Vulnerability Database".
π€1
π΄ The Road Ahead for Cyber and Infrastructure Security π΄
π Read
via "Dark Reading".
Despite cost, it's time to focus on securing legacy systems and physical infrastructure along with digital systems.π Read
via "Dark Reading".
Dark Reading
The Road Ahead for Cyber and Infrastructure Security
Despite cost, it's time to focus on securing legacy systems and physical infrastructure along with digital systems.
π1
βΌ CVE-2022-24595 βΌ
π Read
via "National Vulnerability Database".
Automotive Grade Linux Kooky Koi 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, and 11.0.5 is affected by Incorrect Access Control in usr/bin/afb-daemon. To exploit the vulnerability, an attacker should send a well-crafted HTTP (or WebSocket) request to the socket listened by the afb-daemon process. No credentials nor user interactions are required.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0742 βΌ
π Read
via "National Vulnerability Database".
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.π Read
via "National Vulnerability Database".
β Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops β
π Read
via "Threat Post".
Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizationsβ networks for further malicious activity.π Read
via "Threat Post".
Threat Post
Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops
Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizationsβ networks for further malicious activity.
ποΈ Workaround offered for unpatched HTML-to-PDF rendering vulnerability ποΈ
π Read
via "The Daily Swig".
Security flaws exposed in popular dompdf PHP libraryπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Workaround offered for unpatched HTML-to-PDF rendering vulnerability
Security flaws exposed in popular dompdf PHP library
π1
βΌ CVE-2022-24772 βΌ
π Read
via "National Vulnerability Database".
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-24771 βΌ
π Read
via "National Vulnerability Database".
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24773 βΌ
π Read
via "National Vulnerability Database".
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.π Read
via "National Vulnerability Database".
π1
π΄ Satellite Networks Worldwide at Risk of Possible Cyberattacks, FBI & CISA Warn π΄
π Read
via "Dark Reading".
Agencies provide mitigation steps to protect satellite communication (SATCOM) networks amid "current geopolitical situation."π Read
via "Dark Reading".
Dark Reading
Satellite Networks Worldwide at Risk of Possible Cyberattacks, FBI & CISA Warn
Agencies provide mitigation steps to protect satellite communication (SATCOM) networks amid "current geopolitical situation."
β Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet β
π Read
via "Threat Post".
The Russian-speaking APT behind the NotPetya attacks and the Ukrainian power grid takedown could be setting up for additional sinister attacks, researchers said.π Read
via "Threat Post".
Threat Post
Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet
The Russian-speaking APT behind the NotPetya attacks and the Ukrainian power grid takedown could be setting up for additional sinister attacks, researchers said.
β S3 Ep74: Cybercrime busts, Apple patches, Pi Day, and disconnect effects [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep74: Cybercrime busts, Apple patches, Pi Day, and disconnect effects [Podcast]
Latest episode β listen now!