βΌ CVE-2022-26356 βΌ
π Read
via "National Vulnerability Database".
Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.π Read
via "National Vulnerability Database".
ποΈ Trend Micro warns of active attacks against Apex Central console ποΈ
π Read
via "The Daily Swig".
Scramble to patch security dashboardπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Trend Micro warns of active attacks against Apex Central console
Scramble to patch security dashboard
β Googleβs monthly Android updates patch numerous βget rootβ holes β
π Read
via "Naked Security".
Get the update now... if it's available for your phone. Here's how to check.π Read
via "Naked Security".
Naked Security
Googleβs monthly Android updates patch numerous βget rootβ holes
Get the update nowβ¦ if itβs available for your phone. Hereβs how to check.
ποΈ US government launches Bureau of Cyberspace and Digital Policy to enhance cybersecurity across nation ποΈ
π Read
via "The Daily Swig".
Department will be tasked with addressing the security challenges and opportunities associated with cyberspaceπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
US government launches Bureau of Cyberspace and Digital Policy to enhance cybersecurity across nation
Department will be tasked with addressing the security challenges and opportunities associated with cyberspace
β Firefox 99 is out β no major bugs, but update anyway! β
π Read
via "Naked Security".
Firefox's four-weekly updates just dropped - here's what you need to know.π Read
via "Naked Security".
Naked Security
Firefox 99 is out β no major bugs, but update anyway!
Firefoxβs four-weekly updates just dropped β hereβs what you need to know.
βΌ CVE-2022-26982 βΌ
π Read
via "National Vulnerability Database".
SimpleMachinesForum 2.1.1 and earlier allows remote authenticated administrators to execute arbitrary code by inserting a vulnerable php code because the themes can be modified by an administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26986 βΌ
π Read
via "National Vulnerability Database".
SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41245 βΌ
π Read
via "National Vulnerability Database".
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, CSRF tokens generated by `privUITransactionFile` aren't properly checked. Versions 2.7.6 and 3.0.0 contain a patch for this issue. As a workaround, use the session implementation by adding in the iTop config file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1243 βΌ
π Read
via "National Vulnerability Database".
CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.π Read
via "National Vulnerability Database".
π΄ What We Can Learn From Lapsus$ Techniques π΄
π Read
via "Dark Reading".
The group is targeting the biggest weak spot in most security postures: finding anomalous behavior by authorized entities.π Read
via "Dark Reading".
Dark Reading
What We Can Learn From Lapsus$ Techniques
The group is targeting the biggest weak spot in most security postures: finding anomalous behavior by authorized entities.
π΄ Name That Edge Toon: In Deep Water π΄
π Read
via "Dark Reading".
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading".
Dark Reading
Name That Edge Toon: In Deep Water
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
π΄ How IP Data Can Help Security Professionals Protect Their Networks π΄
π Read
via "Dark Reading".
Beefing up security requires a combination of forensic efforts and proactive mitigation. IP context aids both.π Read
via "Dark Reading".
Dark Reading
How IP Data Can Help Security Professionals Protect Their Networks
Beefing up security requires a combination of forensic efforts and proactive mitigation. IP context aids both.
β Authorities Fully Behead Hydra Dark Marketplace β
π Read
via "Threat Post".
The popular underground market traded in drugs, stolen data, forged documents and more -- raking in billions in Bitcoin.π Read
via "Threat Post".
Threat Post
Authorities Fully Behead Hydra Dark Marketplace
The popular underground market traded in drugs, stolen data, forged documents and more β raking in billions in Bitcoin.
βΌ CVE-2020-23349 βΌ
π Read
via "National Vulnerability Database".
An intent redirection issue was doscovered in Sina Weibo Android SDK 4.2.7 (com.sina.weibo.sdk.share.WbShareTransActivity), any unexported Activities could be started by the com.sina.weibo.sdk.share.WbShareTransActivity.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28847 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19229 βΌ
π Read
via "National Vulnerability Database".
Jeesite 1.2.7 uses the apache shiro version 1.2.3 affected by CVE-2016-4437. Because of this version of the java deserialization vulnerability, an attacker could exploit the vulnerability to execute arbitrary commands via the rememberMe parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26635 βΌ
π Read
via "National Vulnerability Database".
PHP-Memcached v2.2.0 and below contains an improper NULL termination which allows attackers to execute CLRF injection.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41751 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow vulnerability in file ecma-builtin-array-prototype.c:909 in function ecma_builtin_array_prototype_object_slice in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24795 βΌ
π Read
via "National Vulnerability Database".
yajl-riuby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of yajl contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution to be unlikely. A patch is available and anticipated to be part of version 1.4.2. As a workaround, avoid passing large inputs to YAJL.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22355 βΌ
π Read
via "National Vulnerability Database".
IBM MQ Appliance 9.2 CD and 9.2 LTS are vulnerable to a denial of service in the Login component of the application which could allow an attacker to cause a drop in performance.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27463 βΌ
π Read
via "National Vulnerability Database".
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.π Read
via "National Vulnerability Database".