‼ CVE-2022-27108 ‼
📖 Read
via "National Vulnerability Database".
OrangeHRM 4.10 is vulnerable to Insecure Direct Object Reference (IDOR) via the end point symfony/web/index.php/time/createTimesheet`. Any user can create a timesheet in another user's account.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24793 ‼
📖 Read
via "National Vulnerability Database".
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that uses PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27109 ‼
📖 Read
via "National Vulnerability Database".
OrangeHRM 4.10 suffers from a Referer header injection redirect vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27110 ‼
📖 Read
via "National Vulnerability Database".
OrangeHRM 4.10 is vulnerable to a Host header injection redirect via viewPersonalDetails endpoint.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27107 ‼
📖 Read
via "National Vulnerability Database".
OrangeHRM 4.10 is vulnerable to Stored XSS in the "Share Video" section under "OrangeBuzz" via the GET/POST "createVideo[linkAddress]" parameter📖 Read
via "National Vulnerability Database".
🕴 Linux Systems Are Becoming Bigger Targets 🕴
📖 Read
via "Dark Reading".
To prevent Linux exploits, organizations should establish an integrated security approach that extends to the network edge.📖 Read
via "Dark Reading".
Dark Reading
Linux Systems Are Becoming Bigger Targets
To prevent Linux exploits, organizations should establish an integrated security approach that extends to the network edge.
🕴 FBI-Led Operation Disrupts Russian GRU Botnet 🕴
📖 Read
via "Dark Reading".
"Cyclops Blink" operation disabled firewalls behind the Sandworm hacking team's network of infected victim devices.📖 Read
via "Dark Reading".
Dark Reading
FBI-Led Operation Disrupts Russian GRU Botnet
"Cyclops Blink" operation disabled firewalls behind the Sandworm hacking team's network of infected victim devices.
♟️ The Original APT: Advanced Persistent Teenagers ♟️
📖 Read
via "Krebs on Security".
Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual "smash and grab" attacks we've seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world's biggest corporations on edge.📖 Read
via "Krebs on Security".
Krebs on Security
The Original APT: Advanced Persistent Teenagers
Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach.…
‼ CVE-2021-32585 ‼
📖 Read
via "National Vulnerability Database".
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiWAN before 4.5.9 may allow an attacker to perform a stored cross-site scripting attack via specifically crafted HTTP requests.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26116 ‼
📖 Read
via "National Vulnerability Database".
An improper neutralization of special elements used in an OS command vulnerability in the command line interpreter of FortiAuthenticator before 6.3.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26113 ‼
📖 Read
via "National Vulnerability Database".
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-43138 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability exists in Async through 3.2.1 (fixed in 3.2.2) , which could let a malicious user obtain privileges via the mapValues() method.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-22127 ‼
📖 Read
via "National Vulnerability Database".
An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22410 ‼
📖 Read
via "National Vulnerability Database".
IBM Watson Query with Cloud Pak for Data as a Service could allow an authenticated user to obtain sensitive information that would allow them to examine or alter system configurations or data sources connected to the service. IBM X-Force ID: 222763.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26104 ‼
📖 Read
via "National Vulnerability Database".
Multiple OS command injection (CWE-78) vulnerabilities in the command line interface of FortiManager 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, FortiAnalyzer 6.2.7 and below, 6.4.5 and below and all versions of 6.2.x, 6.0.x and 5.6.x, and FortiPortal 5.2.5 and below, 5.3.5 and below and 6.0.4 and below may allow a local authenticated and unprivileged user to execute arbitrary shell commands as root via specifically crafted CLI command parameters.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41026 ‼
📖 Read
via "National Vulnerability Database".
A relative path traversal in FortiWeb versions 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow an authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.📖 Read
via "National Vulnerability Database".
🕴 How DevOps Automation Solves Low-Code Security Issues 🕴
📖 Read
via "Dark Reading".
Three essential automated DevOps tools can increase the rate of deployment success, reduce errors, raise ROI, and improve data security.📖 Read
via "Dark Reading".
Dark Reading
How DevOps Automation Solves Low-Code Security Issues
Three essential automated DevOps tools can increase the rate of deployment success, reduce errors, raise ROI, and improve data security.
‼ CVE-2022-20781 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20763 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20774 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20756 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the RADIUS feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by attempting to authenticate to a network or a service where the access server is using Cisco ISE as the RADIUS server. A successful exploit could allow the attacker to cause Cisco ISE to stop processing RADIUS requests, causing authentication/authorization timeouts, which would then result in legitimate requests being denied access. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) is required. See the Details section for more information.📖 Read
via "National Vulnerability Database".