π΄ ByteChek Founder AJ Yawn Brings Discipline to Everything He Does π΄
π Read
via "Dark Reading".
Security Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less."π Read
via "Dark Reading".
Dark Reading
ByteChek Founder AJ Yawn Brings Discipline to Everything He Does
Security Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less."
β S3 Ep77: Bugs, busts and old-school PDP-11 hacking [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now! Cybersecurity news and advice in plain English.π Read
via "Naked Security".
Naked Security
S3 Ep77: Bugs, busts and old-school PDP-11 hacking [Podcast]
Latest episode β listen now! Cybersecurity news and advice in plain English.
β Popular Ruby Asciidoc toolkit patched against critical vuln β get the update now! β
π Read
via "Naked Security".
A rogue line-continuation character can trick the code into validating just the second half of the line, but executing all of it.π Read
via "Naked Security".
Naked Security
Popular Ruby Asciidoc toolkit patched against critical vuln β get the update now!
A rogue line-continuation character can trick the code into validating just the second half of the line, but executing all of it.
β Google Play Bitten by Sharkbot Info-stealer βAV Solutionβ β
π Read
via "Threat Post".
Google removed six different malicious Android applications targeting mainly users in the U.K. and Italy that were installed about 15,000 times.π Read
via "Threat Post".
Threat Post
Google Play Bitten by Sharkbot Info-stealer βAV Solutionβ
Google removed six different malicious Android applications targeting mainly users in the U.K. and Italy that were installed about 15,000 times.
βΌ CVE-2021-41715 βΌ
π Read
via "National Vulnerability Database".
libsixel 1.10.0 is vulnerable to Use after free in libsixel/src/dither.c:379.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27044 βΌ
π Read
via "National Vulnerability Database".
libsixel 1.8.6 is affected by Buffer Overflow in libsixel/src/quant.c:876.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27046 βΌ
π Read
via "National Vulnerability Database".
libsixel 1.8.6 suffers from a Heap Use After Free vulnerability in in libsixel/src/dither.c:388.π Read
via "National Vulnerability Database".
π OpenSSH 9.0p1 π
π Read
via "Packet Storm Security".
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.π Read
via "Packet Storm Security".
Packetstormsecurity
OpenSSH 9.0p1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π1
βΌ CVE-2021-40656 βΌ
π Read
via "National Vulnerability Database".
libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22339 βΌ
π Read
via "National Vulnerability Database".
IBM Planning Analytics 2.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 219736.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27148 βΌ
π Read
via "National Vulnerability Database".
GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integer Overflow.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27147 βΌ
π Read
via "National Vulnerability Database".
GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a use-after-free vulnerability in function gf_node_get_attribute_by_tag.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27047 βΌ
π Read
via "National Vulnerability Database".
mogu_blog_cms 5.2 suffers from upload arbitrary files without any limitation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27146 βΌ
π Read
via "National Vulnerability Database".
GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a heap-buffer-overflow vulnerability in function gf_isom_apple_enum_tag.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4668 βΌ
π Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.3, and 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186283.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2021-43521 βΌ
π Read
via "National Vulnerability Database".
A Buffer Overflow vulnerability exists in zlog 1.2.15 via zlog_conf_build_with_file in src/zlog/src/conf.c.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43515 βΌ
π Read
via "National Vulnerability Database".
A CSV Injection vulnerablity exists in Kimai Kimai 2 > 1.14 via a description in a new timesheet.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43483 βΌ
π Read
via "National Vulnerability Database".
An Access Control vulnerability exists in CLARO KAON CG3000 1.00.67 in the router configuration, which could allow a malicious user to read or update the configuraiton without authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27145 βΌ
π Read
via "National Vulnerability Database".
GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a stack-overflow vulnerability in function gf_isom_get_sample_for_movie_time of mp4box.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43517 βΌ
π Read
via "National Vulnerability Database".
FOSCAM Camera FI9805E with firmware V4.02.R12.00018510.10012.143900.00000 contains a backdoor that opens Telnet port when special command is sent on port 9530.π Read
via "National Vulnerability Database".
π΄ Software-as-a-Service Rules the Cloud π΄
π Read
via "Dark Reading".
Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.π Read
via "Dark Reading".
Dark Reading
Software-as-a-Service Rules the Cloud
Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
π1