π΄ Identifying a Vulnerability in the SAP Software Supply Chain π΄
π Read
via "Dark Reading".
Make sure you're using the patch to block this supply chain attack.π Read
via "Dark Reading".
Darkreading
Identifying a Vulnerability in the SAP Software Supply Chain
Make sure you're using the patch to block this supply chain attack.
β Hospital robot system gets five critical security holes patched β
π Read
via "Naked Security".
Fortunately, we're not talking about a robot revolution, or about hospital AI run amuck. But these bugs could lead to ransomware, or worse...π Read
via "Naked Security".
Naked Security
Hospital robot system gets five critical security holes patched
Fortunately, weβre not talking about a robot revolution, or about hospital AI run amuck. But these bugs could lead to ransomware, or worseβ¦
ποΈ Git security vulnerabilities prompt updates ποΈ
π Read
via "The Daily Swig".
Windows users at highest risk from security bugs in software development toolπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Git security vulnerabilities prompt updates
Windows users at highest risk from security bugs in software development tool
β Feds Shut Down RaidForums Hacking Marketplace β
π Read
via "Threat Post".
The DoJ is charging its founder, 21-year-old Portuguese citizen Diogo Santos Coelho, on six criminal counts, including conspiracy, access device fraud and aggravated identity theft.π Read
via "Threat Post".
Threat Post
Feds Shut Down RaidForums Hacking Marketplace
The DoJ is charging its founder, 21-year-old Portuguese citizen Diogo Santos Coelho, on six criminal counts, including conspiracy, access device fraud and aggravated identity theft.
βοΈ Microsoft Patch Tuesday, April 2022 Edition βοΈ
π Read
via "Krebs on Security".
Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, according to a report from the U.S. National Security Agency (NSA).π Read
via "Krebs on Security".
Krebsonsecurity
Microsoft Patch Tuesday, April 2022 Edition
Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, accordingβ¦
βΌ CVE-2022-28052 βΌ
π Read
via "National Vulnerability Database".
Directory Traversal vulnerability in file cn/roothub/store/FileSystemStorageService in function store in Roothub 2.6.0 allows remote attackers with low privlege to arbitrarily upload files via /common/upload API, which could lead to remote arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46167 βΌ
π Read
via "National Vulnerability Database".
An access control issue in the authentication module of wizplat PD065 v1.19 allows attackers to access sensitive data and cause a Denial of Service (DoS).π Read
via "National Vulnerability Database".
βΌ CVE-2022-26144 βΌ
π Read
via "National Vulnerability Database".
An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43741 βΌ
π Read
via "National Vulnerability Database".
CMSimple 5.4 is vulnerable to Directory Traversal. The vulnerability exists when a user changes the file name to malicious file on config.php leading to remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27256 βΌ
π Read
via "National Vulnerability Database".
An open redirect vulnerability in Hubzilla before version 7.2 allows remote attackers to redirect a logged in user to an arbitrary URL via the rpath parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26643 βΌ
π Read
via "National Vulnerability Database".
An issue in EasyIO CPT Graphics v0.8 allows attackers to discover valid users in the application.π Read
via "National Vulnerability Database".
β US cryptocurrency coder gets 5 years for North Korea sanctions busting β
π Read
via "Naked Security".
Cryptocurrency expert didn't take "No" for an answer when the US authorities said he couldn't pursue cryptocoin opps in North Korea.π Read
via "Naked Security".
Naked Security
US cryptocurrency coder gets 5 years for North Korea sanctions busting
Cryptocurrency expert didnβt take βNoβ for an answer when the US authorities said he couldnβt pursue cryptocoin opps in North Korea.
βΌ CVE-2021-22795 βΌ
π Read
via "National Vulnerability Database".
A CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote code execution when performed over the network. Affected Product: StruxureWare Data Center Expert (V7.8.1 and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2021-22794 βΌ
π Read
via "National Vulnerability Database".
A CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause remote code execution. Affected Product: StruxureWare Data Center Expert (V7.8.1 and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2019-6834 βΌ
π Read
via "National Vulnerability Database".
A CWE-502: Deserialization of Untrusted Data vulnerability exists which could allow an attacker to execute arbitrary code on the targeted system with SYSTEM privileges when placing a malicious user to be authenticated for this vulnerability to be successfully exploited. Affected Product: Schneider Electric Software Update (SESU) SUT Service component (V2.1.1 to V2.3.0)π Read
via "National Vulnerability Database".
βΌ CVE-2022-0221 βΌ
π Read
via "National Vulnerability Database".
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could result in information disclosure when opening a malicious solution file provided by an attacker with SCADAPack Workbench. This could be exploited to pass data from local files to a remote system controlled by an attacker. Affected Product: SCADAPack Workbench (6.6.8a and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2015-20107 βΌ
π Read
via "National Vulnerability Database".
In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments).π Read
via "National Vulnerability Database".
βΌ CVE-2021-42136 βΌ
π Read
via "National Vulnerability Database".
A stored Cross-Site Scripting (XSS) vulnerability in the Missing Data Codes Functionality of REDCap 11.2.5 allows remote attackers to execute JavaScript code in the client's browser by storing said code as a Missing Data Code value. This can then be leveraged to execute a Cross-Site Request Forgery attack to escalate privileges to administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22797 βΌ
π Read
via "National Vulnerability Database".
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) vulnerability exists that could cause malicious script to be deployed in an unauthorized location and may result in code execution on the engineering workstation when a malicious project file is loaded in the engineering software. Affected Product: EcoStruxure Control Expert (V15.0 SP1 and prior, including former Unity Pro), EcoStruxure Process Expert (2020 and prior, including former HDCS), SCADAPack RemoteConnect for x70 (All versions)π Read
via "National Vulnerability Database".
π΄ Securing the Stopgap: Controlling Access to SaaS Applications π΄
π Read
via "Dark Reading".
If enterprises continue to use emergency measures as long-term solutions, they must protect their IT estate.π Read
via "Dark Reading".
Darkreading
Securing the Stopgap: Controlling Access to SaaS Applications
If enterprises continue to use emergency measures as long-term solutions, they must protect their IT estate.
π΄ KKR to Acquire Barracuda Networks π΄
π Read
via "Dark Reading".
The transaction is anticipated to close by the end of the year.π Read
via "Dark Reading".
Dark Reading
KKR to Acquire Barracuda Networks
The transaction is anticipated to close by the end of the year.