π΄ How Industry Leaders Should Approach Open Source Security π΄
π Read
via "Dark Reading".
Here's how to reduce security risk and gain the benefits of open source software.π Read
via "Dark Reading".
Dark Reading
How Industry Leaders Should Approach Open Source Security
Here's how to reduce security risk and gain the benefits of open source software.
βοΈ Fighting Fake EDRs With βCredit Ratingsβ for Police βοΈ
π Read
via "Krebs on Security".
When KrebsOnSecurity last month explored how cybercriminals were using hacked email accounts at police departments worldwide to obtain warrantless Emergency Data Requests (EDRs) from social media and technology providers, many security experts called it a fundamentally unfixable problem. But don't tell that to Matt Donahue, a former FBI agent who recently quit the agency to launch a startup that aims to help tech companies do a better job screening out phony law enforcement data requests -- in part by assigning trustworthiness or "credit ratings" to law enforcement authorities worldwide.π Read
via "Krebs on Security".
Krebs on Security
Fighting Fake EDRs With βCredit Ratingsβ for Police
When KrebsOnSecurity last month explored how cybercriminals were using hacked email accounts at police departments worldwide to obtain warrantless Emergency Data Requests (EDRs) from social media and technology providers, many security experts called it aβ¦
β Ransomware Survey 2022 β like the Curateβs Egg, βgood in partsβ β
π Read
via "Naked Security".
You might not like the headline statistics in this year's ransomware report... but that makes it even more important to take a look!π Read
via "Naked Security".
Naked Security
Ransomware Survey 2022 β like the Curateβs Egg, βgood in partsβ
You might not like the headline statistics in this yearβs ransomware reportβ¦ but that makes it even more important to take a look!
ποΈ VirusTotal debunks claims of a serious vulnerability in Google-owned antivirus service ποΈ
π Read
via "The Daily Swig".
Third party file and theftπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
VirusTotal debunks claims of a serious vulnerability in Google-owned antivirus service
Claims that researchers were able to execute commands within the antivirus platform have been questioned
βΌ CVE-2022-29505 βΌ
π Read
via "National Vulnerability Database".
Due to build misconfiguration in openssl dependency, LINE for Windows before 7.8 is vulnerable to DLL injection that could lead to privilege escalation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27905 βΌ
π Read
via "National Vulnerability Database".
In ControlUp Real-Time Agent before 8.6, an unquoted path can result in privilege escalation. An attacker would require write permissions to the root level of the OS drive (C:\) to exploit this.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-24888 βΌ
π Read
via "National Vulnerability Database".
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24886 βΌ
π Read
via "National Vulnerability Database".
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24885 βΌ
π Read
via "National Vulnerability Database".
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-28464 βΌ
π Read
via "National Vulnerability Database".
Apifox through 2.1.6 is vulnerable to Cross Site Scripting (XSS) which can lead to remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24889 βΌ
π Read
via "National Vulnerability Database".
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24887 βΌ
π Read
via "National Vulnerability Database".
Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27239 βΌ
π Read
via "National Vulnerability Database".
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22323 βΌ
π Read
via "National Vulnerability Database".
IBM Security Identity Manager (IBM Security Verify Password Synchronization Plug-in for Windows AD 10.x) is vulnerable to a denial of service, caused by a heap-based buffer overflow in the Password Synch Plug-in. An authenticated attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 218379.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22275 βΌ
π Read
via "National Vulnerability Database".
Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22521 βΌ
π Read
via "National Vulnerability Database".
In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed by users with administrative privileges. An attacker could thereby obtain higher permissions. The attacker must already have access to the corresponding local system to be able to exchange the files.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22312 βΌ
π Read
via "National Vulnerability Database".
IBM Security Identity Manager (IBM Security Verify Password Synchronization Plug-in for Windows AD 10.x) is vulnerable to a denial of service, caused by a heap-based buffer overflow in the Password Synch Plug-in. An authenticated attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 217369.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38874 βΌ
π Read
via "National Vulnerability Database".
IBM QRadar SIEM 7.3, 7.4, and 7.5 allows for users to access information across tenant and domain boundaries in some situations. IBM X-Force ID: 208397.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38878 βΌ
π Read
via "National Vulnerability Database".
IBM QRadar 7.3, 7.4, and 7.5 could allow a malicious actor to impersonate an actor due to key exchange without entity authentication. IBM X-Force ID: 208756.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2021-38939 βΌ
π Read
via "National Vulnerability Database".
IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive information in log files that could be read by an user with access to creating domains. IBM X-Force ID: 211037.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34590 βΌ
π Read
via "National Vulnerability Database".
In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.π Read
via "National Vulnerability Database".