βΌ CVE-2022-29556 βΌ
π Read
via "National Vulnerability Database".
The iot-manager microservice 1.0.0 in Northern.tech Mender Enterprise before 3.2.2 allows SSRF because the Azure IoT Hub integration provides several SSRF primitives that can execute cross-tenant actions via internal API endpoints.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29904 βΌ
π Read
via "National Vulnerability Database".
The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain '-' and '_' constraints.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29907 βΌ
π Read
via "National Vulnerability Database".
The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29905 βΌ
π Read
via "National Vulnerability Database".
The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29906 βΌ
π Read
via "National Vulnerability Database".
The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29903 βΌ
π Read
via "National Vulnerability Database".
The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension's configuration. The attacker must trigger a POST request to Special:PrivateDomains.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1531 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ARAX-UI Synonym Lookup functionality in GitHub repository rtxteam/rtx prior to checkpoint_2022-04-20 . This vulnerability is critical as it can lead to remote code execution and thus complete server takeover.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1526 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in Emlog Pro up to 1.2.2. This POST parameter handling of articles. The manipulation with the input <script>alert(1);</script> leads to cross site scripting. It is possible to initiate the attack remotely but it requires a signup and login by the attacker. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1530 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious JS on Application :)π Read
via "National Vulnerability Database".
ποΈ GitHub offers post-mortem on recent security breach ποΈ
π Read
via "The Daily Swig".
Tokens stollen and abused but problem has been containedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
GitHub offers post-mortem on recent security breach
Tokens stolen and abused but problem has been contained
β Cyberespionage APT Now Identified as Three Separate Actors β
π Read
via "Threat Post".
The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets.π Read
via "Threat Post".
Threat Post
Cyberespionage APT Now Identified as Three Separate Actors
The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets.
βΌ CVE-2022-1533 βΌ
π Read
via "National Vulnerability Database".
Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1534 βΌ
π Read
via "National Vulnerability Database".
Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.π Read
via "National Vulnerability Database".
ποΈ Data breach at US healthcare provider ARcare impacts 345,000 individuals ποΈ
π Read
via "The Daily Swig".
Sensitive medical and other personal data was potentially exposedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Data breach at US healthcare provider ARcare impacts 345,000 individuals
Sensitive medical and other personal data was potentially exposed
π΄ Ambient.ai Expands Computer Vision Capabilities for Better Building Security π΄
π Read
via "Dark Reading".
The AI startup releases new threat signatures to expand the computer vision platformβs ability to identify potential physical security incidents from camera feeds.π Read
via "Dark Reading".
Dark Reading
Ambient.ai Expands Computer Vision Capabilities for Better Building Security
The AI startup releases new threat signatures to expand the computer vision platformβs ability to identify potential physical security incidents from camera feeds.
π TOR Virtual Network Tunneling Tool 0.4.7.7 π
π Read
via "Packet Storm Security".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.7.7 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Security Turbulence in the Cloud: Survey Saysβ¦ β
π Read
via "Threat Post".
Exclusive Threatpost research examines organizationsβ top cloud security concerns, attitudes towards zero-trust and DevSecOps.π Read
via "Threat Post".
Threat Post
Security Turbulence in the Cloud: Survey Saysβ¦
Exclusive Threatpost research examines organizationsβ top cloud security concerns, attitudes towards zero-trust and DevSecOps.
βΌ CVE-2022-1536 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in automad up to 1.10.9 and classified as problematic. This vulnerability affects the Dashboard. The manipulation of the argument title with the input Home</title><script>alert("home")</script><title> leads to a cross site scripting. The attack can be initiated remotely but requires an authentication. The exploit details have disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44596 βΌ
π Read
via "National Vulnerability Database".
Wondershare LTD Dr. Fone as of 2021-12-06 version is affected by Remote code execution. Due to software design flaws an unauthenticated user can communicate over UDP with the "InstallAssistService.exe" service(the service is running under SYSTEM privileges) and manipulate it to execute malicious executable without any validation from a remote location and gain SYSTEM privilegesπ Read
via "National Vulnerability Database".
βΌ CVE-2021-44595 βΌ
π Read
via "National Vulnerability Database".
Wondershare Dr. Fone Latest version as of 2021-12-06 is vulnerable to Incorrect Access Control. A normal user can send manually crafted packets to the ElevationService.exe and execute arbitrary code without any validation with SYSTEM privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41942 βΌ
π Read
via "National Vulnerability Database".
The Magic CMS MSVOD v10 video system has a SQL injection vulnerability. Attackers can use vulnerabilities to obtain sensitive information in the database.π Read
via "National Vulnerability Database".