βΌ CVE-2022-1575 βΌ
π Read
via "National Vulnerability Database".
Arbitrary Code Execution through Sanitizer Bypass in GitHub repository jgraph/drawio prior to 18.0.0. - Arbitrary (remote) code execution in the desktop app. - Stored XSS in the web app.π Read
via "National Vulnerability Database".
βΌ CVE-2022-28461 βΌ
π Read
via "National Vulnerability Database".
mingyuefusu Library Management System all versions as of 03-27-2022 is vulnerable to SQL Injection.π Read
via "National Vulnerability Database".
π΄ Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks π΄
π Read
via "Dark Reading".
Cloud containers are increasingly part of the cybercrime playbook, with researchers flagging ongoing scanning for Docker weaknesses along with rapid exploitation to infect systems with coin-miners, denial-of-service tools, and ransomware.π Read
via "Dark Reading".
Dark Reading
Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks
Cloud containers are increasingly part of the cybercrime playbook, with researchers flagging ongoing scanning for Docker weaknesses along with rapid exploitation to infect systems with coin-miners, denial-of-service tools, and ransomware.
β World Password Day β the 1960s just called and gave you your passwords back β
π Read
via "Naked Security".
Yes, passwords are going away. No, it won't happen tomorrow. So it's still worth knowing the basics of picking proper passwords.π Read
via "Naked Security".
Naked Security
World Password Day β the 1960s just called and gave you your passwords back
Yes, passwords are going away. No, it wonβt happen tomorrow. So itβs still worth knowing the basics of picking proper passwords.
π΄ 1,000+ Attacks in 2 Years: How the SideWinder APT Sheds Its Skin π΄
π Read
via "Dark Reading".
Researcher to reveal fresh details at Black Hat Asia on a tenacious cyber-espionage group attacking specific military, law enforcement, aviation, and other entities in Central and South Asia.π Read
via "Dark Reading".
Dark Reading
1,000+ Attacks in 2 Years: How the SideWinder APT Sheds Its Skin
Researcher to reveal fresh details at Black Hat Asia on a tenacious cyber-espionage group attacking specific military, law enforcement, aviation, and other entities in Central and South Asia.
βΌ CVE-2022-1464 βΌ
π Read
via "National Vulnerability Database".
Stored xss bug in GitHub repository gogs/gogs prior to 0.12.7. As the repo is public , any user can view the report and when open the attachment then xss is executed. This bug allow executed any javascript code in victim account .π Read
via "National Vulnerability Database".
βΌ CVE-2021-42183 βΌ
π Read
via "National Vulnerability Database".
MasaCMS 7.2.1 is affected by a path traversal vulnerability in /index.cfm/_api/asset/image/.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1516 βΌ
π Read
via "National Vulnerability Database".
A NULL pointer dereference flaw was found in the Linux kernelΓ’β¬β’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.π Read
via "National Vulnerability Database".
π΄ Multichannel Phishing Concerns Cybersecurity Leaders in 2022 π΄
π Read
via "Dark Reading".
With 80% of companies using cloud collaboration tools, cybercriminals are using multichannel phishing attacks to exploit security gaps in the hybrid work model.π Read
via "Dark Reading".
Darkreading
Multichannel Phishing Concerns Cybersecurity Leaders in 2022
With 80% of companies using cloud collaboration tools, cybercriminals are using multichannel phishing attacks to exploit security gaps in the hybrid work model.
π΄ Cisco Announces Cloud Controls Framework Is Now Available to Public π΄
π Read
via "Dark Reading".
The Cisco CCF helps save resources by enabling organizations to achieve cloud security certifications more efficiently.π Read
via "Dark Reading".
Darkreading
Cisco Announces Cloud Controls Framework Is Now Available to Public
The Cisco CCF helps save resources by enabling organizations to achieve cloud security certifications more efficiently.
π΄ Critical Cisco VM-Escape Bug Threatens Host Takeover π΄
π Read
via "Dark Reading".
The vendor also disclosed two other security vulnerabilities that would allow remote, unauthenticated attackers to inject commands as root and snoop on sensitive user information.π Read
via "Dark Reading".
Darkreading
Critical Cisco VM-Escape Bug Threatens Host Takeover
The vendor also disclosed two other security vulnerabilities that would allow remote, unauthenticated attackers to inject commands as root and snoop on sensitive user information.
π΄ Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies π΄
π Read
via "Dark Reading".
The company will continue the development of Comaeβs memory analysis platform and seek to incorporate its capabilities into existing solutionsπ Read
via "Dark Reading".
Dark Reading
Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies
The company will continue the development of Comaeβs memory analysis platform and seek to incorporate its capabilities into existing solutions
π Wireshark Analyzer 3.6.5 π
π Read
via "Packet Storm Security".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Wireshark Analyzer 3.6.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ FBI: Bank Losses From BEC Attacks Top $43B π΄
π Read
via "Dark Reading".
Law enforcement attributes a recent 65% spike in BEC attack losses to COVID-19 restrictions and the ongoing reality of a remote workforce.π Read
via "Dark Reading".
Darkreading
FBI: Bank Losses From BEC Attacks Top $43B
Law enforcement attributes a recent 65% spike in BEC attack losses to COVID-19 restrictions and the ongoing reality of a remote workforce.
βΌ CVE-2021-38487 βΌ
π Read
via "National Vulnerability Database".
RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43547 βΌ
π Read
via "National Vulnerability Database".
TwinOaks Computing CoreDX DDS versions prior to 5.9.1 are susceptible to exploitation when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39020 βΌ
π Read
via "National Vulnerability Database".
IBM Guardium Data Encryption (GDE) 4.0.0.7 and lower stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 213855.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1468 βΌ
π Read
via "National Vulnerability Database".
On all versions of 17.0.x, 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x on F5 BIG-IP, an authenticated iControl REST user with at least guest role privileges can cause processing delays to iControl REST requests via undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluatedπ Read
via "National Vulnerability Database".
βΌ CVE-2021-38445 βΌ
π Read
via "National Vulnerability Database".
OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26130 βΌ
π Read
via "National Vulnerability Database".
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, and 13.1.x versions prior to 13.1.5, when an Active mode-enabled FTP profile is configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing active FTP data channel connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluatedπ Read
via "National Vulnerability Database".
βΌ CVE-2021-38429 βΌ
π Read
via "National Vulnerability Database".
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.π Read
via "National Vulnerability Database".