βΌ CVE-2022-1118 βΌ
π Read
via "National Vulnerability Database".
Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploitedπ Read
via "National Vulnerability Database".
βοΈ When Your Smart ID Card Reader Comes With Malware βοΈ
π Read
via "Krebs on Security".
Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder's appropriate security level. But many government employees aren't issued an approved card reader device that lets them use these cards at home or remotely, and so turn to low-cost readers they find online. What could go wrong? Here's one example.π Read
via "Krebs on Security".
Krebs on Security
When Your Smart ID Card Reader Comes With Malware
Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder's appropriateβ¦
ποΈ Facebook account takeover: Researcher scoops $40k bug bounty for chained exploit ποΈ
π Read
via "The Daily Swig".
Youssef Sammouda returns with more Facebook hacks β this time leveraging stolen Google authentication tokens to gain access to social media accountsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Facebook account takeover: Researcher scoops $40k bug bounty for chained exploit
Youssef Sammouda returns with more Facebook hacks β this time leveraging stolen Google authentication tokens to gain access to social media accounts
π1
βΌ CVE-2022-30976 βΌ
π Read
via "National Vulnerability Database".
GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30975 βΌ
π Read
via "National Vulnerability Database".
In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41946 βΌ
π Read
via "National Vulnerability Database".
In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scripting (XSS) vulnerability in Parental Control --> Access Time Restriction --> Username field, a user cannot delete the rule due to the XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30974 βΌ
π Read
via "National Vulnerability Database".
compile in regexp.c in Artifex MuJS through 1.2.0 results in stack consumption because of unlimited recursion, a different issue than CVE-2019-11413.π Read
via "National Vulnerability Database".
βΌ CVE-2019-25061 βΌ
π Read
via "National Vulnerability Database".
The random_password_generator (aka RandomPasswordGenerator) gem through 1.0.0 for Ruby uses Kernel#rand to generate passwords, which, due to its cyclic nature, can facilitate password prediction.π Read
via "National Vulnerability Database".
β Pwn2Own hacking schedule released β Windows and Linux are top targets β
π Read
via "Naked Security".
What's better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?π Read
via "Naked Security".
Naked Security
Pwn2Own hacking schedule released β Windows and Linux are top targets
Whatβs better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?
π1
β April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell β
π Read
via "Threat Post".
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.π Read
via "Threat Post".
Threat Post
April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.
π1
π΄ How Threat Actors Are a Click Away From Becoming Quasi-APTs π΄
π Read
via "Dark Reading".
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.π Read
via "Dark Reading".
Dark Reading
How Threat Actors Are a Click Away From Becoming Quasi-APTs
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.
βΌ CVE-2022-29643 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the macAddress parameter in the function setMacQos. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2022-28956 βΌ
π Read
via "National Vulnerability Database".
An issue in the getcfg.php component of D-Link DIR816L_FW206b01 allows attackers to access the device via a crafted payload.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29645 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a hard coded password for root stored in the component /etc/shadow.sample.π Read
via "National Vulnerability Database".
βΌ CVE-2022-28955 βΌ
π Read
via "National Vulnerability Database".
An access control issue in D-Link DIR816L_FW206b01 allows unauthenticated attackers to access folders folder_view.php and category_view.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29638 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setIpQosRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29644 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a hard coded password for the telnet service stored in the component /web_cste/cgi-bin/product.ini.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29641 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the startTime and endTime parameters in the function setParentalRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29640 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setPortForwardRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2022-28958 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR816L_FW206b01 was discovered to contain a remote code execution (RCE) vulnerability via the value parameter at shareport.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29646 βΌ
π Read
via "National Vulnerability Database".
An access control issue in TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 allows attackers to obtain sensitive information via a crafted web request.π Read
via "National Vulnerability Database".