βΌ CVE-2022-26944 βΌ
π Read
via "National Vulnerability Database".
Percona XtraBackup 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table. NOTE: this issue exists because of an incomplete fix for CVE-2020-10997.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38221 βΌ
π Read
via "National Vulnerability Database".
bbs-go <= 3.3.0 including Custom Edition is vulnerable to stored XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31023 βΌ
π Read
via "National Vulnerability Database".
Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29597 βΌ
π Read
via "National Vulnerability Database".
Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to Local File Inclusion (LFI). Any authenticated user has the ability to reference internal system files within requests made to the RRSWeb/maint/ShowDocument/ShowDocument.aspx page. The server will successfully respond with the file contents of the internal system file requested. This ability could allow for adversaries to extract sensitive data and/or files from the underlying file system, gain knowledge about the internal workings of the system, or access source code of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45981 βΌ
π Read
via "National Vulnerability Database".
NetScout nGeniusONE 6.3.2 allows an XML External Entity (XXE) attack.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31024 βΌ
π Read
via "National Vulnerability Database".
richdocuments is the repository for NextCloud Collabra, the app for Nextcloud Office collaboration. Prior to versions 6.0.0, 5.0.4, and 4.2.6, a user could be tricked into working against a remote Office by sending them a federated share. richdocuments versions 6.0.0, 5.0.4 and 4.2.6 contain a fix for this issue. There are currently no known workarounds available.π Read
via "National Vulnerability Database".
β Yet another zero-day (sort of) in Windows βsearch URLβ handling β
π Read
via "Naked Security".
More trouble with special-purpose URLs on Windows.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β S3 Ep85: Now THATβS what I call a Microsoft Office exploit! [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Gurucul Launches Cloud-Native SOC Platform Pushing the Boundaries of Next-Gen SIEM and XDR with Identity Threat Detection and Response π΄
π Read
via "Dark Reading".
Gurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a flexible enterprise risk engine for hybrid and multi-cloud environments.π Read
via "Dark Reading".
Dark Reading
Gurucul Launches Cloud-Native SOC Platform Pushing the Boundaries of Next-Gen SIEM and XDR with Identity Threat Detection and Response
Gurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a flexible enterprise risk engine for hybrid and multi-cloud environments.
π΄ Research Reveals 75% of CISOs Are Worried Too Many Application Vulnerabilities Leak Into Production, Despite a Multi-Layered Security Approach π΄
π Read
via "Dark Reading".
79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern multi-cloud environments.π Read
via "Dark Reading".
Dark Reading
Research Reveals 75% of CISOs Are Worried Too Many Application Vulnerabilities Leak Into Production, Despite a Multi-Layered Securityβ¦
79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern multi-cloud environments.
π΄ Intel Chipset Firmware Actively Targeted by Conti Group π΄
π Read
via "Dark Reading".
Conti threat actors are betting chipset firmware is updated less frequently than other software β and winning big, analysts say.π Read
via "Dark Reading".
Dark Reading
Intel Chipset Firmware Actively Targeted by Conti Group
Conti threat actors are betting chipset firmware is updated less frequently than other software β and winning big, analysts say.
π΄ Cerberus Sentinel Completes Acquisition of Creatrix, Inc. π΄
π Read
via "Dark Reading".
U.S. cybersecurity services firm expands security and identity management services with woman-owned business.π Read
via "Dark Reading".
Dark Reading
Cerberus Sentinel Completes Acquisition of Creatrix, Inc.
U.S. cybersecurity services firm expands security and identity management services with woman-owned business.
βΌ CVE-2022-22556 βΌ
π Read
via "National Vulnerability Database".
Dell PowerStore contains an Uncontrolled Resource Consumption Vulnerability in PowerStore User Interface. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the Denial of Service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26867 βΌ
π Read
via "National Vulnerability Database".
PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33473 βΌ
π Read
via "National Vulnerability Database".
An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26869 βΌ
π Read
via "National Vulnerability Database".
Dell PowerStore versions 2.0.0.x, 2.0.1.x and 2.1.0.x contains an open port vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26868 βΌ
π Read
via "National Vulnerability Database".
Dell EMC PowerStore versions 2.0.0.x, 2.0.1.x, and 2.1.0.x are vulnerable to a command injection flaw. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system takeover by an attacker.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29718 βΌ
π Read
via "National Vulnerability Database".
Caddy v2.4 was discovered to contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22557 βΌ
π Read
via "National Vulnerability Database".
PowerStore contains Plain-Text Password Storage Vulnerability in PowerStore X & T environments running versions 2.0.0.x and 2.0.1.x A locally authenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32250 βΌ
π Read
via "National Vulnerability Database".
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26866 βΌ
π Read
via "National Vulnerability Database".
Dell PowerStore Versions before v2.1.1.0. contains a Stored Cross-Site Scripting vulnerability. A high privileged network attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.π Read
via "National Vulnerability Database".