π΄ Veterans Explain How Military Service Prepared Them for Cybersecurity Careers π΄
π Read
via "Dark Reading".
The ability to handle intense pressure is just one of the skills that veterans bring to corporate cybersecurity work.π Read
via "Dark Reading".
Dark Reading
Veterans Explain How Military Service Prepared Them for Cybersecurity Careers
The ability to handle intense pressure is just one of the skills that veterans bring to corporate cybersecurity work.
βΌ CVE-2022-31046 βΌ
π Read
via "National Vulnerability Database".
TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the export functionality fails to limit the result set to allowed columns of a particular database table. This way, authenticated users can export internal details of database tables they already have access to. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 fix the problem described above. In order to address this issue, access to mentioned export functionality is completely denied for regular backend users.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32239 βΌ
π Read
via "National Vulnerability Database".
When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31048 βΌ
π Read
via "National Vulnerability Database".
TYPO3 is an open source web content management system. Prior to versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. TYPO3 versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32359 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/classes/Master.php?f=delete_category.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32353 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/categories/manage_field_order.php?id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32236 βΌ
π Read
via "National Vulnerability Database".
When a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31059 βΌ
π Read
via "National Vulnerability Database".
Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled DiscourseΓΒ’Γ’β¬ÒβΒ’s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31060 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open-source discussion platform. Prior to version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches, banner topic data is exposed on login-required sites. This issue is patched in version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches of Discourse. As a workaround, one may disable banners.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31049 βΌ
π Read
via "National Vulnerability Database".
TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, user submitted content was used without being properly encoded in HTML emails sent to users. The actually affected components were mail clients used to view those messages. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32362 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/categories/manage_category.php?id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32355 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/?page=products/view_product&id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32358 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/classes/Master.php?f=delete_inquiry.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32354 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/?page=user/manage_user&id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32238 βΌ
π Read
via "National Vulnerability Database".
When a user opens manipulated Encapsulated Post Script (.eps, ai.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31047 βΌ
π Read
via "National Vulnerability Database".
TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29241 βΌ
π Read
via "National Vulnerability Database".
Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter Notebook. Prior to version 1.17.1, if notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this URL can be used from a cross-site scripting payload or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system. This issue is patched in version 1.17.1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32237 βΌ
π Read
via "National Vulnerability Database".
When a user opens manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31050 βΌ
π Read
via "National Vulnerability Database".
TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32363 βΌ
π Read
via "National Vulnerability Database".
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/categories/view_category.php?id=.π Read
via "National Vulnerability Database".
β Follina gets fixed β but itβs not listed in the Patch Tuesday patches! β
π Read
via "Naked Security".
We tried it out to make sure, so you don't have to.π Read
via "Naked Security".
Naked Security
Follina gets fixed β but itβs not listed in the Patch Tuesday patches!
We tried it out to make sure, so you donβt have to.
π2