βΌ CVE-2021-41683 βΌ
π Read
via "National Vulnerability Database".
There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0π Read
via "National Vulnerability Database".
βΌ CVE-2021-41682 βΌ
π Read
via "National Vulnerability Database".
There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0π Read
via "National Vulnerability Database".
βΌ CVE-2022-2134 βΌ
π Read
via "National Vulnerability Database".
Denial of Service in GitHub repository inventree/inventree prior to 0.8.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1720 βΌ
π Read
via "National Vulnerability Database".
Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31794 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.π Read
via "National Vulnerability Database".
π TOR Virtual Network Tunneling Tool 0.4.7.8 π
π Read
via "Packet Storm Security".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.7.8 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code π΄
π Read
via "Dark Reading".
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.π Read
via "Dark Reading".
Dark Reading
Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
π΄ DDoS Attacks Delay Putin Speech at Russian Economic Forum π΄
π Read
via "Dark Reading".
A Kremlin spokesman said that the St. Petersburg International Economic Forum accreditation and admissions systems were shut down by a DDoS attack.π Read
via "Dark Reading".
Dark Reading
DDoS Attacks Delay Putin Speech at Russian Economic Forum
A Kremlin spokesman said that the St. Petersburg International Economic Forum accreditation and admissions systems were shut down by a DDoS attack.
π΄ Name That Toon: Cuter Than a June Bug π΄
π Read
via "Dark Reading".
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading".
Dark Reading
Name That Toon: Cuter Than a June Bug
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
βοΈ Why Paper Receipts are Money at the Drive-Thru βοΈ
π Read
via "Krebs on Security".
Check out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the store owner's message what happened.π Read
via "Krebs on Security".
Krebs on Security
Why Paper Receipts are Money at the Drive-Thru
Check out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the store owner's message what happened.
β Interpol busts 2000 suspects in phone scamming takedown β
π Read
via "Naked Security".
Friends don't let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examples...π Read
via "Naked Security".
Naked Security
Interpol busts 2000 suspects in phone scamming takedown
Friends donβt let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examplesβ¦
βΌ CVE-2022-22318 βΌ
π Read
via "National Vulnerability Database".
IBM Curam Social Program Management 8.0.0 and 8.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33913 βΌ
π Read
via "National Vulnerability Database".
In Mahara 21.04 before 21.04.6, 21.10 before 21.10.4, and 22.04.2, files can sometimes be downloaded through thumb.php with no permission check.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22414 βΌ
π Read
via "National Vulnerability Database".
IBM Robotic Process Automation 21.0.2 could allow a local user to obtain sensitive web service configuration credentials from system memory. IBM X-Force ID: 223026.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2128 βΌ
π Read
via "National Vulnerability Database".
Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32983 βΌ
π Read
via "National Vulnerability Database".
Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22317 βΌ
π Read
via "National Vulnerability Database".
IBM Curam Social Program Management 8.0.0 and 8.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 218281.π Read
via "National Vulnerability Database".
π΄ Feds Take Down Russian 'RSOCKS' Botnet π΄
π Read
via "Dark Reading".
RSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.π Read
via "Dark Reading".
Dark Reading
Feds Take Down Russian 'RSOCKS' Botnet
RSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.
π΄ Capital One Attacker Exploited Misconfigured AWS Databases π΄
π Read
via "Dark Reading".
After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.π Read
via "Dark Reading".
Dark Reading
Capital One Attacker Exploited Misconfigured AWS Databases
After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.
βΌ CVE-2017-20065 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in Supsystic Popup Plugin 1.7.6 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2017-20066 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in Adminer Login 1.4.4 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".