βΌ CVE-2022-2253 βΌ
π Read
via "National Vulnerability Database".
A user with administrative privileges in Distributed Data Systems WebHMI 4.1.1.7662 may send OS commands to execute on the host server.π Read
via "National Vulnerability Database".
βΌ CVE-2014-3650 βΌ
π Read
via "National Vulnerability Database".
Multiple persistent cross-site scripting (XSS) flaws were found in the way Aerogear handled certain user-supplied content. A remote attacker could use these flaws to compromise the application with specially crafted input.π Read
via "National Vulnerability Database".
βΌ CVE-2014-3648 βΌ
π Read
via "National Vulnerability Database".
The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on.π Read
via "National Vulnerability Database".
β βMissing Cryptoqueenβ hits the FBIβs Ten Most Wanted list β
π Read
via "Naked Security".
The "Missing Cryptoqueen" makes the American Top Ten... but not in a good way.π Read
via "Naked Security".
Naked Security
βMissing Cryptoqueenβ hits the FBIβs Ten Most Wanted list
The βMissing Cryptoqueenβ makes the American Top Tenβ¦ but not in a good way.
π Friday Five 7/1 π
π Read
via "".
The overturning of Roe v. Wade is sparking more privacy concerns, cybercriminals are using deepfakes to gain access to corporate networks, and home routers are being attacked with malware. Read about these stories and more in this week's Friday Five.
π Read
via "".
π΄ Criminals Use Deepfake Videos to Interview for Remote Work π΄
π Read
via "Dark Reading".
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.π Read
via "Dark Reading".
Dark Reading
Criminals Use Deepfake Videos to Interview for Remote Work
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
βΌ CVE-2022-2281 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in GitLab EE affecting all versions from 12.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows disclosure of release titles if group milestones are associated with any project releases.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2229 βΌ
π Read
via "National Vulnerability Database".
An improper authorization issue in GitLab CE/EE affecting all versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to extract the value of an unprotected variable they know the name of in public projects or private projects they're a member of.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2270 βΌ
π Read
via "National Vulnerability Database".
An issue has been discovered in GitLab affecting all versions starting from 12.4 before 14.10.5, all versions starting from 15.0 before 15.0.4, all versions starting from 15.1 before 15.1.1. GitLab was leaking Conan packages names due to incorrect permissions verification.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2230 βΌ
π Read
via "National Vulnerability Database".
A Stored Cross-Site Scripting vulnerability in the project settings page in GitLab CE/EE affecting all versions from 14.4 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2254 βΌ
π Read
via "National Vulnerability Database".
A user with administrative privileges in Distributed Data Systems WebHMI 4.1.1.7662 can store a script that could impact other logged in users.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1981 βΌ
π Read
via "National Vulnerability Database".
An issue has been discovered in GitLab EE affecting all versions starting from 12.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. In GitLab, if a group enables the setting to restrict access to users belonging to specific domains, that allow-list may be bypassed if a Maintainer uses the 'Invite a group' feature to invite a group that has members that don't comply with domain allow-list.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2244 βΌ
π Read
via "National Vulnerability Database".
An improper authorization vulnerability in GitLab EE/CE affecting all versions from 14.8 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows project memebers with reporter role to manage issues in project's error tracking feature.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2235 βΌ
π Read
via "National Vulnerability Database".
Insufficient sanitization in GitLab EE's external issue tracker affecting all versions from 14.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTao linkπ Read
via "National Vulnerability Database".
βΌ CVE-2022-2243 βΌ
π Read
via "National Vulnerability Database".
An access control vulnerability in GitLab EE/CE affecting all versions from 14.8 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows authenticated users to enumerate issues in non-linked sentry projects.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2228 βΌ
π Read
via "National Vulnerability Database".
Information exposure in GitLab EE affecting all versions from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access restrictions even if the GitLab Runner is calling from outside the allowed IP rangeπ Read
via "National Vulnerability Database".
βΌ CVE-2022-2250 βΌ
π Read
via "National Vulnerability Database".
An open redirect vulnerability in GitLab EE/CE affecting all versions from 11.1 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows an attacker to redirect users to an arbitrary location if they trust the URL.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1983 βΌ
π Read
via "National Vulnerability Database".
Incorrect authorization in GitLab EE affecting all versions from 10.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allowed an attacker already in possession of a valid Deploy Key or a Deploy Token to misuse it from any location to access Container Registries even when IP address restrictions were configured.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2227 βΌ
π Read
via "National Vulnerability Database".
Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data under certain conditionsπ Read
via "National Vulnerability Database".
βΌ CVE-2022-31113 βΌ
π Read
via "National Vulnerability Database".
Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canarytoken (a URL) to execute Javascript in the Canarytoken's history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. The issue has been patched on Canarytokens.org and in the latest release. No signs of successful exploitation of this vulnerability have been found. Users are advised to upgrade. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1963 βΌ
π Read
via "National Vulnerability Database".
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 14.10.5, all versions starting from 15.0 before 15.0.4, all versions starting from 15.1 before 15.1.1. GitLab reveals if a user has enabled two-factor authentication on their account in the HTML source, to unauthenticated users.π Read
via "National Vulnerability Database".