π Global Socket 1.4.37 π
π Read
via "Packet Storm Security".
Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.π Read
via "Packet Storm Security".
Packetstormsecurity
Global Socket 1.4.37 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Bash / Netcat Reverse Shells π
π Read
via "Packet Storm Security".
This script is a great tool for pentesters needing to create reverse shells using either bash or netcat.π Read
via "Packet Storm Security".
Packetstormsecurity
Bash / Netcat Reverse Shells β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Australiaβs Monash University launches public bug bounty program ποΈ
π Read
via "The Daily Swig".
Education institution will pay up to $2,500 for valid vulnerabilitiesπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Australiaβs Monash University launches public bug bounty program
Education institution will pay up to $2,500 for valid vulnerabilities
ποΈ βDoes anybody like CAPTCHAs?β β Cloudflare CTO John Graham-Cumming envisages a frictionless future for website Turing tests ποΈ
π Read
via "The Daily Swig".
British software engineer also talks HTTP/3, zero trust, and lava lamp-powered cryptographyπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
βDoes anybody like CAPTCHAs?β β Cloudflare CTO John Graham-Cumming envisages a frictionless future for website Turing tests
British software engineer also talks HTTP/3, zero trust, and lava lamp-powered cryptography
βΌ CVE-2022-33171 βΌ
π Read
via "National Vulnerability Database".
** DISPUTED ** The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34265 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.π Read
via "National Vulnerability Database".
π₯1
βΌ CVE-2022-34918 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34829 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine ADSelfService Plus before 6203 allows a denial of service (application restart) via a crafted payload to the Mobile App Deployment API.π Read
via "National Vulnerability Database".
β Google Patches Actively Exploited Chrome Bug β
π Read
via "Threat Post".
The heap buffer overflow issue in the browserβs WebRTC engine could allow attackers to execute arbitrary code.π Read
via "Threat Post".
Threat Post
Google Patches Actively Exploited Chrome Bug
The heap buffer overflow issue in the browserβs WebRTC engine could allow attackers to execute arbitrary code.
β Latest Cyberattack Against Iran Part of Ongoing Campaign β
π Read
via "Threat Post".
Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.π Read
via "Threat Post".
Threat Post
Latest Cyberattack Against Iran Part of Ongoing Campaign
Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.
ποΈ HackerOne employee stole data from bug bounty reports for financial gain ποΈ
π Read
via "The Daily Swig".
Vulnerability disclosure platform shares details of incidentπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
HackerOne employee stole data from bug bounty reports for financial gain
Vulnerability disclosure platform shares details of incident
π΄ Name That Edge Toon: On Guard π΄
π Read
via "Dark Reading".
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading".
Dark Reading
Name That Edge Toon: On Guard
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
βΌ CVE-2022-33744 βΌ
π Read
via "National Vulnerability Database".
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33743 βΌ
π Read
via "National Vulnerability Database".
network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43702 βΌ
π Read
via "National Vulnerability Database".
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26365 βΌ
π Read
via "National Vulnerability Database".
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).π Read
via "National Vulnerability Database".
βΌ CVE-2022-33742 βΌ
π Read
via "National Vulnerability Database".
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).π Read
via "National Vulnerability Database".
βΌ CVE-2022-30289 βΌ
π Read
via "National Vulnerability Database".
A stored Cross-site Scripting (XSS) vulnerability was identified in the Data Import functionality of OpenCTI through 5.2.4. An attacker can abuse the vulnerability to upload a malicious file that will then be executed by a victim when they open the file location.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33740 βΌ
π Read
via "National Vulnerability Database".
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).π Read
via "National Vulnerability Database".
βΌ CVE-2022-33741 βΌ
π Read
via "National Vulnerability Database".
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).π Read
via "National Vulnerability Database".
βΌ CVE-2022-30290 βΌ
π Read
via "National Vulnerability Database".
In OpenCTI through 5.2.4, a broken access control vulnerability has been identified in the profile endpoint. An attacker can abuse the identified vulnerability in order to arbitrarily change their registered e-mail address as well as their API key, even though such action is not possible through the interface, legitimately.π Read
via "National Vulnerability Database".