βΌ CVE-2021-31679 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that allows attackers to delete admin and other members' account numbers.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32386 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 v16.03.07.44 was discovered to contain a buffer overflow via fromAdvSetMacMtuWan.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24139 βΌ
π Read
via "National Vulnerability Database".
In IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -> SYSTEM or from Local ADMIN-> Domain ADMIN depending on the user and named pipe that is used.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31676 βΌ
π Read
via "National Vulnerability Database".
A reflected XSS was discovered in PESCMS-V2.3.3. When combined with CSRF in the same file, they can cause bigger destruction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24141 βΌ
π Read
via "National Vulnerability Database".
The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient().π Read
via "National Vulnerability Database".
βΌ CVE-2022-33980 βΌ
π Read
via "National Vulnerability Database".
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37839 βΌ
π Read
via "National Vulnerability Database".
Apache Superset up to 1.5.1 allowed for authenticated users to access metadata information related to datasets they have no permission on. This metadata included the dataset name, columns and metrics.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31677 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can modify admin and other members' passwords.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24140 βΌ
π Read
via "National Vulnerability Database".
IOBit Advanced System Care 15, iTop Screen Recorder 2.1, iTop VPN 3.2, Driver Booster 9, and iTop Screenshot sends HTTP requests in their update procedure in order to download a config file. After downloading the config file, the products will parse the HTTP location of the update from the file and will try to install the update automatically with ADMIN privileges. An attacker Intercepting this communication can supply the product a fake config file with malicious locations for the updates thus gaining a remote code execution on an endpoint.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30591 βΌ
π Read
via "National Vulnerability Database".
** DISPUTED ** quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List.π Read
via "National Vulnerability Database".
π΄ The Cyber-Asset Management Playbook for Supply Chain Modernization π΄
π Read
via "Dark Reading".
Organizations must balance the risk and reward of new cyber-asset management technologies.π Read
via "Dark Reading".
Dark Reading
The Cyber-Asset Management Playbook for Supply Chain Modernization
Organizations must balance the risk and reward of new cyber-asset management technologies.
ποΈ Atlassian patches full-read SSRF in Jira ποΈ
π Read
via "The Daily Swig".
Severity of authenticated flaw heightened by abuse of Jira Service Desk signup facilityπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Atlassian patches full-read SSRF in Jira
Severity of authenticated flaw heightened by abuse of Jira Service Desk signup facility
π Zeek 5.0.0 π
π Read
via "Packet Storm Security".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Zeek 5.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π1
β Google patches βin-the-wildβ Chrome zero-day β update now! β
π Read
via "Naked Security".
Running Chrome? Do the "Help-About-Update" dance move right now, just to be sure...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2022-21785 βΌ
π Read
via "National Vulnerability Database".
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06807363; Issue ID: ALPS06807363.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21773 βΌ
π Read
via "National Vulnerability Database".
In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20083 βΌ
π Read
via "National Vulnerability Database".
In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21772 βΌ
π Read
via "National Vulnerability Database".
In TEEI driver, there is a possible type confusion due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06493842; Issue ID: ALPS06493842.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21780 βΌ
π Read
via "National Vulnerability Database".
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704526.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23173 βΌ
π Read
via "National Vulnerability Database".
this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21774 βΌ
π Read
via "National Vulnerability Database".
In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641447; Issue ID: ALPS06641447.π Read
via "National Vulnerability Database".