βΌ CVE-2022-31584 βΌ
π Read
via "National Vulnerability Database".
The stonethree/s3label repository through 2019-08-14 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32294 βΌ
π Read
via "National Vulnerability Database".
Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port).π Read
via "National Vulnerability Database".
βΌ CVE-2022-31587 βΌ
π Read
via "National Vulnerability Database".
The yuriyouzhou/KG-fashion-chatbot repository through 2018-05-22 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31586 βΌ
π Read
via "National Vulnerability Database".
The unizar-30226-2019-06/ChangePop-Back repository through 2019-06-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31588 βΌ
π Read
via "National Vulnerability Database".
The zippies/testplatform repository through 2016-07-19 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31577 βΌ
π Read
via "National Vulnerability Database".
The longmaoteamtf/audio_aligner_app repository through 2020-01-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31554 βΌ
π Read
via "National Vulnerability Database".
The rohitnayak/movie-review-sentiment-analysis repository through 2017-05-07 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31542 βΌ
π Read
via "National Vulnerability Database".
The mandoku/mdweb repository through 2015-05-07 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31548 βΌ
π Read
via "National Vulnerability Database".
The nrlakin/homepage repository through 2017-03-06 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2368 βΌ
π Read
via "National Vulnerability Database".
Business Logic Errors in GitHub repository microweber/microweber prior to 1.2.20.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1794 βΌ
π Read
via "National Vulnerability Database".
The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30792 βΌ
π Read
via "National Vulnerability Database".
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29926 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation in Cybozu, Inc. showed that it was not a vulnerability. Notes: https://jvn.jp/en/jp/JVN14077132/π Read
via "National Vulnerability Database".
βΌ CVE-2022-2302 βΌ
π Read
via "National Vulnerability Database".
Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30791 βΌ
π Read
via "National Vulnerability Database".
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.π Read
via "National Vulnerability Database".
ποΈ βDirty dancingβ in OAuth: Researcher discloses how cyber-attacks can lead to account hijacking ποΈ
π Read
via "The Daily Swig".
Single-click account takeovers are made possible by taking advantage of quirks in OAuthπ Read
via "The Daily Swig".
β Apache βCommons Configurationβ patches Log4Shell-style bug β what you need to know β
π Read
via "Naked Security".
It's a bit like Log4J, but for configuration files, not for logging.π Read
via "Naked Security".
Naked Security
Apache βCommons Configurationβ patches Log4Shell-style bug β what you need to know
Itβs a bit like Log4J, but for configuration files, not for logging.
β That didnβt last! Microsoft turns off the Office security it just turned on β
π Read
via "Naked Security".
An Office anti-malware setting that took more than 20 years to arrive... and fewer than 20 weeks to vanish again.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Proposed SEC Rules Require More Transparency About Cyber-Risk π΄
π Read
via "Dark Reading".
The new guidelines would require public companies to file periodic disclosures about their cybersecurity practices and notify the SEC within 96 hours of a material breach.π Read
via "Dark Reading".
Dark Reading
Proposed SEC Rules Require More Transparency About Cyber-Risk
The new guidelines would require public companies to file periodic disclosures about their cybersecurity practices and notify the SEC within 96 hours of a material breach.
π΄ New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials π΄
π Read
via "Dark Reading".
Scams pressure victims to "resolve an issue that could impact their status, business."π Read
via "Dark Reading".
Dark Reading
New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials
Scams pressure victims to "resolve an issue that could impact their status, business."
π΄ Diversity in Cybersecurity: Fostering Gender-Inclusive Teams That Perform Better π΄
π Read
via "Dark Reading".
Proactive steps in recruiting women to cybersecurity teams, along with policies focused on diversity, equity, and inclusion, help make cybersecurity teams more effective. Addressing specific barriers that female candidates face will make those teams more inclusive and more representative.π Read
via "Dark Reading".
Dark Reading
Diversity in Cybersecurity: Fostering Gender-Inclusive Teams That Perform Better
Proactive steps in recruiting women to cybersecurity teams, along with policies focused on diversity, equity, and inclusion, help make cybersecurity teams more effective. Addressing specific barriers that female candidates face will make those teams moreβ¦