βΌ CVE-2022-1862 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1874 βΌ
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in Safe Browsing in Google Chrome on Mac prior to 102.0.5005.61 allowed a remote attacker to bypass downloads protection policy via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1866 βΌ
π Read
via "National Vulnerability Database".
Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1858 βΌ
π Read
via "National Vulnerability Database".
Out of bounds read in DevTools in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform an out of bounds memory read via specific user interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1860 βΌ
π Read
via "National Vulnerability Database".
Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1868 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46830 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability exists within GoAnywhere MFT before 6.8.3 that utilize self-registration for the GoAnywhere Web Client. This vulnerability could potentially allow an external user who self-registers with a specific username and/or profile information to gain access to files at a higher directory level than intended.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1871 βΌ
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass file system policy via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1876 βΌ
π Read
via "National Vulnerability Database".
Heap buffer overflow in DevTools in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1870 βΌ
π Read
via "National Vulnerability Database".
Use after free in App Service in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1863 βΌ
π Read
via "National Vulnerability Database".
Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1875 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in PDF in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1869 βΌ
π Read
via "National Vulnerability Database".
Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1856 βΌ
π Read
via "National Vulnerability Database".
Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1854 βΌ
π Read
via "National Vulnerability Database".
Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1872 βΌ
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.π Read
via "National Vulnerability Database".
π΄ When Human Security Meets PerimeterX π΄
π Read
via "Dark Reading".
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.π Read
via "Dark Reading".
Dark Reading
When Human Security Meets PerimeterX
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.
π€―1
π’ Researchers uncover 'mysterious' Windows rootkit being actively exploited since 2016 π’
π Read
via "ITPro".
Experts at Kaspersky say the rootkit was found embedded inside the firmware image of legacy Asus and Gigabyte motherboardsπ Read
via "ITPro".
IT PRO
Researchers uncover 'mysterious' Windows rootkit being actively exploited since 2016 | IT PRO
Experts at Kaspersky say the rootkit was found embedded inside the firmware image of legacy Asus and Gigabyte motherboards
π’ Clinivate notifies customers of data breach π’
π Read
via "ITPro".
The hack exposed patientsβ protected health information stored in Clinivate's electronic health record archiveπ Read
via "ITPro".
IT PRO
Clinivate notifies customers of data breach | IT PRO
The hack exposed patientsβ protected health information stored in Clinivate's electronic health record archive
π’ Southern co-operative faces legal complaint for facial recognition CCTV π’
π Read
via "ITPro".
Rights group Big Brother Watch has written to the Information Commissioner to βstop unlawful processingβπ Read
via "ITPro".
IT PRO
Southern co-operative faces legal complaint for facial recognition CCTV | IT PRO
Rights group Big Brother Watch has written to the Information Commissioner to βstop unlawful processingβ
π’ DataGrail hires former Shopify VP Cathy Polinsky as CTO π’
π Read
via "ITPro".
The new hire stressed that data privacy is a human right as DataGrail looks to boost customer controlπ Read
via "ITPro".
IT PRO
DataGrail hires former Shopify VP Cathy Polinsky as CTO | IT PRO
The new hire stressed that data privacy is a human right as DataGrail looks to boost customer control