ποΈ XSS vulnerabilities in Google Cloud, Google Play could lead to account hijacks ποΈ
π Read
via "The Daily Swig".
Reflected XSS and DOM-based XSS bugs net researchers $3,000 and $5,000 bug bountiesπ Read
via "The Daily Swig".
π Faraday 4.0.4 π
π Read
via "Packet Storm Security".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Read
via "Packet Storm Security".
Packetstormsecurity
Faraday 4.0.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Malicious Npm Packages Tapped Again to Target Discord Users β
π Read
via "Threat Post".
Recent LofyLife campaign steals tokens and infects client files to monitor various user actions, such as log-ins, password changes and payment methods.π Read
via "Threat Post".
Threat Post
Malicious Npm Packages Tapped Again to Target Discord Users
Recent LofyLife campaign steals tokens and infects client files to monitor various user actions, such as log-ins, password changes and payment methods.
π΄ Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info π΄
π Read
via "Dark Reading".
The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.π Read
via "Dark Reading".
Dark Reading
Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info
The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.
β How to celebrate SysAdmin Day! β
π Read
via "Naked Security".
I've just popped in to wish you all/The best SysAdmin Day!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
ποΈ GitHub Actions workflow flaws provided write access to projects including Logstash ποΈ
π Read
via "The Daily Swig".
Malicious builds and wider infrastructural compromise were worst-case scenariosπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
GitHub Actions workflow flaws provided write access to projects including Logstash
Malicious builds and wider infrastructural compromise were worst-case scenarios
π Friday Five 7/29 π
π Read
via "".
Read about new findings from IBM's most recent Cost of a Data Breach Report, a data breach that could affect over 5 million Twitter users, the latest cybersecurity legislation making its way through Congress, and more all in this week's Friday Five!
π Read
via "".
βΌ CVE-2022-2576 βΌ
π Read
via "National Vulnerability Database".
In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLS_VERIFY_PEERS_ON_RESUMPTION_THRESHOLD values larger than 0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35643 βΌ
π Read
via "National Vulnerability Database".
IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper with system configuration or cause a denial of service. IBM X-Force ID: 230956.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36123 βΌ
π Read
via "National Vulnerability Database".
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.π Read
via "National Vulnerability Database".
π΄ Big Questions Remain Around Massive Shanghai Police Data Breach π΄
π Read
via "Dark Reading".
Why was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?π Read
via "Dark Reading".
Dark Reading
Big Questions Remain Around Massive Shanghai Police Data Breach
Why was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?
π2
π΄ Amazon Adds Malware Detection to GuardDuty TDR Service π΄
π Read
via "Dark Reading".
The new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.π Read
via "Dark Reading".
Dark Reading
Amazon Adds Malware Detection to GuardDuty TDR Service
The new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.
βΌ CVE-2022-35632 βΌ
π Read
via "National Vulnerability Database".
The Velociraptor GUI contains an editor suggestion feature that can display the description field of a VQL function, plugin or artifact. This field was not properly sanitized and can lead to cross-site scripting (XSS). This issue was resolved in Velociraptor 0.6.5-2.π Read
via "National Vulnerability Database".
βΌ CVE-2016-4981 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-4982. Reason: This candidate is a duplicate of CVE-2016-4982. Notes: All CVE users should reference CVE-2016-4982 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-2577 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in SourceCodester Garage Management System 1.0. This vulnerability affects unknown code of the file /edituser.php. The manipulation of the argument id with the input -2'%20UNION%20select%2011,user(),333,444--+ leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2579 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in SourceCodester Garage Management System 1.0. Affected is an unknown function of the file /php_action/createUser.php. The manipulation of the argument userName with the input lala<img src="" onerror=alert(1)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27873 βΌ
π Read
via "National Vulnerability Database".
An attacker can force the victimΓ’β¬β’s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360Γ’β¬β’s document parser. The vulnerability exists in the applicationΓ’β¬β’s Γ’β¬ΛInsert SVGΓ’β¬β’ procedure. An attacker can also leverage this vulnerability to obtain victimΓ’β¬β’s public IP and possibly other sensitive information.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35630 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) issue in generating a collection report made it possible for malicious clients to inject JavaScript code into the static HTML file. This issue was resolved in Velociraptor 0.6.5-2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2578 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in SourceCodester Garage Management System 1.0. This issue affects some unknown processing of the file /php_action/createUser.php. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35631 βΌ
π Read
via "National Vulnerability Database".
On MacOS and Linux, it may be possible to perform a symlink attack by replacing this predictable file name with a symlink to another file and have the Velociraptor client overwrite the other file. This issue was resolved in Velociraptor 0.6.5-2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33881 βΌ
π Read
via "National Vulnerability Database".
Parsing a maliciously crafted PRT file can force Autodesk AutoCAD 2023 to read beyond allocated boundaries. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.π Read
via "National Vulnerability Database".