‼ CVE-2022-35915 ‼
📖 Read
via "National Vulnerability Database".
OpenZeppelin Contracts is a library for secure smart contract development. The target contract of an EIP-165 `supportsInterface` query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost. The issue has been fixed in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31198 ‼
📖 Read
via "National Vulnerability Database".
OpenZeppelin Contracts is a library for secure smart contract development. This issue concerns instances of Governor that use the module `GovernorVotesQuorumFraction`, a mechanism that determines quorum requirements as a percentage of the voting token's total supply. In affected instances, when a proposal is passed to lower the quorum requirements, past proposals may become executable if they had been defeated only due to lack of quorum, and the number of votes it received meets the new quorum requirement. Analysis of instances on chain found only one proposal that met this condition, and we are actively monitoring for new occurrences of this particular issue. This issue has been patched in v4.7.2. Users are advised to upgrade. Users unable to upgrade should consider avoiding lowering quorum requirements if a past proposal was defeated for lack of quorum.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35916 ‼
📖 Read
via "National Vulnerability Database".
OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35917 ‼
📖 Read
via "National Vulnerability Database".
Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied `validateTransfer` function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. This issue has been patched as of version `0.2.1`. Users of the Solana Pay SDK should upgrade to it. There are no known workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35918 ‼
📖 Read
via "National Vulnerability Database".
Streamlit is a data oriented application development framework for python. Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file or overwrite existing files on the web-server. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-37315 ‼
📖 Read
via "National Vulnerability Database".
graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35920 ‼
📖 Read
via "National Vulnerability Database".
Sanic is an opensource python web server/framework. Affected versions of sanic allow access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. Users are advised to upgrade. There is no known workaround for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35922 ‼
📖 Read
via "National Vulnerability Database".
Rust-WebSocket is a WebSocket (RFC6455) library written in Rust. In versions prior to 0.26.5 untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fails to allocate, the default Rust allocator will abort the current process, killing all threads. This affects only sync (non-Tokio) implementation. Async version also does not limit memory, but does not use `with_capacity`, so DoS can happen only when bytes for oversized dataframe or message actually got delivered by the attacker. The crashes are fixed in version 0.26.5 by imposing default dataframe size limits. Affected users are advised to update to this version. Users unable to upgrade are advised to filter websocket traffic externally or to only accept trusted traffic.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35921 ‼
📖 Read
via "National Vulnerability Database".
fof/byobu is a private discussions extension for Flarum forum. Affected versions were found to not respect private discussion disablement by users. Users of Byobu should update the extension to version 1.1.7, where this has been patched. Users of Byobu with Flarum 1.0 or 1.1 should upgrade to Flarum 1.2 or later, or evaluate the impact this issue has on your forum's users and choose to disable the extension if needed. There are no workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35919 ‼
📖 Read
via "National Vulnerability Database".
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpdate API by denying the `admin:ServerUpdate` action for your admin users via IAM policies.📖 Read
via "National Vulnerability Database".
👍2
🕴 5 Steps to Becoming Secure by Design in the Face of Evolving Cyber Threats 🕴
📖 Read
via "Dark Reading".
From adopting zero-trust security models to dynamic environments to operating under an "assumed breach" mentality, here are ways IT departments can reduce vulnerabilities as they move deliberately to become more secure.📖 Read
via "Dark Reading".
Dark Reading
5 Steps to Becoming Secure by Design in the Face of Evolving Cyber Threats
From adopting zero-trust security models to dynamic environments to operating under an "assumed breach" mentality, here are ways IT departments can reduce vulnerabilities as they move deliberately to become more secure.
🕴 CREST Defensible Penetration Test Released 🕴
📖 Read
via "Dark Reading".
CREST provides commercially defensible scoping, delivery, and sign-off recommendations for penetration tests.📖 Read
via "Dark Reading".
Dark Reading
CREST Defensible Penetration Test Released
<p>CREST provides commercially defensible scoping, delivery, and sign-off
recommendations for penetration tests.</p>
recommendations for penetration tests.</p>
🕴 BlackCloak Bolsters Malware Protection With QR Code Scanner and Malicious Calendar Detection Features 🕴
📖 Read
via "Dark Reading".
In conjunction with Black Hat 2022, pioneer of digital executive protection also announces new security innovations and SOC 2 Type II certification.📖 Read
via "Dark Reading".
Dark Reading
BlackCloak Bolsters Malware Protection With QR Code Scanner and Malicious Calendar Detection Features
In conjunction with Black Hat 2022, pioneer of digital executive protection also announces new security innovations and SOC 2 Type II certification.
🕴 Incognia Mobile App Study Reveals Low Detection of Location Spoofing in Dating Apps 🕴
📖 Read
via "Dark Reading".
With over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety.📖 Read
via "Dark Reading".
Dark Reading
Incognia Mobile App Study Reveals Low Detection of Location Spoofing in Dating Apps
With over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety.
🗓️ Trio of XSS bugs in open source web apps could lead to complete system compromise 🗓️
📖 Read
via "The Daily Swig".
Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impact📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Trio of XSS bugs in open source web apps could lead to complete system compromise
Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impact
🕴 VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware 🕴
📖 Read
via "Dark Reading".
Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.📖 Read
via "Dark Reading".
Dark Reading
VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware
Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.
‼ CVE-2020-28437 ‼
📖 Read
via "National Vulnerability Database".
This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28434 ‼
📖 Read
via "National Vulnerability Database".
This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-7795 ‼
📖 Read
via "National Vulnerability Database".
The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25867 ‼
📖 Read
via "National Vulnerability Database".
The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28433 ‼
📖 Read
via "National Vulnerability Database".
This affects all versions of package node-latex-pdf.📖 Read
via "National Vulnerability Database".