βΌ CVE-2022-1293 βΌ
π Read
via "National Vulnerability Database".
The embedded neutralization of Script-Related HTML Tag, was by-passed in the case of some extra conditions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35217 βΌ
π Read
via "National Vulnerability Database".
The NHI cardΓ’β¬β’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35219 βΌ
π Read
via "National Vulnerability Database".
The NHI cardΓ’β¬β’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet key parameter. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30572 βΌ
π Read
via "National Vulnerability Database".
The iWay Service Manager Console component of TIBCO Software Inc.'s TIBCO iWay Service Manager contains an easily exploitable Directory Traversal vulnerability that allows a low privileged attacker with network access to read arbitrary resources on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO iWay Service Manager: versions 8.0.6 and below.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35218 βΌ
π Read
via "National Vulnerability Database".
The NHI cardΓ’β¬β’s web service component has a heap-based buffer overflow vulnerability due to insufficient validation for packet origin parameter length. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35222 βΌ
π Read
via "National Vulnerability Database".
HiCOS Citizen verification component has a stack-based buffer overflow vulnerability due to insufficient parameter length validation. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23733 βΌ
π Read
via "National Vulnerability Database".
A stored XSS vulnerability was identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes. This injection was blocked by Github's Content Security Policy (CSP). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.3.11, 3.4.6 and 3.5.3. This vulnerability was reported via the GitHub Bug Bounty program.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35221 βΌ
π Read
via "National Vulnerability Database".
Teamplus Pro community discussion has an Γ’β¬Λallocation of resource without limits or throttlingΓ’β¬β’ vulnerability on thread subject field. A remote attacker with general user privilege posting a thread subject with large content can cause the server to allocate too much memory, leading to missing partial post content and disrupt partial service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2631 βΌ
π Read
via "National Vulnerability Database".
Improper Access Control in GitHub repository tooljet/tooljet prior to v1.19.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35223 βΌ
π Read
via "National Vulnerability Database".
EasyUse MailHunter UltimateΓ’β¬β’s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote attacker to execute arbitrary code, manipulate system command or interrupt service.π Read
via "National Vulnerability Database".
π΄ T-Mobile Store Owner Made $25M Using Stolen Employee Credentials π΄
π Read
via "Dark Reading".
Now-convicted phone dealer reset locked and blocked phones on various mobile networks.π Read
via "Dark Reading".
Dark Reading
T-Mobile Store Owner Made $25M Using Stolen Employee Credentials
Now-convicted phone dealer reset locked and blocked phones on various mobile networks.
π΄ Axis Raises the Bar With Modern-Day ZTNA Service that Boasts Hyper-Intelligence, Simplicity, and 350 Global Edges π΄
π Read
via "Dark Reading".
Launches industryβs first ZTNA Migration Tool and ZTNA Buyback Program, setting the stage for migration away from ZTNA 1.0.π Read
via "Dark Reading".
Dark Reading
Axis Raises the Bar With Modern-Day ZTNA Service that Boasts Hyper-Intelligence, Simplicity, and 350 Global Edges
Launches industryβs first ZTNA migration tool and ZTNA buyback program, setting the stage for migration away from ZTNA 1.0.
βΌ CVE-2022-35924 βΌ
π Read
via "National Vulnerability Database".
NextAuth.js is a complete open source authentication solution for Next.js applications. `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `attacker@attacker.com,victim@victim.com`) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim's e-mail addresses. The attacker could then login as a newly created user with the email being `attacker@attacker.com,victim@victim.com`. This means that basic authorization like `email.endsWith("@victim.com")` in the `signIn` callback would fail to communicate a threat to the developer and would let the attacker bypass authorization, even with an `@attacker.com` address. This vulnerability has been patched in `v4.10.3` and `v3.29.10` by normalizing the email value that is sent to the sign-in endpoint before accessing it anywhere else. We also added a `normalizeIdentifier` callback on the `EmailProvider` configuration, where you can further tweak your requirements for what your system considers a valid e-mail address. (E.g.: strict RFC2821 compliance). Users are advised to upgrade. There are no known workarounds for this vulnerability. If for some reason you cannot upgrade, you can normalize the incoming request using Advanced Initialization.π Read
via "National Vulnerability Database".
βοΈ No SOCKS, No Shoes, No Malware Proxy Services! βοΈ
π Read
via "Krebs on Security".
With the recent demise of several popular "proxy" services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly of the Internet. Compounding the problem, several remaining malware-based proxy services have chosen to block new registrations to avoid swamping their networks with a sudden influx of customers.π Read
via "Krebs on Security".
Krebs on Security
No SOCKS, No Shoes, No Malware Proxy Services!
With the recent demise of several popular "proxy" services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly of the Internet. Compounding the problem, severalβ¦
π΄ Manufacturing Sector in 2022 Is More Vulnerable to Account Compromise and Supply Chain Attacks in the Cloud than Other Verticals π΄
π Read
via "Dark Reading".
Netwrix study reveals that manufacturing organizations experienced these types of attacks more often than any other industry surveyed.π Read
via "Dark Reading".
Dark Reading
Manufacturing Sector in 2022 Is More Vulnerable to Account Compromise and Supply Chain Attacks in the Cloud than Other Verticals
Netwrix study reveals that manufacturing organizations experienced these types of attacks more often than any other industry surveyed.
π΄ From Babuk Source Code to Darkside Custom Listings β Exposing a Thriving Ransomware Marketplace on the Dark Web π΄
π Read
via "Dark Reading".
Venafi investigation of 35 million Dark Web URLs shows macro-enabled ransomware widely available at bargain prices.π Read
via "Dark Reading".
Dark Reading
From Babuk Source Code to Darkside Custom Listings β Exposing a Thriving Ransomware Marketplace on the Dark Web
Venafi investigation of 35 million Dark Web URLs shows macro-enabled ransomware widely available at bargain prices.
π΄ Massive New Phishing Campaign Targets Microsoft Email Service Users π΄
π Read
via "Dark Reading".
The campaign uses adversary-in-the-middle techniques to bypass multifactor authentication, evade detection.π Read
via "Dark Reading".
Dark Reading
Massive New Phishing Campaign Targets Microsoft Email Service Users
The campaign uses adversary-in-the-middle techniques to bypass multifactor authentication, evade detection.
π΄ Large Language AI Models Have Real Security Benefits π΄
π Read
via "Dark Reading".
Complex neural networks, including GPT-3, can deliver useful cybersecurity capabilities such as explaining malware and quickly classifying websites, researchers find.π Read
via "Dark Reading".
Dark Reading
Large Language AI Models Have Real Security Benefits
Complex neural networks, including GPT-3, can deliver useful cybersecurity capabilities, such as explaining malware and quickly classifying websites, researchers find.
βΌ CVE-2022-35925 βΌ
π Read
via "National Vulnerability Database".
BookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34924 βΌ
π Read
via "National Vulnerability Database".
Lanling OA Landray Office Automation (OA) internal patch number #133383/#137780 contains an arbitrary file read vulnerability via the component /sys/ui/extend/varkind/custom.jsp.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35923 βΌ
π Read
via "National Vulnerability Database".
v8n is a javascript validation library. Versions of v8n prior to 1.5.1 were found to have an inefficient regular expression complexity in the `lowercase()` and `uppercase()` regex which could lead to a denial of service attack. In testing of the `lowercase()` function a payload of 'a' + 'a'.repeat(i) + 'A' with 32 leading characters took 29443 ms to execute. The same issue happens with uppercase(). Users are advised to upgrade. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".