🛠 GNUnet P2P Framework 0.17.3 🛠
📖 Read
via "Packet Storm Security".
GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.📖 Read
via "Packet Storm Security".
Packetstormsecurity
GNUnet P2P Framework 0.17.3 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🔏 Friday Five 8/5 🔏
📖 Read
via "".
New and dangerous scams are on the rise, your sensitive information may be at risk due to an unlikely party, and tensions between Taiwan and China look to be escalating. Read all about these stories and more in this week’s Friday Five.
📖 Read
via "".
🗓️ XSS in Gmail’s AMP For Email earns researcher $5,000 🗓️
📖 Read
via "The Daily Swig".
Researcher bypasses email filter with inspired style tag trickery📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
XSS in Gmail’s AMP For Email earns researcher $5,000
Researcher bypasses email filter with inspired style tag trickery
🕴 Stolen Data Gives Attackers Advantage Against Text-Based 2FA 🕴
📖 Read
via "Dark Reading".
With names, email addresses, and mobile numbers from underground databases, one person in five is at risk of account compromise even with SMS two-factor authentication in place.📖 Read
via "Dark Reading".
Dark Reading
Stolen Data Gives Attackers Advantage Against Text-Based 2FA
With names, email addresses, and mobile numbers from underground databases, one person in five is at risk of account compromise even with SMS two-factor authentication in place.
👍1
🕴 Fresh RapperBot Malware Variant Brute-Forces Its Way Into SSH Servers 🕴
📖 Read
via "Dark Reading".
Over the past few weeks, a Mirai variant appears to have made a pivot from infecting new servers to maintaining remote access.📖 Read
via "Dark Reading".
Dark Reading
Fresh RapperBot Malware Variant Brute-Forces Its Way Into SSH Servers
Over the past few weeks, a Mirai variant appears to have made a pivot from infecting new servers to maintaining remote access.
👍1
⚠ Traffic Light Protocol for cybersecurity responders gets a revamp ⚠
📖 Read
via "Naked Security".
Traffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data - three colours that everyone knows.📖 Read
via "Naked Security".
Naked Security
Traffic Light Protocol for cybersecurity responders gets a revamp
Traffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data – three colours that everyone knows.
🕴 A Ransomware Explosion Fosters Thriving Dark Web Ecosystem 🕴
📖 Read
via "Dark Reading".
For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.📖 Read
via "Dark Reading".
Dark Reading
A Ransomware Explosion Fosters Thriving Dark Web Ecosystem
For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.
🕴 Genesis IAB Market Brings Polish to the Dark Web 🕴
📖 Read
via "Dark Reading".
As the market for initial access brokers matures, services like Genesis — which offers elite access to compromised systems and slick, professional services — are raising the bar in the underground economy.📖 Read
via "Dark Reading".
Dark Reading
Genesis IAB Market Brings Polish to the Dark Web
As the market for initial access brokers matures, services like Genesis — which offers elite access to compromised systems and slick, professional services — are raising the bar in the underground economy.
‼ CVE-2022-2499 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered in GitLab EE affecting all versions starting from 13.10 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab's Jira integration has an insecure direct object reference vulnerability that may be exploited by an attacker to leak Jira issues.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-33715 ‼
📖 Read
via "National Vulnerability Database".
Improper access control and path traversal vulnerability in LauncherProvider prior to SMR Aug-2022 Release 1 allow local attacker to access files of One UI.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31658 ‼
📖 Read
via "National Vulnerability Database".
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2675 ‼
📖 Read
via "National Vulnerability Database".
Using off-the-shelf commodity hardware, the Unitree Go 1 robotics platform version H0.1.7 and H0.1.9 (using firmware version 0.1.35) can be powered down by an attacker within normal RF range without authentication. Other versions may be affected, such as the A1.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2531 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab was not performing correct authentication on Grafana API under specific conditions allowing unauthenticated users to perform queries through a path traversal vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2053 ‼
📖 Read
via "National Vulnerability Database".
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46681 ‼
📖 Read
via "National Vulnerability Database".
A XSS vulnerability exist in Pandora FMS version 756 and below, that allows an attacker to perform javascript code executions via module massive operation name field.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31660 ‼
📖 Read
via "National Vulnerability Database".
VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2303 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered in GitLab CE/EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for group members to bypass 2FA enforcement enabled at the group level by using Resource Owner Password Credentials grant to obtain an access token without using 2FA.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31656 ‼
📖 Read
via "National Vulnerability Database".
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-29071 ‼
📖 Read
via "National Vulnerability Database".
This advisory documents an internally found vulnerability in the on premises deployment model of Arista CloudVision Portal (CVP) where under a certain set of conditions, user passwords can be leaked in the Audit and System logs. The impact of this vulnerability is that the CVP user login passwords might be leaked to other authenticated users.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-33718 ‼
📖 Read
via "National Vulnerability Database".
An improper access control vulnerability in Wi-Fi Service prior to SMR AUG-2022 Release 1 allows untrusted applications to manipulate the list of apps that can use mobile data.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27798 ‼
📖 Read
via "National Vulnerability Database".
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability in Brocade Fabric OS versions v7.4.1b and v7.3.1d could allow local users to conduct privileged directory transversal. Brocade Fabric OS versions v7.4.1.x and v7.3.x have reached end of life. Brocade Fabric OS Users should upgrade to supported versions as described in the Product End-of-Life Publish report.📖 Read
via "National Vulnerability Database".