βΌ CVE-2022-33928 βΌ
π Read
via "National Vulnerability Database".
Dell Wyse Management Suite 3.6.1 and below contains an Plain-text Password Storage Vulnerability in UI. An attacker with low privileges could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2756 βΌ
π Read
via "National Vulnerability Database".
Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33929 βΌ
π Read
via "National Vulnerability Database".
Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33927 βΌ
π Read
via "National Vulnerability Database".
Dell Wyse Management Suite 3.6.1 and below contains a Session Fixation vulnerability. A unauthenticated attacker could exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22411 βΌ
π Read
via "National Vulnerability Database".
IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35280 βΌ
π Read
via "National Vulnerability Database".
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 230634.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20713 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input that is passed to the Clientless SSL VPN component. An attacker could exploit this vulnerability by convincing a targeted user to visit a website that can pass malicious requests to an ASA device that has the Clientless SSL VPN feature enabled. A successful exploit could allow the attacker to conduct browser-based attacks, including cross-site scripting attacks, against the targeted user.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22490 βΌ
π Read
via "National Vulnerability Database".
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. IBM X-Force ID: 226342.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22369 βΌ
π Read
via "National Vulnerability Database".
IBM Workload Scheduler 9.4 and 9.5 could allow a local user to overwrite key system files which would cause the system to crash. IBM X-Force ID: 221187.π Read
via "National Vulnerability Database".
π΄ Rethinking Software in the Organizational Hierarchy π΄
π Read
via "Dark Reading".
Least privilege is a good defense normally applied only to users. What if we limited apps' access to other apps and network resources based on their roles and responsibilities?π Read
via "Dark Reading".
Dark Reading
Rethinking Software in the Organizational Hierarchy
Least privilege is a good defense normally applied only to users. What if we limited apps' access to other apps and network resources based on their roles and responsibilities?
π1
π΄ Many ZTNA, MFA Tools Offer Little Protection Against Cookie Session Hijacking Attacks π΄
π Read
via "Dark Reading".
Many of the technologies and services that organizations are using to isolate Internet traffic from the internal network lack session validation mechanisms, security startup says.π Read
via "Dark Reading".
Dark Reading
Many ZTNA, MFA Tools Offer Little Protection Against Cookie Session Hijacking Attacks
Many of the technologies and services that organizations are using to isolate Internet traffic from the internal network lack session validation mechanisms, security startup says.
ποΈ Black Hat USA: Former CISA director Chris Krebs warns clouds of cyberwar are circling Taiwan ποΈ
π Read
via "The Daily Swig".
Attack on Taiwan seemingly a case of βwhenβ not βifβ Chris Krebs, the former director of the US Cybersecurity and Infrastructure Security Agency (CISA), is βbearish in the short term, bullish in the lπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Black Hat USA: Ex-CISA director Chris Krebs urges orgs to bolster infrastructure amid Taiwan tensions
Attack on Taiwan seemingly a case of βwhenβ not βifβ Chris Krebs, the former director of the US Cybersecurity and Infrastructure Security Agency (CISA), says the infosec industry is βbearish in the sh
π΄ Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance π΄
π Read
via "Dark Reading".
Four serious security issues on the popular appliance could be exploited by hackers with any level of access within the host network, Bitdefender researchers say.π Read
via "Dark Reading".
Dark Reading
Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance
Four serious security issues on the popular appliance could be exploited by hackers with any level of access within the host network, Bitdefender researchers say.
βΌ CVE-2022-20360 βΌ
π Read
via "National Vulnerability Database".
In setChecked of SecureNfcPreferenceController.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228314987π Read
via "National Vulnerability Database".
βΌ CVE-2022-30580 βΌ
π Read
via "National Vulnerability Database".
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35538 βΌ
π Read
via "National Vulnerability Database".
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20356 βΌ
π Read
via "National Vulnerability Database".
In shouldAllowFgsWhileInUsePermissionLocked of ActiveServices.java, there is a possible way to start foreground service from background due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-215003903π Read
via "National Vulnerability Database".
βΌ CVE-2022-20345 βΌ
π Read
via "National Vulnerability Database".
In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-230494481π Read
via "National Vulnerability Database".
βΌ CVE-2022-1962 βΌ
π Read
via "National Vulnerability Database".
Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20355 βΌ
π Read
via "National Vulnerability Database".
In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219498290π Read
via "National Vulnerability Database".
βΌ CVE-2022-37001 βΌ
π Read
via "National Vulnerability Database".
The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash.π Read
via "National Vulnerability Database".