βΌ CVE-2022-39028 βΌ
π Read
via "National Vulnerability Database".
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26527 βΌ
π Read
via "National Vulnerability Database".
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packetsΓ’β¬β’ reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25635 βΌ
π Read
via "National Vulnerability Database".
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for broadcast network packet length. An unauthenticated attacker in the adjacent network can exploit this vulnerability to disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3022 βΌ
π Read
via "National Vulnerability Database".
Stack-based Buffer Overflow in GitHub repository arnoldaldrin/binaries prior to 1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26529 βΌ
π Read
via "National Vulnerability Database".
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for segmented packetsΓ’β¬β’ link parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46837 βΌ
π Read
via "National Vulnerability Database".
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25646 βΌ
π Read
via "National Vulnerability Database".
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38116 βΌ
π Read
via "National Vulnerability Database".
Le-yan Personnel and Salary Management System has hard-coded database account and password within the website source code. An unauthenticated remote attacker can access, modify system data or disrupt service.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-25887 βΌ
π Read
via "National Vulnerability Database".
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-2330 βΌ
π Read
via "National Vulnerability Database".
Improper Restriction of XML External Entity Reference vulnerability in DLP Endpoint for Windows prior to 11.9.100 and 11.6.600 allows a remote attacker to cause the DLP Agent to access a local service that the attacker wouldn't usually have access to via a carefully constructed XML file, which the DLP Agent doesn't parse correctly.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38118 βΌ
π Read
via "National Vulnerability Database".
OAKlouds Portal websiteΓ’β¬β’s Meeting Room has insufficient validation for user input. A remote attacker with general user privilege can perform SQL-injection to access, modify, delete database, perform system operations and disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25857 βΌ
π Read
via "National Vulnerability Database".
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26528 βΌ
π Read
via "National Vulnerability Database".
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packetsΓ’β¬β’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.π Read
via "National Vulnerability Database".
ποΈ Graph-based JavaScript bug scanner discovers more than 100 zero-day vulnerabilities in Node.js libraries ποΈ
π Read
via "The Daily Swig".
ODGen tool was presented at this yearβs Usenix Security Symposiumπ Read
via "The Daily Swig".
portswigger.net
Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
β LastPass source code breach β do we still recommend password managers? β
π Read
via "Naked Security".
What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?π Read
via "Naked Security".
Naked Security
LastPass source code breach β do we still recommend password managers?
What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?
π1
βΌ CVE-2022-3063 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Generic in GitHub repository nuxt/framework prior to -.π Read
via "National Vulnerability Database".
π΄ A Peek Into CISA's Post-Quantum Cryptography Roadmap π΄
π Read
via "Dark Reading".
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.π Read
via "Dark Reading".
Dark Reading
A Peek Into CISA's Post-Quantum Cryptography Roadmap
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.
π΄ Cerberus Sentinel Announces Acquisition of CUATROi π΄
π Read
via "Dark Reading".
US cybersecurity services firm expands services in Latin America.π Read
via "Dark Reading".
Dark Reading
Cerberus Sentinel Announces Acquisition of CUATROi
US cybersecurity services firm expands services in Latin America.
π1
π΄ Building a Strong SOC Starts With People π΄
π Read
via "Dark Reading".
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.π Read
via "Dark Reading".
Dark Reading
Building a Strong SOC Starts With People
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.
π΄ Phishing Campaign Targets PyPI Users to Distribute Malicious Code π΄
π Read
via "Dark Reading".
The first-of-its-kind campaign threatens to remove code packages if developers donβt submit their code to a "validation" process.π Read
via "Dark Reading".
Dark Reading
Phishing Campaign Targets PyPI Users to Distribute Malicious Code
The first-of-its-kind campaign threatens to remove code packages if developers donβt submit their code to a "validation" process.
βοΈ How 1-Time Passcodes Became a Corporate Liability βοΈ
π Read
via "Krebs on Security".
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling to combat the same lingering security threat: The ability of scammers to interact directly with employees through their mobile devices.π Read
via "Krebs on Security".
Krebs on Security
How 1-Time Passcodes Became a Corporate Liability
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks fromβ¦