βΌ CVE-2022-38297 βΌ
π Read
via "National Vulnerability Database".
UCMS v1.6.0 contains an authentication bypass vulnerability which is exploited via cookie poisoning.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38299 βΌ
π Read
via "National Vulnerability Database".
An issue in the Elasticsearch plugin of Appsmith v1.7.11 allows attackers to connect disallowed hosts to the AWS/GCP internal metadata endpoint.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38304 βΌ
π Read
via "National Vulnerability Database".
Online Leave Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /maintenance/manage_leave_type.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35572 βΌ
π Read
via "National Vulnerability Database".
On Linksys E5350 WiFi Router with firmware version 1.0.00.037 and lower, (and potentially other vendors/devices due to code reuse), the /SysInfo.htm URI does not require a session ID. This web page calls a show_sysinfo function which retrieves WPA passwords, SSIDs, MAC Addresses, serial numbers, WPS Pins, and hardware/firmware versions, and prints this information into the web page. This web page is visible when remote management is enabled. A user who has access to the web interface of the device can extract these secrets. If the device has remote management enabled and is connected directly to the internet, this vulnerability is exploitable over the internet without interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38302 βΌ
π Read
via "National Vulnerability Database".
Online Leave Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /maintenance/manage_department.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38303 βΌ
π Read
via "National Vulnerability Database".
Online Leave Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /employees/manage_leave_type.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38298 βΌ
π Read
via "National Vulnerability Database".
Appsmith v1.7.11 was discovered to allow attackers to execute an authenticated Server-Side Request Forgery (SSRF) via redirecting incoming requests to the AWS internal metadata endpoint.π Read
via "National Vulnerability Database".
π’ New approach to ransomware encryption threatens to undermine cyber security strategies π’
π Read
via "ITPro".
Intermittent encryption is already in use with ransomware such as BlackCat and Qyick, and could mark a widespread shift in the threat landscapeπ Read
via "ITPro".
IT PRO
New approach to ransomware encryption threatens to undermine cyber security strategies | IT PRO
Intermittent encryption is already in use with ransomware such as BlackCat and Qyick, and could mark a widespread shift in the threat landscape
π’ Iranian Ministry of Intelligence sanctioned after Albania cyber attack π’
π Read
via "ITPro".
Iran faces stiff criticism from Nato, the US, and the UK for βincreasingly aggressiveβ cyber operationsπ Read
via "ITPro".
IT PRO
Iranian Ministry of Intelligence sanctioned after Albania cyber attack | IT PRO
Iran faces stiff criticism from Nato, the US, and the UK for βincreasingly aggressiveβ cyber operations
π’ Googleβs Project Zero is frightening and reassuring in equal measure π’
π Read
via "ITPro".
This crack team of security researchers are doing work we should all be grateful forπ Read
via "ITPro".
IT PRO
Googleβs Project Zero is frightening and reassuring in equal measure | IT PRO
This crack team of security researchers are doing work we should all be grateful for
π’ Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs π’
π Read
via "ITPro".
Researchers revealed the details of the six vulnerabilities at Black Hat in August but many laptops, desktops, and workstations remain vulnerableπ Read
via "ITPro".
IT PRO
Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs | IT PRO
Researchers revealed the details of the six vulnerabilities at Balck Hat in August but many laptops, desktops, and workstations remain vulnerable
π’ A breakdown of iOS 16's security features π’
π Read
via "ITPro".
Digital passkeys, faster security updates and a 15-minute window to fix or recall iMessages and emailsπ Read
via "ITPro".
IT PRO
A breakdown of iOS 16's security features | IT PRO
Digital passkeys, faster security updates and a 15-minute window to fix or recall iMessages and emails
π’ What is your digital footprint? π’
π Read
via "ITPro".
Your digital footprint is always growing β so we explore how you can keep it under controlπ Read
via "ITPro".
IT PRO
What is your digital footprint? | IT PRO
Your digital footprint is always growing β so we explore how you can keep it under control
π2
π’ CISA warns against actively exploited Chrome and D-Link security flaws π’
π Read
via "ITPro".
The agency has made it imperative for all FCEB agencies to patch their systems before September 29π Read
via "ITPro".
IT PRO
CISA warns against actively exploited Chrome and D-Link security flaws | IT PRO
The agency has made it imperative for all FCEB agencies to patch their systems before September 29
βΌ CVE-2022-38616 βΌ
π Read
via "National Vulnerability Database".
SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id90 parameter at /feegroups/tgrt_group.jsf.π Read
via "National Vulnerability Database".
π΄ Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems π΄
π Read
via "Dark Reading".
The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.π Read
via "Dark Reading".
Dark Reading
Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems
The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.
ποΈ Letβs Encrypt builds infrastructure to support browser-based certificate revocation revival ποΈ
π Read
via "The Daily Swig".
CRLs are back, baby!π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Letβs Encrypt builds infrastructure to support browser-based certificate revocation revival
CRLs are back, baby!
π1
βΌ CVE-2022-36779 βΌ
π Read
via "National Vulnerability Database".
PROSCEND - PROSCEND / ADVICE .Ltd - G/5G Industrial Cellular Router (with GPS)4 Unauthenticated OS Command Injection Proscend M330-w / M33-W5 / M350-5G / M350-W5G / M350-6 / M350-W6 / M301-G / M301-GW ADVICE ICR 111WG / https://www.proscend.com/en/category/industrial-Cellular-Router/industrial-Cellular-Router.html https://cdn.shopify.com/s/files/1/0036/9413/3297/files/ADVICE_Industrial_4G_LTE_Cellular_Router_ICR111WG.pdf?v=1620814301π Read
via "National Vulnerability Database".
βΌ CVE-2022-36385 βΌ
π Read
via "National Vulnerability Database".
A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38541 βΌ
π Read
via "National Vulnerability Database".
Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36782 βΌ
π Read
via "National Vulnerability Database".
Pal Electronics Systems - Pal Gate Authorization Errors. The vulnerability is an authorization problem in PalGate device management android client app. Gates of bulidings and parking lots with a simple button in any smartphone. The API was found after a decompiling and static research using Jadx, and a dynamic analasys using Frida. The attacker can iterate over all the IOT devices to see every entry and exit, on every gate and device all over the world, he can also scrape the server and create a user's DB with full names and phone number of over 2.8 million users, and to see all of the users' movement in and out of gates, even in real time.π Read
via "National Vulnerability Database".