βΌ CVE-2022-38100 βΌ
π Read
via "National Vulnerability Database".
The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38540 βΌ
π Read
via "National Vulnerability Database".
Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the create_kill_session interface.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38453 βΌ
π Read
via "National Vulnerability Database".
Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36780 βΌ
π Read
via "National Vulnerability Database".
Avdor CIS - crystal quality Credentials Management Errors. The product is phone call recorder, you can hear all the recorded calls without authenticate to the system. Attacker sends crafted URL to the system: ip:port//V=2;ChannellD=number;Ext=number;Command=startLM;Client=number;Request=number;R=number number - id of the recorded number.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1278 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1602 βΌ
π Read
via "National Vulnerability Database".
A potential security vulnerability has been identified in HP ThinPro 7.2 Service Pack 8 (SP8). The security vulnerability in SP8 is not remedied after upgrading from SP8 to Service Pack 9 (SP9). HP has released Service Pack 10 (SP10) to remediate the potential vulnerability introduced in SP8.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3190 βΌ
π Read
via "National Vulnerability Database".
Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture fileπ Read
via "National Vulnerability Database".
βΌ CVE-2022-38542 βΌ
π Read
via "National Vulnerability Database".
Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the kill_session interface.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38537 βΌ
π Read
via "National Vulnerability Database".
Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface.π Read
via "National Vulnerability Database".
π΄ Arcserve Independent Global Study Finds Businesses Still Losing Mission-Critical Company Data π΄
π Read
via "Dark Reading".
.π Read
via "Dark Reading".
Dark Reading
Arcserve Independent Global Study Finds Businesses Still Losing Mission-Critical Company Data
.
π΄ Opus Security Emerges from Stealth with $10M in Funding for Cloud SecOps and Remediation Processes π΄
π Read
via "Dark Reading".
Siemplify veterans introduce Cloud Security Orchestration and Remediation platform, backed by high-profile investors including YL Ventures, Tiger Global, and CEOs of CrowdStrike and CyberArkπ Read
via "Dark Reading".
Dark Reading
Opus Security Emerges from Stealth with $10M in Funding for Cloud SecOps and Remediation Processes
Siemplify veterans introduce Cloud Security Orchestration and Remediation platform, backed by high-profile investors including YL Ventures, Tiger Global, and CEOs of CrowdStrike and CyberArk
π΄ Name That Toon: Shiver Me Timbers! π΄
π Read
via "Dark Reading".
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading".
Dark Reading
Name That Toon: Shiver Me Timbers!
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
π CISA Seeks Comment on Cyber Incident Reporting Rules π
π Read
via "".
CISA has taken the first step towards implementing a law that will require U.S. critical infrastructure to report cybersecurity incidents to the government.π Read
via "".
π€1π€―1
βΌ CVE-2022-36020 βΌ
π Read
via "National Vulnerability Database".
The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package `masterminds/html5`, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of `typo3/html-sanitizer`. This issue has been addressed in versions 1.0.7 and 2.0.16 of the `typo3/html-sanitizer` package. Users are advised to upgrade. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36103 βΌ
π Read
via "National Vulnerability Database".
Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default in the baseline policy. Clusters that don't run untrusted workloads are not affected. Clusters with correct Pod Security configurations which don't allow hostPath mounts, and secure access to cloud metadata server (or machine configuration is not supplied via cloud metadata server) are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35298 βΌ
π Read
via "National Vulnerability Database".
SAP NetWeaver Enterprise Portal (KMC) - version 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. KMC servlet is vulnerable to XSS attack. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victimΓ’β¬β’s web browser session.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35292 βΌ
π Read
via "National Vulnerability Database".
In SAP Business One application when a service is created, the executable path contains spaces and isnΓ’β¬β’t enclosed within quotes, leading to a vulnerability known as Unquoted Service Path which allows a user to gain SYSTEM privileges. If the service is exploited by adversaries, it can be used to gain privileged permissions on a system or network leading to high impact on Confidentiality, Integrity, and Availability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3170 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the system or potentially escalate their privileges on the system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39799 βΌ
π Read
via "National Vulnerability Database".
An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. This could lead to stealing session information and impersonating the affected user.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35295 βΌ
π Read
via "National Vulnerability Database".
Under certain conditions, the application SAP BusinessObjects Business Intelligence Platform (Version Management System) - versions 420, 430, exposes sensitive information to an actor over the network with high privileges that is not explicitly authorized to have access to that information, leading to a high impact on Confidentiality.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3179 βΌ
π Read
via "National Vulnerability Database".
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2.π Read
via "National Vulnerability Database".