π’ Phishing attacks targeting US government have evolved in sophistication, Cofense reports π’
π Read
via "ITPro".
The scams are aimed at stealing federal employees' Microsoft 365 credentialsπ Read
via "ITPro".
ITPro
Phishing attacks targeting US government have evolved in sophistication, Cofense reports
The scams are aimed at stealing federal employees' Microsoft 365 credentials
π’ WatchGuard Firebox T20-W review π’
π Read
via "ITPro".
This affordable desktop appliance is a great choice for protecting small offices and home workersπ Read
via "ITPro".
IT PRO
WatchGuard Firebox T20-W review: Enterprise-grade protection for remote staff | IT PRO
This affordable desktop appliance is a great choice for protecting small offices and home workers
π’ Australian telco Optus confirms cyber attack involving potential leak of sensitive customer data π’
π Read
via "ITPro".
Investigations are ongoing but early signs indicate that some customers may have had identity documents and other identifying information exposed to hackersπ Read
via "ITPro".
IT PRO
Australian telco Optus confirms cyber attack involving potential leak of sensitive customer data | IT PRO
Investigations are ongoing but early signs indicate that some customers may have had identity documents and other identifying information exposed to hackers
β Uber and Rockstar β has a LAPSUS$ linchpin just been busted (again)? β
π Read
via "Naked Security".
Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?π Read
via "Naked Security".
Naked Security
Uber and Rockstar β has a LAPSUS$ linchpin just been busted (again)?
Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?
β Morgan Stanley fined millions for selling off devices full of customer PII β
π Read
via "Naked Security".
Critical data on old disks always seems inaccessible if you really need it. But when you DON''T want it back, guess what happens...π Read
via "Naked Security".
Naked Security
Morgan Stanley fined millions for selling off devices full of customer PII
Critical data on old disks always seems inaccessible if you really need it. But when you DONβT want it back, guess what happensβ¦
βΌ CVE-2022-3296 βΌ
π Read
via "National Vulnerability Database".
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3297 βΌ
π Read
via "National Vulnerability Database".
Use After Free in GitHub repository vim/vim prior to 9.0.0579.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41343 βΌ
π Read
via "National Vulnerability Database".
registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41347 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41352 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36159 βΌ
π Read
via "National Vulnerability Database".
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36158 βΌ
π Read
via "National Vulnerability Database".
Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi).π Read
via "National Vulnerability Database".
βΌ CVE-2022-3301 βΌ
π Read
via "National Vulnerability Database".
Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38553 βΌ
π Read
via "National Vulnerability Database".
Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38970 βΌ
π Read
via "National Vulnerability Database".
ieGeek IG20 hipcam RealServer V1.0 is vulnerable to Incorrect Access Control. The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to arbitrary devices.π Read
via "National Vulnerability Database".
ποΈ Java template framework Pebble vulnerable to command injection ποΈ
π Read
via "The Daily Swig".
Issue still yet to be patched, but workarounds are availableπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Java template framework Pebble vulnerable to command injection
Issue still yet to be patched, but workarounds are available
βΌ CVE-2022-3024 βΌ
π Read
via "National Vulnerability Database".
The Simple Bitcoin Faucets WordPress plugin through 1.7.0 does not have any authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscribers to call it and add/delete/edit Bonds. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issuesπ Read
via "National Vulnerability Database".
βΌ CVE-2022-1755 βΌ
π Read
via "National Vulnerability Database".
The SVG Support WordPress plugin before 2.5 does not properly handle SVG added via an URL, which could allow users with a role as low as author to perform Cross-Site Scripting attacksπ Read
via "National Vulnerability Database".
βΌ CVE-2022-40924 βΌ
π Read
via "National Vulnerability Database".
Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point of the "save_animal" file of the "Animals" module in the background management system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3119 βΌ
π Read
via "National Vulnerability Database".
The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email addressπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3135 βΌ
π Read
via "National Vulnerability Database".
The SEO Smart Links WordPress plugin through 3.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)π Read
via "National Vulnerability Database".