βΌ CVE-2022-20855 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20818 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40944 βΌ
π Read
via "National Vulnerability Database".
Dairy Farm Shop Management System 1.0 is vulnerable to SQL Injection via sales-report-ds.php file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20856 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) Mobility messages in Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a logic error and improper management of resources related to the handling of CAPWAP Mobility messages. An attacker could exploit this vulnerability by sending crafted CAPWAP Mobility packets to an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device. This would cause the device to reload, resulting in a DoS condition.π Read
via "National Vulnerability Database".
π΄ LA School District Ransomware Attackers Now Threaten to Leak Stolen Data π΄
π Read
via "Dark Reading".
Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.π Read
via "Dark Reading".
Darkreading
LA School District Ransomware Attackers Now Threaten to Leak Stolen Data
Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.
π΄ Worried About the Exchange Zero-Day? Here's What to Do π΄
π Read
via "Dark Reading".
While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.π Read
via "Dark Reading".
Darkreading
Worried About the Exchange Zero-Day? Here's What to Do
While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
π€1
βΌ CVE-2022-42002 βΌ
π Read
via "National Vulnerability Database".
SonicJS through 0.6.0 allows file overwrite. It has the following mutations that are used for updating files: fileCreate and fileUpdate. Both of these mutations can be called without any authentication to overwrite any files on a SonicJS application, leading to Arbitrary File Write and Delete.π Read
via "National Vulnerability Database".
β S3 Ep102.5: βProxyNotShellβ Exchange bugs β an expert speaks [Audio + Text] β
π Read
via "Naked Security".
Who's affected, what you can do while waiting for Microsoft's patches, and how to plan your threat hunting...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
ποΈ Nepxion Discovery software with Spring Cloud functionality fails to patch RCE, info leak bugs ποΈ
π Read
via "The Daily Swig".
Maintainer of Chinese project closes public issue apparently without issuing a fixπ Read
via "The Daily Swig".
ποΈ Microsoft confirms zero-day exploits against Exchange Server in βlimitedβ attacks ποΈ
π Read
via "The Daily Swig".
βProxyNotShellβ abuse less severe than 2021 attack wave due to authentication requirementπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Microsoft confirms zero-day exploits against Exchange Server in βlimitedβ attacks
βProxyNotShellβ abuse less severe than 2021 attack wave due to authentication requirement
βΌ CVE-2022-40123 βΌ
π Read
via "National Vulnerability Database".
mojoPortal v2.7 was discovered to contain a path traversal vulnerability via the "f" parameter at /DesignTools/CssEditor.aspx. This vulnerability allows authenticated attackers to read arbitrary files in the system.π Read
via "National Vulnerability Database".
π2
βΌ CVE-2022-40922 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38817 βΌ
π Read
via "National Vulnerability Database".
Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36551 βΌ
π Read
via "National Vulnerability Database".
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32173 βΌ
π Read
via "National Vulnerability Database".
In OrchardCore rc1-11259 to v1.2.2 vulnerable to HTML injection, allow an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users.π Read
via "National Vulnerability Database".
π΄ Name That Edge Toon: Mumbo Dumbo π΄
π Read
via "Dark Reading".
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading".
Darkreading
Name That Edge Toon: Mumbo Dumbo
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
βΌ CVE-2022-33882 βΌ
π Read
via "National Vulnerability Database".
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41443 βΌ
π Read
via "National Vulnerability Database".
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42247 βΌ
π Read
via "National Vulnerability Database".
pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.π Read
via "National Vulnerability Database".
π΄ Bumblebee Malware Loader's Payloads Significantly Vary by Victim System π΄
π Read
via "Dark Reading".
On some systems the malware drops infostealers and banking Trojans; on others it installs sophisticated post-compromise tools, new analysis shows.π Read
via "Dark Reading".
Dark Reading
Bumblebee Malware Loader's Payloads Significantly Vary by Victim System
On some systems the malware drops infostealers and banking Trojans; on others it installs sophisticated post-compromise tools, new analysis shows.
π΄ Vice Society Publishes LA Public School Student Data, Psych Evals π΄
π Read
via "Dark Reading".
After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang.π Read
via "Dark Reading".
Dark Reading
Vice Society Publishes LA Public School Student Data, Psych Evals
After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang.
π1