βΌ CVE-2022-32287 βΌ
π Read
via "National Vulnerability Database".
A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.π Read
via "National Vulnerability Database".
βοΈ Hacker Charged With Extorting Online Psychotherapy Service βοΈ
π Read
via "Krebs on Security".
A 25-year-old Finnish man has been charged with extorting a once popular and now-bankrupt online psychotherapy company and its patients. Finnish authorities rarely name suspects in an investigation, but they were willing to make an exception for Julius "Zeekill" Kivimaki, a notorious hacker who -- at the tender age of 17 -- had been convicted of more than 50,000 cybercrimes, including data breaches, payment fraud, operating botnets, and calling in bomb threats.π Read
via "Krebs on Security".
Krebs on Security
Hacker Charged With Extorting Online Psychotherapy Service
A 25-year-old Finnish man has been charged with extorting a once popular and now-bankrupt online psychotherapy company and its patients. Finnish authorities rarely name suspects in an investigation, but they were willing to make an exception for Julius "Zeekill"β¦
βΌ CVE-2022-44622 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity version between 2021.2 and 2022.10 access permissions for secure token health items were excessiveπ Read
via "National Vulnerability Database".
βΌ CVE-2022-39323 βΌ
π Read
via "National Vulnerability Database".
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39234 βΌ
π Read
via "National Vulnerability Database".
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Deleted/deactivated user could continue to use their account as long as its cookie is valid. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43106 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the schedStartTime parameter in the setSchedWifi function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43102 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43105 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the shareSpeed parameter in the fromSetWifiGusetBasic function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44623 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity version before 2022.10, Project Viewer could see scrambled secure values in the MetaRunner settingsπ Read
via "National Vulnerability Database".
βΌ CVE-2022-43101 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43108 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43107 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the time parameter in the setSmartPowerManagement function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39262 βΌ
π Read
via "National Vulnerability Database".
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44646 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity version before 2022.10, no audit items were added upon editing a user's settingsπ Read
via "National Vulnerability Database".
βΌ CVE-2022-39276 βΌ
π Read
via "National Vulnerability Database".
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44624 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity version before 2022.10, Password parameters could be exposed in the build log if they contained special charactersπ Read
via "National Vulnerability Database".
βΌ CVE-2022-39382 βΌ
π Read
via "National Vulnerability Database".
Keystone is a headless CMS for Node.js Γ’β¬β built with GraphQL and React.`@keystone-6/core@3.0.0 || 3.0.1` users that use `NODE_ENV` to trigger security-sensitive functionality in their production builds are vulnerable to `NODE_ENV` being inlined to `"development"` for user code, irrespective of what your environment variables. If you do not use `NODE_ENV` in your user code to trigger security-sensitive functionality, you are not impacted by this vulnerability. Any dependencies that use `NODE_ENV` to trigger particular behaviors (optimizations, security or otherwise) should still respect your environment's configured `NODE_ENV` variable. The application's dependencies, as found in `node_modules` (including `@keystone-6/core`), are typically not compiled as part of this process, and thus should be unaffected. We have tested this assumption by verifying that `NODE_ENV=production yarn keystone start` still uses secure cookies when using `statelessSessions`. This vulnerability has been fixed in @keystone-6/core@3.0.2, regression tests have been added for this vulnerability in #8063.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43103 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parameter in the formSetQosBand function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43109 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43104 βΌ
π Read
via "National Vulnerability Database".
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.π Read
via "National Vulnerability Database".
β S3 Ep107: Eight months to kick out the crooks and you think thatβs GOOD? [Audio + Text] β
π Read
via "Naked Security".
Listen now - latest episode - audio plus full transcriptπ Read
via "Naked Security".
Naked Security
S3 Ep107: Eight months to kick out the crooks and you think thatβs GOOD? [Audio + Text]
Listen now β latest episode β audio plus full transcript
π1