‼ CVE-2022-45472 ‼
📖 Read
via "National Vulnerability Database".
CAE LearningSpace Enterprise (with Intuity License) image 267r patch 639 allows DOM XSS, related to ontouchmove and onpointerup.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46854 ‼
📖 Read
via "National Vulnerability Database".
mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4045 ‼
📖 Read
via "National Vulnerability Database".
A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4019 ‼
📖 Read
via "National Vulnerability Database".
A denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45462 ‼
📖 Read
via "National Vulnerability Database".
Alarm instance management has command injection when there is a specific command configured. It is only for logged-in users. We recommend you upgrade to version 2.0.6 or higher📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-4044 ‼
📖 Read
via "National Vulnerability Database".
A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages.📖 Read
via "National Vulnerability Database".
🕴 Where Are We Heading With Data Privacy Regulations? 🕴
📖 Read
via "Dark Reading".
New laws have made the current US privacy landscape increasingly complex.📖 Read
via "Dark Reading".
Dark Reading
Where Are We Heading With Data Privacy Regulations?
New laws have made the current US privacy landscape increasingly complex.
🛠 Zeek 5.0.4 🛠
📖 Read
via "Packet Storm Security".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Zeek 5.0.4 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🛠 Packet Fence 12.1.0 🛠
📖 Read
via "Packet Storm Security".
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Packet Fence 12.1.0 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🕴 Penetration Testing Market Size Is Projected to Reach $5.28B Globally by 2028 🕴
📖 Read
via "Dark Reading".
Fueling the trend are the rising adoption of cloud computing solutions, technology advancements, stricter data safety regulations, and the move to digitalization, says Brandessence Market Research.📖 Read
via "Dark Reading".
Dark Reading
Penetration Testing Market Size Is Projected to Reach $5.28B Globally by 2028
Fueling the trend are the rising adoption of cloud computing solutions, technology advancements, stricter data safety regulations, and the move to digitalization, says Brandessence Market Research.
⚠ How to hack an unpatched Exchange server with rogue PowerShell code ⚠
📖 Read
via "Naked Security".
Review your servers, your patches and your authentication policies - there's a proof-of-concept out📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
‼ CVE-2022-42896 ‼
📖 Read
via "National Vulnerability Database".
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44250 ‼
📖 Read
via "National Vulnerability Database".
TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the hostName parameter in the setOpModeCfg function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44278 ‼
📖 Read
via "National Vulnerability Database".
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=user/manage_user&id=.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-42895 ‼
📖 Read
via "National Vulnerability Database".
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44251 ‼
📖 Read
via "National Vulnerability Database".
TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the ussd parameter in the setUssd function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45150 ‼
📖 Read
via "National Vulnerability Database".
A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44260 ‼
📖 Read
via "National Vulnerability Database".
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter sPort/ePort in the setIpPortFilterRules function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45149 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45151 ‼
📖 Read
via "National Vulnerability Database".
The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several "social" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.📖 Read
via "National Vulnerability Database".
👍2
‼ CVE-2022-44139 ‼
📖 Read
via "National Vulnerability Database".
Apartment Visitor Management System v1.0 is vulnerable to SQL Injection via /avms/index.php.📖 Read
via "National Vulnerability Database".