β CryptoRom βpig butcheringβ scam sites seized, suspects arrested in US β
π Read
via "Naked Security".
Five tips to keep yourself, and your friends and family, out of the clutches of "chopping block" scammers...π Read
via "Naked Security".
Naked Security
Multimillion dollar CryptoRom scam sites seized, suspects arrested in US
Five tips to keep yourself, and your friends and family, out of the clutches of βchopping blockβ scammersβ¦
βΌ CVE-2021-35284 βΌ
π Read
via "National Vulnerability Database".
SQL Injection vulnerability in function get_user in login_manager.php in rizalafani cms-php v1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41922 βΌ
π Read
via "National Vulnerability Database".
`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23740 βΌ
π Read
via "National Vulnerability Database".
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40772 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to a validation bypass that allows users to access sensitive data via the report module.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40304 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38113 βΌ
π Read
via "National Vulnerability Database".
This vulnerability discloses build and services versions in the server response header.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35246 βΌ
π Read
via "National Vulnerability Database".
The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption and use the application as a platform for attacks against its users.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39833 βΌ
π Read
via "National Vulnerability Database".
FileCloud Versions 20.2 and later allows remote attackers to potentially cause unauthorized remote code execution and access to reported API endpoints via a crafted HTTP request.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35501 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-site Scripting in Amasty Blog Pro 2.10.4 and 2.10.4 creates post functionality and lower versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36111 βΌ
π Read
via "National Vulnerability Database".
immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40771 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to an XML External Entity attack that leads to Information Disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2009-1142 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38115 βΌ
π Read
via "National Vulnerability Database".
Insecure method vulnerability in which allowed HTTP methods are disclosed. E.g., OPTIONS, DELETE, TRACE, and PUTπ Read
via "National Vulnerability Database".
βΌ CVE-2022-38114 βΌ
π Read
via "National Vulnerability Database".
This vulnerability occurs when a web server fails to correctly process the Content-Length of POST requests. This can lead to HTTP request smuggling or XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2009-1143 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can bypass intended access restrictions on mounting shares via a symlink attack that leverages a realpath race condition in mount.vmhgfs (aka hgfsmounter).π Read
via "National Vulnerability Database".
π΄ Why Africa's Telecoms Must Actively Collaborate to Combat Fraud π΄
π Read
via "Dark Reading".
Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.π Read
via "Dark Reading".
Dark Reading
Why Africa's Telecoms Must Actively Collaborate to Combat Fraud
Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
π΄ How Development Teams Should Respond to Text4Shell π΄
π Read
via "Dark Reading".
Yet another *4Shell exploit highlights the horror of strange visitors into enterprise environments. This Tech Tip focuses on what to do next.π Read
via "Dark Reading".
Dark Reading
How Development Teams Should Respond to Text4Shell
Yet another *4Shell exploit highlights the horror of strange visitors into enterprise environments. This Tech Tip focuses on what to do next.
βΌ CVE-2022-44117 βΌ
π Read
via "National Vulnerability Database".
Boa 0.94.14rc21 is vulnerable to SQL Injection via username.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44120 βΌ
π Read
via "National Vulnerability Database".
dedecmdv6 6.1.9 is vulnerable to SQL Injection. via sys_sql_query.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-45868 βΌ
π Read
via "National Vulnerability Database".
The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that."π Read
via "National Vulnerability Database".