π΄ The Evolution of Business Email Compromise π΄
π Read
via "Dark Reading".
The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.π Read
via "Dark Reading".
Dark Reading
The Evolution of Business Email Compromise
The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.
π΄ API Secrets: Where the Bearer Model Breaks Down π΄
π Read
via "Dark Reading".
Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.π Read
via "Dark Reading".
Dark Reading
API Secrets: Where the Bearer Model Breaks Down
Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.
βΌ CVE-2022-24441 βΌ
π Read
via "National Vulnerability Database".
The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as Γ’β¬ΛtrustedΓ’β¬β’ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versionsπ Read
via "National Vulnerability Database".
βΌ CVE-2022-22984 βΌ
π Read
via "National Vulnerability Database".
The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26366 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in AdRotate Banner Manager Plugin <= 5.9 on WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38801 βΌ
π Read
via "National Vulnerability Database".
In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38803 βΌ
π Read
via "National Vulnerability Database".
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDFπ Read
via "National Vulnerability Database".
βΌ CVE-2022-38802 βΌ
π Read
via "National Vulnerability Database".
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDFπ Read
via "National Vulnerability Database".
βΌ CVE-2022-45842 βΌ
π Read
via "National Vulnerability Database".
Unauth. Race Condition vulnerability in WP ULike Plugin <= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4242 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214592.π Read
via "National Vulnerability Database".
π΄ SPHERE Receives $31M for Series B Funding From Edison Partners, Forgepoint Capital π΄
π Read
via "Dark Reading".
New investment will accelerate growth and expansion of SaaS identity-hygiene platform.π Read
via "Dark Reading".
Dark Reading
SPHERE Receives $31M for Series B Funding From Edison Partners, Forgepoint Capital
New investment will accelerate growth and expansion of SaaS identity-hygiene platform.
π1
π΄ How Banks Can Upgrade Security Without Affecting Client Service π΄
π Read
via "Dark Reading".
New protective measures work behind the scenes, with little impact on the customer experience.π Read
via "Dark Reading".
Dark Reading
How Banks Can Upgrade Security Without Affecting Client Service
New protective measures work behind the scenes, with little impact on the customer experience.
π1
β Serious Security: MD5 considered harmful β to the tune of $600,000 β
π Read
via "Naked Security".
It's not just the hashing, by the way. It's the salting and the stretching, too!π Read
via "Naked Security".
Naked Security
Serious Security: MD5 considered harmful β to the tune of $600,000
Itβs not just the hashing, by the way. Itβs the salting and the stretching, too!
βΌ CVE-2022-44294 βΌ
π Read
via "National Vulnerability Database".
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/manage_service&id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4234 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Canteen Management System. It has been rated as problematic. This issue affects the function builtin_echo of the file youthappam/brand.php. The manipulation of the argument brand_name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214595.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44151 βΌ
π Read
via "National Vulnerability Database".
Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44296 βΌ
π Read
via "National Vulnerability Database".
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/quotes/manage_remark.php?id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44295 βΌ
π Read
via "National Vulnerability Database".
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/orders/assign_team.php?id=.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46149 βΌ
π Read
via "National Vulnerability Database".
Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to out-of-bounds read due to logic error handling list-of-list. This issue may lead someone to remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type. Exfiltration of memory is possible if the victim performs additional certain actions on a list-of-pointer type. To be vulnerable, an application must perform a specific sequence of actions, described in the GitHub Security Advisory. The bug is present in inlined code, therefore the fix will require rebuilding dependent applications. Cap'n Proto has C++ fixes available in versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3. The `capnp` Rust crate has fixes available in versions 0.13.7, 0.14.11, and 0.15.2.π Read
via "National Vulnerability Database".
π Clam AntiVirus Toolkit 1.0.0 π
π Read
via "Packet Storm Security".
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS release.π Read
via "Packet Storm Security".
Packetstormsecurity
Clam AntiVirus Toolkit 1.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Suricata IDPE 6.0.9 π
π Read
via "Packet Storm Security".
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.π Read
via "Packet Storm Security".
Packetstormsecurity
Suricata IDPE 6.0.9 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers