βΌ CVE-2022-3711 βΌ
π Read
via "National Vulnerability Database".
A post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall older than version 19.5 GA.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3713 βΌ
π Read
via "National Vulnerability Database".
A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall older than version 19.5 GA.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3709 βΌ
π Read
via "National Vulnerability Database".
A stored XSS vulnerability allows admin to super-admin privilege escalation in the Webadmin import group wizard of Sophos Firewall older than version 19.5 GA.π Read
via "National Vulnerability Database".
βοΈ ConnectWise Quietly Patches Flaw That Helps Phishers βοΈ
π Read
via "Krebs on Security".
ConnectWise, a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning about an unusually sophisticated phishing attack that can let attackers take remote control over user systems when recipients click the included link. The warning comes just days after the company quietly patched a vulnerability that makes it easier for phishers to launch these attacks.π Read
via "Krebs on Security".
Krebs on Security
ConnectWise Quietly Patches Flaw That Helps Phishers
ConnectWise, a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning about an unusually sophisticated phishing attack that can let attackers take remote control over user systems when recipientsβ¦
π΄ One Year After Log4Shell, Most Firms Are Still Exposed to Attack π΄
π Read
via "Dark Reading".
Though there have been fewer than expected publicly reported attacks involving the vulnerability, nearly three-quarters of organizations remain exposed to it.π Read
via "Dark Reading".
Dark Reading
One Year After Log4Shell, Most Firms Are Still Exposed to Attack
Though there have been fewer than expected publicly reported attacks involving the vulnerability, nearly three-quarters of organizations remain exposed to it.
βΌ CVE-2022-43901 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.3 could disclose sensitive information. An authenticated local attacker could exploit this vulnerability to possibly gain information to other IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps components. IBM X-Force ID: 240829.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43900 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 could provide a weaker than expected security. A local attacker can create an outbound network connection to another system. IBM X-Force ID: 240827.π Read
via "National Vulnerability Database".
π΄ Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines π΄
π Read
via "Dark Reading".
A vulnerability discovered in GitHub Actions could allow an attacker to poison a developer's pipeline, highlighting the risk that insecure software pipelines pose.π Read
via "Dark Reading".
Dark Reading
Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines
A vulnerability discovered in GitHub Actions could allow an attacker to poison a developer's pipeline, highlighting the risk that insecure software pipelines pose.
π΄ LastPass Discloses Second Breach in Three Months π΄
π Read
via "Dark Reading".
The threat actor behind an August intrusion used data from that incident to access customer data stored with a third-party cloud service provider, and affiliate GoTo reports breach of development environment.π Read
via "Dark Reading".
Dark Reading
LastPass Discloses Second Breach in Three Months
The threat actor behind an August intrusion used data from that incident to access customer data stored with a third-party cloud service provider, and affiliate GoTo reports breach of development environment.
β The CHRISTMA EXEC network worm β 35 years and counting! β
π Read
via "Naked Security".
"Uh-oh, this viruses-and-worms scene could turn out quite troublesome." If only we'd been wrong...π Read
via "Naked Security".
Naked Security
The CHRISTMA EXEC network worm β 35 years and counting!
βUh-oh, this viruses-and-worms scene could turn out quite troublesome.β If only weβd been wrongβ¦
β S3 Ep111: The business risk of a sleazy βnudity unfilterβ [Audio + Text] β
π Read
via "Naked Security".
Latest episode - listen now (or read if you prefer)...π Read
via "Naked Security".
Naked Security
S3 Ep111: The business risk of a sleazy βnudity unfilterβ [Audio + Text]
Latest episode β listen now (or read if you prefer)β¦
β LastPass admits to customer data breach caused by previous breach β
π Read
via "Naked Security".
Seems that the developer account that the crooks breached last time gave indirect access to customer data this time round.π Read
via "Naked Security".
Naked Security
LastPass admits to customer data breach caused by previous breach
Seems that the developer account that the crooks breached last time gave indirect access to customer data this time round.
βΌ CVE-2022-45562 βΌ
π Read
via "National Vulnerability Database".
Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44928 βΌ
π Read
via "National Vulnerability Database".
D-Link DVG-G5402SP GE_1.03 was discovered to contain a command injection vulnerability via the Maintenance function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43325 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability in the product license validation function of Telos Alliance Omnia MPX Node 1.3.* - 1.4.* allows attackers to execute arbitrary commands via a crafted payload injected into the license input.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44929 βΌ
π Read
via "National Vulnerability Database".
An access control issue in D-Link DVG-G5402SP GE_1.03 allows unauthenticated attackers to escalate privileges via arbitrarily editing VoIP SIB profiles.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44930 βΌ
π Read
via "National Vulnerability Database".
D-Link DHP-W310AV 3.10EU was discovered to contain a command injection vulnerability via the System Checks function.π Read
via "National Vulnerability Database".
ποΈ Go SAML library vulnerable to authentication bypass ποΈ
π Read
via "The Daily Swig".
An attacker could masquerade as an authenticated user without presenting credentialsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Go SAML library vulnerable to authentication bypass
An attacker could masquerade as an authenticated user without presenting credentials
π΄ AWS Unveils Amazon Security Lake at re:Invent 2022 π΄
π Read
via "Dark Reading".
Amazon Security Lake will allow organizations to create a purpose-built, standards-based data lake to aggregate and store security data.π Read
via "Dark Reading".
Dark Reading
AWS Unveils Amazon Security Lake at re:Invent 2022
Amazon Security Lake will allow organizations to create a purpose-built, standards-based data lake to aggregate and store security data.
βΌ CVE-2022-2808 βΌ
π Read
via "National Vulnerability Database".
Algan YazΓβΓΒ±lΓβΓΒ±m Prens Student Information System product has an authenticated Insecure Direct Object Reference (IDOR) vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2807 βΌ
π Read
via "National Vulnerability Database".
Algan YazΓβΓΒ±lΓβΓΒ±m Prens Student Information System product has an unauthenticated SQL Injection vulnerability.π Read
via "National Vulnerability Database".