βΌ CVE-2023-22307 βΌ
π Read
via "National Vulnerability Database".
Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.4 allows local attacker to retrieve passwords via reading log files.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29855 βΌ
π Read
via "National Vulnerability Database".
WBCE CMS 1.5.3 has a command execution vulnerability via admin/languages/install.php.π Read
via "National Vulnerability Database".
π΄ NSO Group is Back in Business With 3 New iOS Zero-Click Exploits π΄
π Read
via "Dark Reading".
An investigation concludes that NSO Group was hired in 2022 to deploy Pegasus spyware against human rights workers in Mexico and other targets.π Read
via "Dark Reading".
Dark Reading
NSO Group Is Back in Business With 3 New iOS Zero-Click Exploits
An investigation concludes that NSO Group was hired in 2022 to deploy Pegasus spyware against human rights workers in Mexico and other targets.
βοΈ Giving a Face to the Malware Proxy Service βFacelessβ βοΈ
π Read
via "Krebs on Security".
For the past seven years, a malware-based proxy service known as "Faceless" has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post we'll examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name.π Read
via "Krebs on Security".
Krebs on Security
Giving a Face to the Malware Proxy Service βFacelessβ
For the past seven years, a malware-based proxy service known as "Faceless" has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systemsβ¦
π΄ Report: Over Half of North American Consumers Are Open to Passwordless π΄
π Read
via "Dark Reading".
1Password research reveals consumers are fed up with passwords; education, access, and validation will drive passwordless adoption.π Read
via "Dark Reading".
Dark Reading
Report: Over Half of North American Consumers Are Open to Passwordless
1Password research reveals consumers are fed up with passwords; education, access, and validation will drive passwordless adoption.
π΄ KnowBe4 Phishing Test Results Reveal IT and Online Services Emails Drive Dangerous Attack Trend π΄
π Read
via "Dark Reading".
KnowBe4 releases Q1 2023 global phishing report and finds that more IT and online services related email subjects are utilized as a phishing strategy.π Read
via "Dark Reading".
Dark Reading
KnowBe4 Phishing Test Results Reveal IT and Online Services Emails Drive Dangerous Attack Trend
KnowBe4 releases Q1 2023 global phishing report and finds that more IT and online services related email subjects are utilized as a phishing strategy.
π΄ Netwrix Annual Security Survey: 68% of Organizations Experienced a Cyberattack Within the Last 12 Months π΄
π Read
via "Dark Reading".
The most common consequences were unplanned expenses, loss of competitive edge, and decreased sales.π Read
via "Dark Reading".
Dark Reading
Netwrix Annual Security Survey: 68% of Organizations Experienced a Cyberattack Within the Last 12 Months
The most common consequences were unplanned expenses, loss of competitive edge, and decreased sales.
π΄ Cyberattacks Can Cost Enterprises Up to 30% of Operating Income According to ThreatConnect π΄
π Read
via "Dark Reading".
Risk quantification research finds healthcare, manufacturing, and utilities suffer long-term financial impact from major cyberattacks.π Read
via "Dark Reading".
Dark Reading
Cyberattacks Can Cost Enterprises Up to 30% of Operating Income According to ThreatConnect
Risk quantification research finds healthcare, manufacturing, and utilities suffer long-term financial impact from major cyberattacks.
βΌ CVE-2023-21924 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Health Sciences InForm, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as unauthorized read access to a subset of Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L).π Read
via "National Vulnerability Database".
βΌ CVE-2023-21997 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Proxy User Delegation). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle User Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).π Read
via "National Vulnerability Database".
π₯1
βΌ CVE-2023-25548 βΌ
π Read
via "National Vulnerability Database".
A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device credentials on specific DCE endpoints not being properly secured when a hacker is using a low privileged user. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2023-21922 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Health Sciences InForm accessible data as well as unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).π Read
via "National Vulnerability Database".
βΌ CVE-2023-28440 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open source platform for community discussion. In affected versions a maliciously crafted request from a Discourse administrator can lead to a long-running request and eventual timeout. This has the greatest potential impact in shared hosting environments where admins are untrusted. This issue has been addressed in versions 3.0.3 and 3.1.0.beta4. Users are advised to upgrade. There are no known workarounds for this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25555 βΌ
π Read
via "National Vulnerability Database".
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could allow a user that knows the credentials to execute unprivileged shell commands on the appliance over SSH. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2023-21999 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).π Read
via "National Vulnerability Database".
βΌ CVE-2023-26048 βΌ
π Read
via "National Vulnerability Database".
Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).π Read
via "National Vulnerability Database".
βΌ CVE-2023-25554 βΌ
π Read
via "National Vulnerability Database".
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that allows a local privilege escalation on the appliance when a maliciously crafted Operating System command is entered on the device. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2023-21936 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).π Read
via "National Vulnerability Database".
βΌ CVE-2023-29887 βΌ
π Read
via "National Vulnerability Database".
A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26049 βΌ
π Read
via "National Vulnerability Database".
Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".