βΌ CVE-2022-47606 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tim Stephenson WP-CORS plugin <=Γ 0.2.1 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-47441 βΌ
π Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Charitable Donations & Fundraising Team Donation Forms by Charitable plugin <=Γ 1.7.0.10 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46817 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Flyzoo Flyzoo Chat plugin <=Γ 2.3.3 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-47587 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Cornel Raiu WP Search Analytics plugin <=Γ 1.4.5 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33961 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WaspThemes Visual CSS Style Editor plugin <=Γ 7.5.8 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-47590 βΌ
π Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fugu Maintenance Switch plugin <=Γ 1.5.2 versions.π Read
via "National Vulnerability Database".
π1
π’ US reveals bespoke tool that took down Russian malware operation π’
π Read
via "ITPro".
Snake had been used to steal NATO countriesβ data for 20 years π Read
via "ITPro".
ITPro
US reveals bespoke tool that took down Russian malware operation
Snake had been used to steal NATO countriesβ data for 20 years
π΄ New Startup SquareX Targets Brower-Based Attacks π΄
π Read
via "Dark Reading".
SquareX runs headless browsers in data centers on the user's behalf so that threats never reach the user's machine.π Read
via "Dark Reading".
Dark Reading
Startup SquareX Targets Browser-Based Attacks
SquareX runs headless browsers in data centers on the user's behalf so that threats never reach the user's machine.
π΄ Microsoft Digital Defense Report: Trends In Device and Infrastructure Attacks π΄
π Read
via "Dark Reading".
In part two of this three-part series, Microsoft synthesizes the impact of IoT/OT security challenges and offers tips for strengthening security there.π Read
via "Dark Reading".
Dark Reading
Microsoft Digital Defense Report: Trends In Device and Infrastructure Attacks
In part two of this three-part series, Microsoft synthesizes the impact of IoT/OT security challenges and offers tips for strengthening security there.
βΌ CVE-2022-45846 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Nickys Image Map Pro for WordPress - Interactive SVG Image Map Builder plugin <Γ 5.6.9 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1732 βΌ
π Read
via "National Vulnerability Database".
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read()Γ returns an error. In rare deployment cases (error thrown by the Read()Γ function), this could lead to a predictable shared secret.The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.π Read
via "National Vulnerability Database".
π΄ The Industrywide Consequences of Making Security Products Inaccessible π΄
π Read
via "Dark Reading".
Accessibility won't solve all of the industry's problems, but it can help tackle a few.π Read
via "Dark Reading".
Dark Reading
The Industrywide Consequences of Making Security Products Inaccessible
Accessibility won't solve all of the industry's problems, but it can help tackle a few.
βΌ CVE-2023-27382 βΌ
π Read
via "National Vulnerability Database".
Incorrect default permissions in the Audio Service for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.0.0.156 may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27563 βΌ
π Read
via "National Vulnerability Database".
The n8n package 0.218.0 for Node.js allows Escalation of Privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34147 βΌ
π Read
via "National Vulnerability Database".
Improper input validation in BIOS firmware for some Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41693 βΌ
π Read
via "National Vulnerability Database".
Uncontrolled search path in the Intel(R) Quartus(R) Prime Pro edition software before version 22.3 may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41687 βΌ
π Read
via "National Vulnerability Database".
Insecure inherited permissions in the HotKey Services for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.1.44 may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41979 βΌ
π Read
via "National Vulnerability Database".
Protection mechanism failure in the Intel(R) DCM software before version 5.1 may allow an authenticated user to potentially enable escalation of privilege via network access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41621 βΌ
π Read
via "National Vulnerability Database".
Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37409 βΌ
π Read
via "National Vulnerability Database".
Insufficient control flow management for the Intel(R) IPP Cryptography software before version 2021.6 may allow an authenticated user to potentially enable information disclosure via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41699 βΌ
π Read
via "National Vulnerability Database".
Incorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".