What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CVE.webp 2023-01-11 14:15:09 CVE-2022-47866 (lien direct) Lead management system v1.0 is vulnerable to SQL Injection via the id parameter in removeBrand.php. Guideline
CVE.webp 2023-01-11 14:15:08 CVE-2018-25073 (lien direct) A vulnerability has been found in Newcomer1989 TSN-Ranksystem up to 1.2.6 and classified as problematic. This vulnerability affects the function getlog of the file webinterface/bot.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.2.7 is able to address this issue. The name of the patch is b3a3cd8efe2cd3bd3c5b3b7abf2fe80dbee51b77. It is recommended to upgrade the affected component. VDB-218002 is the identifier assigned to this vulnerability. Vulnerability Guideline
CVE.webp 2023-01-11 13:15:09 CVE-2022-42967 (lien direct) Caret is vulnerable to an XSS attack when the user opens a crafted Markdown file when preview mode is enabled. This directly leads to client-side code execution. Guideline
CVE.webp 2023-01-11 13:15:09 CVE-2022-4696 (lien direct) There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above Vulnerability Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2023-20527 (lien direct) Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service. Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2021-46779 (lien direct) Insufficient input validation in SVC_ECC_PRIMITIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential loss of integrity and availability. Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2023-20528 (lien direct) Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality. Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2021-46768 (lien direct) Insufficient input validation in SEV firmware may allow an attacker to perform out-of-bounds memory reads within the ASP boot loader, potentially leading to a denial of service. Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2023-20523 (lien direct) TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service. Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2023-20525 (lien direct) Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service. Guideline
CVE.webp 2023-01-11 08:15:13 CVE-2021-46767 (lien direct) Insufficient input validation in the ASP may allow an attacker with physical access, unauthorized write access to memory potentially leading to a loss of integrity or denial of service. Guideline
CVE.webp 2023-01-11 08:15:11 CVE-2021-26402 (lien direct) Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability. Guideline
CVE.webp 2023-01-11 08:15:11 CVE-2021-26407 (lien direct) A randomly generated Initialization Vector (IV) may lead to a collision of IVs with the same key potentially resulting in information disclosure. Guideline
CVE.webp 2023-01-11 08:15:11 CVE-2021-26398 (lien direct) Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution. Guideline
CVE.webp 2023-01-11 08:15:11 CVE-2021-26403 (lien direct) Insufficient checks in SEV may lead to a malicious hypervisor disclosing the launch secret potentially resulting in compromise of VM confidentiality. Guideline
CVE.webp 2023-01-11 08:15:11 CVE-2021-26404 (lien direct) Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure. Guideline
CVE.webp 2023-01-11 08:15:10 CVE-2021-26328 (lien direct) Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests. Guideline
globalsecuritymag.webp 2023-01-11 07:57:01 (Déjà vu) Prédictions cybersécurité 2023 et au-delà : la fin du camouflage du cloud (lien direct) Prédictions cybersécurité 2023 et au-delà : la fin du camouflage du cloud. Comme chaque début d'année, BeyondTrust, leader mondial de la gestion intelligente des identités et de la sécurité des accès, vous partage ses prédictions relatives à la cybersécurité pour 2023 et au-delà. Depuis le 2 et jusqu'au 13 janvier, Thomas Manierre, Directeur EMEA Sud de BeyondTrust, vous livrera chaque jour (excepté le weekend) une nouvelle prédiction, soit 10 tendances à venir. - Points de Vue Guideline ★★
CVE.webp 2023-01-11 07:15:10 CVE-2015-10037 (lien direct) A vulnerability, which was classified as critical, was found in ACI_Escola. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is 34eed1f7b9295d1424912f79989d8aba5de41e9f. It is recommended to apply a patch to fix this issue. The identifier VDB-217965 was assigned to this vulnerability. Guideline
CVE.webp 2023-01-11 07:15:10 CVE-2015-10036 (lien direct) A vulnerability was found in kylebebak dronfelipe. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The name of the patch is 87405b74fe651892d79d0dff62ed17a7eaef6a60. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217951. Vulnerability Guideline
CVE.webp 2023-01-11 07:15:09 CVE-2012-10004 (lien direct) A vulnerability was found in backdrop-contrib Basic Cart. It has been classified as problematic. Affected is the function basic_cart_checkout_form_submit of the file basic_cart.cart.inc. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.x-1.1.1 is able to address this issue. The name of the patch is a10424ccd4b3b4b433cf33b73c1ad608b11890b4. It is recommended to upgrade the affected component. VDB-217950 is the identifier assigned to this vulnerability. Vulnerability Guideline
News.webp 2023-01-11 00:00:09 First Patch Tuesday of the year explodes with an in-the-wild exploit (lien direct) Plus Intel, Adobe, SAP and Android bugs Patch Tuesday  Microsoft fixed 98 security flaws in its first Patch Tuesday of 2023 including one that's already been exploited and another listed as publicly known. Of the new January vulnerabilities, 11 are rated critical because they lead to remote code execution.… Guideline ★★
CVE.webp 2023-01-10 21:15:11 CVE-2022-35401 (lien direct) An authentication bypass vulnerability exists in the get_IFTTTTtoken.cgi functionality of Asus RT-AX82U 3.0.0.4.386_49674-ge182230. A specially-crafted HTTP request can lead to full administrative access to the device. An attacker would need to send a series of HTTP requests to exploit this vulnerability. Vulnerability Guideline
CVE.webp 2023-01-10 21:15:11 CVE-2022-38393 (lien direct) A denial of service vulnerability exists in the cfg_server cm_processConnDiagPktList opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability. Vulnerability Guideline
CVE.webp 2023-01-10 21:15:11 CVE-2022-38105 (lien direct) An information disclosure vulnerability exists in the cm_processREQ_NC opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packets can lead to a disclosure of sensitive information. An attacker can send a network request to trigger this vulnerability. Vulnerability Guideline
globalsecuritymag.webp 2023-01-10 19:43:25 CybeReady Releases Data Privacy CISO Training Toolkit (lien direct) CybeReady Releases Data Privacy CISO Training Toolkit Cybersecurity Awareness Training Leader Delivers Practical Guide with Recommendations that Strengthen Data Privacy - Product Reviews Guideline ★★
DarkReading.webp 2023-01-10 18:05:00 Quantum Decryption Breakthrough? Not So Fast (lien direct) A paper by two dozen Chinese researchers maintains that near-future quantum computers could crack RSA-2048 encryption, but experts call the claims misleading. Guideline ★★
CVE.webp 2023-01-10 16:15:10 CVE-2014-125073 (lien direct) A vulnerability was found in mapoor voteapp. It has been rated as critical. Affected by this issue is the function create_poll/do_poll/show_poll/show_refresh of the file app.py. The manipulation leads to sql injection. The name of the patch is b290c21a0d8bcdbd55db860afd3cadec97388e72. It is recommended to apply a patch to fix this issue. VDB-217790 is the identifier assigned to this vulnerability. Vulnerability Guideline
CVE.webp 2023-01-10 15:15:11 CVE-2016-15017 (lien direct) A vulnerability has been found in fabarea media_upload and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability. Vulnerability Guideline
DarkReading.webp 2023-01-10 14:52:00 Moving Analytics Launches Single Sign on to Strengthen Data Security and Improve User Experience (lien direct) Moving Analytics, leading provider of virtual cardiac rehabilitation and prevention, announced that it is launching single sign on authentication for its entire software platform. Guideline ★★
The_Hackers_News.webp 2023-01-10 14:24:00 Critical Security Flaw Found in "jsonwebtoken" Library Used by 22,000+ Projects (lien direct) A high-severity security flaw has been disclosed in the open source jsonwebtoken (JWT) library that, if successfully exploited, could lead to remote code execution on a target server. "By exploiting this vulnerability, attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted JSON web token (JWT) request," Palo Alto Networks Unit 42 researcher Artur Oleyarsh Guideline ★★
AlienVault.webp 2023-01-10 11:00:00 Key to success while implementing IAM- Best practices that every company should implement (lien direct) The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Identity and access management has emerged as an essential security element for organizations. A study reveals that 80% of global IT decision-makers have already adopted or are planning to adopt an IAM solution in the upcoming years. IAM refers to business policies, processes, and technologies to control unauthorized data and digital systems access. Two IAM approaches are widely known, one for the cloud and the other for on-premises. The cloud based IAM practices are fast-growing because the demand for cloud adoption has increased over time. With the right IAM solutions and techniques, IT managers and businesses control users' access to sensitive business data within their networks. In addition, these solutions help protect organizations from cyber-attacks; they become more efficient, reduce IT operational costs, and improve user experience. Six best IAM practices that organizations must not neglect The IAM framework means using the right solution to implement user authentication and privileges policies. In addition, with IAM, companies demonstrate that any data is not misused, and they comply with government regulations. For all these characteristics, businesses are increasingly adopting IAM solutions, and their demand will undoubtedly be high in the upcoming time. It's also estimated that the IAM market will grow to $15.3 billion by 2025. The organization needs to use the right IAM tools and practices to reap the most benefits from the IAM solution. The six best IAM practices that every business should incorporate into its security strategy are as follows: Adopt passwordless authentication Many data breaches occur because of weak or stolen credentials. Threat actors can use advanced tools and tactics to steal and break passwords. Organizations need a secure identity management system to prevent bad actors from breaking in and stealing credentials that can result in breaches such as the Lapsus$ attack or the Colonial Pipeline ransomware attack. Organizations eliminate password issues by choosing passwordless authentication to protect vital business data and ensure that only authentic people access it. Passwordless authentication enables users to authenticate their identity without entering a password. There are various benefits for organizations to become passwordless- it enhances the overall efficiency, saves time and productivity, and provides greater ease of access. But, most importantly, passwordless authentication allows IAM leaders and users to access the cloud environment safely and securely. Implement a Zero-Trust approach The zero-trust approach is not new but has gained popularity as the threat landscape is evolving. Organizations cannot have a robust IAM policy without a function zero-trust architecture. The average cost of a data breach is $4.24 million, but the zero-trust model helps re Ransomware Data Breach Threat Guideline ★★
CSO.webp 2023-01-10 09:48:00 BrandPost: The converging future of XDR and Threat Hunting (lien direct) The cybersecurity challenge for organizations of all sizes continues to get more difficult. Complex threats and a growing cybersecurity skills gap is making life harder for often overworked IT teams. Without automation, they find it difficult to process and act on a steadily increasing flow of data and security alerts from across the network.  As a result, many organizations are considering extended detection and response (XDR) tools to make better sense of incoming threat information. The market is projected to reach $2.36 billion by 2027, and small to mid-size enterprises are leading the way.To read this article in full, please click here Threat Guideline
globalsecuritymag.webp 2023-01-10 08:29:36 (Déjà vu) Prédictions cybersécurité 2023 et au-delà : l\'interdiction de payer les rançons (lien direct) Prédictions cybersécurité 2023 et au-delà : l'interdiction de payer les rançons Comme chaque début d'année, BeyondTrust, leader mondial de la gestion intelligente des identités et de la sécurité des accès, vous partage ses prédictions relatives à la cybersécurité pour 2023 et au-delà. Depuis le 2 et jusqu'au 13 janvier, Thomas Manierre, Directeur EMEA Sud de BeyondTrust, vous livrera chaque jour (excepté le weekend) une nouvelle prédiction, soit 10 tendances à venir. Hier, Thomas prédisait l'évolution des processus d'authentification. Aujourd'hui, il parle de L'interdiction légale de verser des rançons venant financer les terroristes - Points de Vue Guideline ★★
CVE.webp 2023-01-10 08:15:10 CVE-2023-22911 (lien direct) An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widget is executed in an HTML attribute context. Guideline
CVE.webp 2023-01-10 04:15:10 CVE-2023-22320 (lien direct) OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly. Guideline
CVE.webp 2023-01-10 04:15:09 CVE-2023-0014 (lien direct) SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system. Vulnerability Guideline
CVE.webp 2023-01-10 04:15:09 CVE-2023-0016 (lien direct) SAP BPC MS 10.0 - version 810, allows an unauthorized attacker to execute crafted database queries. The exploitation of this issue could lead to SQL injection vulnerability and could allow an attacker to access, modify, and/or delete data from the backend database. Vulnerability Guideline
The_State_of_Security.webp 2023-01-10 03:37:04 Is a Shift Left Approach Hurting Software and Supply Chain Security? (lien direct) As the cyber threat evolves, adversaries are increasingly targeting non-publicly disclosed vulnerabilities in the software supply chain. Attackers are able to stealthily travel between networks because to a vulnerability in the supply chain. To combat this risk, the cybersecurity community must center its efforts on protecting the software development lifecycle. Global initiatives to secure the supply chain When it comes to our software's safety, the developer's hands are the ones that must be held most responsible. The events leading up to the SolarWinds attack were investigated by the... Vulnerability Threat Guideline ★★
CVE.webp 2023-01-09 23:15:27 CVE-2022-4374 (lien direct) The Bg Bible References WordPress plugin through 3.8.14 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Guideline
CVE.webp 2023-01-09 23:15:27 CVE-2022-4301 (lien direct) The Sunshine Photo Cart WordPress plugin before 2.9.15 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Guideline
CVE.webp 2023-01-09 23:15:27 CVE-2022-4368 (lien direct) The WP CSV WordPress plugin through 1.8.0.0 does not sanitize and escape a parameter before outputting it back in the page when importing a CSV, and doe snot have CSRF checks in place as well, leading to a Reflected Cross-Site Scripting. Guideline
CVE.webp 2023-01-09 23:15:27 CVE-2022-4325 (lien direct) The Post Status Notifier Lite WordPress plugin before 1.10.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high privilege users such as admin. Guideline
CVE.webp 2023-01-09 23:15:26 CVE-2022-3417 (lien direct) The WPtouch WordPress plugin before 4.3.45 unserialises the content of an imported settings file, which could lead to PHP object injections issues when an user import (intentionally or not) a malicious settings file and a suitable gadget chain is present on the blog. Guideline
CVE.webp 2023-01-09 23:15:26 CVE-2022-3679 (lien direct) The Starter Templates by Kadence WP WordPress plugin before 1.2.17 unserialises the content of an imported file, which could lead to PHP object injection issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog. Guideline
CVE.webp 2023-01-09 22:15:09 CVE-2014-125072 (lien direct) A vulnerability classified as critical has been found in CherishSin klattr. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is f8e4ecfbb83aef577011b0b4aebe96fb6ec557f1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217719. Vulnerability Guideline
CVE.webp 2023-01-09 21:15:11 CVE-2023-0125 (lien direct) A vulnerability was found in Control iD Panel. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability. Vulnerability Guideline
CVE.webp 2023-01-09 21:15:10 CVE-2014-125071 (lien direct) A vulnerability was found in lukehutch Gribbit. It has been classified as problematic. Affected is the function messageReceived of the file src/gribbit/request/HttpRequestHandler.java. The manipulation leads to missing origin validation in websockets. The name of the patch is 620418df247aebda3dd4be1dda10fe229ea505dd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217716. Vulnerability Guideline
CVE.webp 2023-01-09 21:15:10 CVE-2015-10033 (lien direct) A vulnerability, which was classified as problematic, was found in jvvlee MerlinsBoard. This affects an unknown part of the component Grade Handler. The manipulation leads to improper authorization. The name of the patch is 134f5481e2914b7f096cd92a22b1e6bcb8e6dfe5. It is recommended to apply a patch to fix this issue. The identifier VDB-217713 was assigned to this vulnerability. Guideline
CVE.webp 2023-01-09 21:15:10 CVE-2015-10035 (lien direct) A vulnerability was found in gperson angular-test-reporter and classified as critical. This issue affects the function getProjectTables/addTest of the file rest-server/data-server.js. The manipulation leads to sql injection. The name of the patch is a29d8ae121b46ebfa96a55a9106466ab2ef166ae. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217715. Vulnerability Guideline
Last update at: 2024-07-12 13:08:28
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter