What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CVE.webp 2022-09-19 20:15:12 CVE-2022-23766 (lien direct) An improper input validation vulnerability leading to arbitrary file execution was discovered in BigFileAgent. In order to cause arbitrary files to be executed, the attacker makes the victim access a web page d by them or inserts a script using XSS into a general website. Vulnerability Guideline
CVE.webp 2022-09-19 18:15:09 CVE-2022-34893 (lien direct) Trend Micro Security 2022 (consumer) has a link following vulnerability where an attacker with lower privileges could manipulate a mountpoint which could lead to escalation of privilege on an affected machine. Vulnerability Guideline
CVE.webp 2022-09-19 18:15:09 CVE-2022-3213 (lien direct) A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service. Guideline
CVE.webp 2022-09-19 18:15:09 CVE-2022-40139 (lien direct) Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability. Guideline
DarkReading.webp 2022-09-19 16:58:47 TPx Introduces Penetration Scanning, Expands Security Advisory Services (lien direct) TPx, a leading nationwide managed services provider (MSP) delivering cybersecurity, managed networks, and cloud communications, today announced the addition of penetration scanning to its Security Advisory Services portfolio. Guideline
CVE.webp 2022-09-19 16:15:11 CVE-2022-35709 (lien direct) Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-19 16:15:11 CVE-2022-38425 (lien direct) Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
globalsecuritymag.webp 2022-09-19 14:20:14 Versa Networks distingué comme entreprise " leader " dans le rapport Gartner® Magic Quadrant™ dédié à la technologie SD-WAN (lien direct) Versa Networks distingué comme entreprise " leader " dans le rapport Gartner® Magic Quadrant™ dédié à la technologie SD-WAN. Versa Networks, grâce à sa capacité d'exécution et à la complétude de sa vision, se positionne dans la catégorie des leaders dans le Magic Quadrant. - Magic Quadrant Guideline
CVE.webp 2022-09-19 14:15:11 CVE-2022-2958 (lien direct) The BadgeOS WordPress plugin before 3.7.1.3 does not sanitise and escape parameters before using them in SQL statements via AJAX actions available to any authenticated users, leading to SQL Injections Guideline
CVE.webp 2022-09-19 14:15:11 CVE-2022-3142 (lien direct) The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings. Guideline
CVE.webp 2022-09-19 14:15:11 CVE-2022-2840 (lien direct) The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections Guideline
globalsecuritymag.webp 2022-09-19 11:02:24 Pentera et SASETY, les clés d\'un partenariat efficace pour protéger les organisations (lien direct) Pentera et SASETY, les clés d'un partenariat efficace pour protéger les organisations. Quelques mois après le lancement de leur partenariat, Pentera, le leader de la cybervalidation continue et SASETY, l'expert français de services managés SASE ont réalisé de multiples projets sur différents secteurs d'activité (médias, immobilier, finance). - Points de Vue Guideline
silicon.fr.webp 2022-09-19 09:58:49 Gestion des accès à privilèges (PAM) : le marché croît et WALLIX avec (lien direct) WALLIX se hisse chez les " leaders " au Magic Quadrant du PAM. Comment se caractérise le marché et vers quoi évolue-t-il ? Guideline
CSO.webp 2022-09-19 02:00:00 International cooperation is key to fighting threat actors and cybercrime (lien direct) In this era of cybersecurity, when nation-state digital attacks and cybercrime quickly cut across country borders and create global crises, international cooperation has become an urgent priority. The need for global collaboration to cope with various pressing threats, from electronic espionage to ransomware attacks on critical infrastructure, is imperative to prevent economic and social disasters, top cybersecurity professionals and government officials say.At this year's Billington Cybersecurity Summit, leaders from across the globe gathered to discuss the importance of international partnerships in managing the persistent threats governments must address. The near-total digitalization of every aspect of society that exposes virtually all public and private sector services to escalating cyber threats dictates a more robust, collective defense. Moreover, as cyber risks intensify and multiply, governments worldwide are stepping up their own independent efforts to protect against the rising tide of digital threats.To read this article in full, please click here Ransomware Threat Guideline
CVE.webp 2022-09-17 00:15:09 CVE-2022-39210 (lien direct) Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue. Guideline
CVE.webp 2022-09-16 22:15:10 CVE-2022-29489 (lien direct) Cross-Site Request Forgery (CSRF) vulnerability in Sucuri Security plugin Vulnerability Guideline
CVE.webp 2022-09-16 21:15:08 CVE-2022-35965 (lien direct) TensorFlow is an open source platform for machine learning. If `LowerBound` or `UpperBound` is given an empty`sorted_inputs` input, it results in a `nullptr` dereference, leading to a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bce3717eaef4f769019fd18e990464ca4a2efeea. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. Guideline ★★★
CVE.webp 2022-09-16 18:15:16 CVE-2022-38428 (lien direct) Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:16 CVE-2022-38406 (lien direct) Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:16 CVE-2022-38407 (lien direct) Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-30675 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-30671 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline ★★
CVE.webp 2022-09-16 18:15:12 CVE-2022-28857 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-28855 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-30673 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline ★★★★
CVE.webp 2022-09-16 18:15:12 CVE-2022-30672 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline ★★★★
CVE.webp 2022-09-16 18:15:12 CVE-2022-30674 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-30676 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-30683 (lien direct) Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a Violation of Secure Design Principles vulnerability that could lead to bypass the security feature of the encryption mechanism in the backend . An attacker could leverage this vulnerability to decrypt secrets, however, this is a high-complexity attack as the threat actor needs to already possess those secrets. Exploitation of this issue requires low-privilege access to AEM. Vulnerability Threat Guideline
CVE.webp 2022-09-16 18:15:12 CVE-2022-28856 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 18:15:11 CVE-2022-28854 (lien direct) Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline ★★★★★
CVE.webp 2022-09-16 17:15:12 CVE-2022-38409 (lien direct) Adobe Illustrator versions 26.4 (and earlier) and 25.4.7 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 17:15:12 CVE-2022-38410 (lien direct) Adobe Illustrator versions 26.4 (and earlier) and 25.4.7 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Vulnerability Guideline
CVE.webp 2022-09-16 09:15:10 CVE-2022-1194 (lien direct) The Mobile Events Manager WordPress plugin before 1.4.8 does not properly escape the Enquiry source field when exporting events, or the Paid for field when exporting transactions as CSV, leading to a CSV injection vulnerability. Guideline
CVE.webp 2022-09-16 09:15:10 CVE-2022-2654 (lien direct) The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting Guideline
CVE.webp 2022-09-16 09:15:10 CVE-2022-2669 (lien direct) The WP Taxonomy Import WordPress plugin through 1.0.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting Guideline
CVE.webp 2022-09-16 09:15:10 CVE-2022-2655 (lien direct) The Classified Listing Pro WordPress plugin before 2.0.20 does not escape a generated URL before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting Guideline
CVE.webp 2022-09-16 06:15:09 CVE-2022-22091 (lien direct) Improper authorization of a replayed LTE security mode command can lead to a denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables Guideline
CSO.webp 2022-09-16 06:00:00 BrandPost: Tips for Improving Security Visibility (lien direct) One of today's biggest security gaps is visibility into your data - knowing what's happening before it's too late. Bad actors rely on staying hidden in the noise of logs, systems, tools, teams, processes and silos. Improving visibility is vital for security practitioners to ensure they aren't missing things that could prove crucial to the security of their organization.According to a recent industry survey, 80% of organizations that lack visibility into their assets report roughly three times as many cybersecurity incidents. And when asked to identify the biggest cause of SOC ineffectiveness, 65% of leaders cited “visibility into the attack surface.”To read this article in full, please click here Guideline
CVE.webp 2022-09-15 22:15:11 CVE-2022-29240 (lien direct) Scylla is a real-time big data database that is API-compatible with Apache Cassandra and Amazon DynamoDB. When decompressing CQL frame received from user, Scylla assumes that user-provided uncompressed length is correct. If user provides fake length, that is greater than the real one, part of decompression buffer won't be overwritten, and will be left uninitialized. This can be exploited in several ways, depending on the privileges of the user. 1. The main exploit is that an attacker with access to CQL port, but no user account, can bypass authentication, but only if there are other legitimate clients making connections to the cluster, and they use LZ4. 2. Attacker that already has a user account on the cluster can read parts of uninitialized memory, which can contain things like passwords of other users or fragments of other queries / results, which leads to authorization bypass and sensitive information disclosure. The bug has been patched in the following versions: Scylla Enterprise: 2020.1.14, 2021.1.12, 2022.1.0. Scylla Open Source: 4.6.7, 5.0.3. Users unable to upgrade should make sure none of their drivers connect to cluster using LZ4 compression, and that Scylla CQL port is behind firewall. Additionally make sure no untrusted client can connect to Scylla, by setting up authentication and applying workarounds from previous point (firewall, no lz4 compression). Guideline
CVE.webp 2022-09-15 22:15:11 CVE-2022-36074 (lien direct) Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue. Guideline
CVE.webp 2022-09-15 18:15:12 CVE-2022-39209 (lien direct) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print("![l"* 100000 + "\n")' | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension. Vulnerability Guideline
PaloAlto.webp 2022-09-15 15:30:29 Palo Alto Networks Hat Trick: 2022 Gartner Magic Quadrant for SD-WAN (lien direct) >Palo Alto Networks Prisma SD-WAN has been named a leader for a third consecutive year in the 2022 Gartner Magic Quadrant for SD-WAN report. Guideline
Fortinet.webp 2022-09-15 11:32:00 Three Years in a Row: Fortinet Named a Leader in the 2022 Gartner® Magic Quadrant™ for SD-WAN (lien direct) For the third year in a row, Fortinet is being named a leader in the 2022 Gartner® Magic Quadrant™ for SD-WAN. Read more about this achievement. Guideline
CSO.webp 2022-09-15 02:00:00 Russia\'s cyber future connected at the waist to Soviet military industrial complex (lien direct) The Center for European Policy Analysis (CEPA) recently published a 38-page study, Russian Cyberwarfare: Unpacking the Kremlin's Capabilities by two esteemed researchers, Irina Borogan and Andrei Soldatov. The opening premise is that Russia has not demonstrated its cyber warfare adroitness in support of its invasion of Ukraine. Whether the Russians tried, and their efforts failed due to the capabilities of Ukraine's cyber defenders or because leadership meddling disrupted the execution strategies of the professional cyber warriors, hasn't yet been revealed. What is evident is that the Ukraine example has called into question the Russian playbook being technologically focused and suggests that the political quotient is much more in play than perhaps previously suggested.To read this article in full, please click here Guideline ★★★★
CVE.webp 2022-09-14 20:15:09 CVE-2022-3216 (lien direct) A vulnerability has been found in Nintendo Game Boy Color and classified as problematic. This vulnerability affects unknown code of the component Mobile Adapter GB. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-208606 is the identifier assigned to this vulnerability. Vulnerability Guideline
CVE.webp 2022-09-14 16:15:10 CVE-2022-20231 (lien direct) In smc_intc_request_fiq of arm_gic.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-211485702References: N/A Guideline
CVE.webp 2022-09-14 16:15:10 CVE-2022-20364 (lien direct) In sysmmu_unmap of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233606615References: N/A Guideline
globalsecuritymag.webp 2022-09-14 12:55:19 Atos positionné Leader des solutions et services de cybersécurité dans le rapport ISG Provider Lens™ pour la France (lien direct) Atos positionné Leader des solutions et services de cybersécurité dans le rapport ISG Provider Lens™ pour la France - Magic Quadrant Guideline
AlienVault.webp 2022-09-14 10:00:00 8 blockchain security issues you are likely to encounter (lien direct) This blog was written by an independent guest blogger. Blockchain technology has grown up in popularity in recent years. Excluding its initial application in cryptocurrency, it's currently getting used in property, healthcare, smart contracts and many other fields. The technology collects and stores information in groupings referred to as “blocks” and every block will hold a collection quantity of knowledge. Once a block is full, it's in chains to the previous full block, forming an information chain, hence the good name “blockchain”. Blockchain is predicated on the concepts of consensus, decentralization and cryptography to confirm dealings trust. However, several blockchain security problems have arisen thanks to faulty technology implementation. Public vs private blockchain security To further explain blockchain security, it's a necessity to first grasp the difference between public and private blockchain security. In terms of participation and data access capabilities, blockchain networks can have various effects. As a result, there are two forms of labeling for blockchain networks i.e., Public and Private networks. • Public blockchain networks are open and might allow any user to join while maintaining participant anonymity. • In private blockchain networks, identity is used to verify membership and access privileges. Also, they only accept familiar organizations to engage. Blockchain security issues and solutions Many people are right after they believe blockchain is inherently secure. Blockchain is certainly beneficial to organizations, but it's significant drawbacks because of specific security issues. Here are the 8 top highest blockchain security issues and their solutions. 1. Sybil attack In a Sybil attack, hackers generate various fake network nodes. using those nodes, the hacker will acquire majority consensus and disrupt the chain’s transactions. As a result, a large-scale Sybil assault is nothing quite a 51% attack. To prevent Sybil attacks: • Use acceptable consensus algorithms. • Monitor alternative nodes’ behavior and check for the nodes that square measure solely forwarding blocks from one user. While these algorithms might not fully prevent these attacks, they create a lot of hurdles & it's almost impossible for hackers to carry out attacks. 2. Endpoint vulnerabilities The vulnerability of blockchain endpoints is another vital security concern in blockchain security. The blockchain network’s end is wherever users act with the blockchain: on electronic devices like computers and mobile phones. Hackers will observe user behavior and target devices to steal the user’s key. This might be one of the foremost visible blockchain security problems. To prevent end vulnerabilities: • Do not save blockchain keys on your laptop or mobile as text files. • Transfer and install antivirus software packages for your electronic devices. • Review the system often, keeping track of the time, location, and device access. 3. 51% attack A 51% attack occurs when one individual or organization (malicious hackers) collects quite 1/2 the hash rate and seizes control of the whole system, which might be disastrous. Hackers can modify the order of transactions and forestall them from being confirmed. they'll even reverse previously completed transactions, leading to double spending. To prevent 51% attacks: • Ensure that the hash rate is higher. • Improve your mining pool monitoring. 4. Phishing attacks The hacker’s goal in a very phishing attack Vulnerability Threat Guideline
Last update at: 2024-07-07 15:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter