Security
Headlines
HeadlinesLatestCVEs

Tag

#amazon

CVE-2022-45868: h2database/WebServer.java at 96832bf5a97cdc0adc1f2066ed61c54990d66ab5 · h2database/h2database

The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that."

CVE
#sql#vulnerability#web#windows#google#microsoft#amazon#apache#js#java#oracle#ibm#postgres#ssl
CVE-2022-45866: Fix qpress directory traversal vulnerability (#6) · EvgeniyPatlan/qpress@ddb3120

qpress before PierreLvx/qpress 20220819 and before version 11.3, as used in Percona XtraBackup and other products, allows directory traversal via ../ in a .qp file.

34 Russian Hacking Groups Stole 50 Million User Passwords

By Deeba Ahmed Russian hacking groups primarily using Telegram are on a password stealing spree and so far have targeted users on Amazon, Steam, and Roblox. This is a post from HackRead.com Read the original post: 34 Russian Hacking Groups Stole 50 Million User Passwords

Enterprises Pay $1,200 Per Employee Annually to Fight Cyberattacks Against Cloud Collab Apps

Orgs are in the middle of a rapid increase in the use of new collaboration tools to serve the needs of an increasingly dispersed workforce — and they're paying a very real security price.

Name That Toon: Fall Cleanup

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Kernel Live Patch Security Notice LSN-0090-1

David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other issues were also addressed.

What is ASR Technology and Where Can It Develop?

By Owais Sultan ASR Technology (aka Automated speech recognition) is a type of speech recognition technology that can be used to… This is a post from HackRead.com Read the original post: What is ASR Technology and Where Can It Develop?

42,000 phishing domains discovered masquerading as popular brands

By Deeba Ahmed According to researchers, this scam is highly sophisticated and large-scale, targeting brands like McDonald’s, Unilever, Emirates, Knorr, Coca-Cola, etc. This is a post from HackRead.com Read the original post: 42,000 phishing domains discovered masquerading as popular brands

Log4Shell – Iranian Hackers Accessed Domain Controller of US Federal Network

By Waqas The attack, according to authorities, was launched on the Federal Civilian Executive Branch (FCEB). This is a post from HackRead.com Read the original post: Log4Shell – Iranian Hackers Accessed Domain Controller of US Federal Network

New Startup OpsHelm Tackles Cloud Misconfigurations

The company emerges from stealth with an automated security remediation product identifies and remediates cloud misconfigurations.