Out-of-Band XML External Entity (OOB-XXE) vulnerability in Zoho ManageEngine Analytics Plus before 4.3.5 allows remote attackers to read arbitrary files, enumerate folders and scan internal ports via crafted XML license file.
Monthly Archives: August 2022
CVE-2020-21365
Directory traversal vulnerability in wkhtmltopdf through 0.12.5 allows remote attackers to read local files and disclose sensitive information via a crafted html file running with the default configurations.
qemu-6.2.0-14.fc36
FEDORA-2022-baf3c3b781
Packages in this update:
qemu-6.2.0-14.fc36
Update description:
lsi53c895a: Do not abort when DMA requested and no data queued (#552)
lsi53c895a: Fix use-after-free in lsi_do_msgout (CVE-2022-0216) (rhbz#2070902)
Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels
After deploying the initial attack, the researcher was able to escape the macOS sandbox
Luckymouse Uses Compromised MiMi Chat App to Target Windows and Linux Systems
The news comes from two different security reports published by SEKOIA and Trend Micro
dotnet6.0-6.0.108-1.fc35
FEDORA-2022-f2ba9be204
Packages in this update:
dotnet6.0-6.0.108-1.fc35
Update description:
This is the monthly update for .NET for August 2022. This updates the .NET SDK to 6.0.108 and .NET Runtime to 6.0.8.
This update includes a fix for CVE 2022-34716.
dotnet6.0-6.0.108-1.fc36
FEDORA-2022-0eded912f0
Packages in this update:
dotnet6.0-6.0.108-1.fc36
Update description:
This is the monthly update for .NET for August 2022. This updates the .NET SDK to 6.0.108 and .NET Runtime to 6.0.8.
This update includes a fix for CVE 2022-34716.
vim-9.0.213-1.fc35
FEDORA-2022-6f5e420e52
Packages in this update:
vim-9.0.213-1.fc35
Update description:
patchlevel 213
Security fixes for CVE-2022-2819, CVE-2022-2816, CVE-2022-2817
Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer Firm
The Financial Advanced Cyber Team of the FIOD started the criminal investigation in June
$23 Million YouTube Royalties Scam
Scammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught.
No one knows how common this scam is, and how much money total is being stolen in this way. Presumably this is not an uncommon fraud.
While the size of the heist and the breadth of the scheme may be very unique, it’s certainly a situation that many YouTube content creators have faced before. YouTube’s Content ID system, meant to help creators, has been weaponized by bad faith actors in order to make money off content that isn’t theirs. While some false claims are just mistakes caused by automated systems, the MediaMuv case is a perfect example of how fraudsters are also purposefully taking advantage of digital copyright rules.
YouTube attempts to be cautious with who it provides CMS and Content ID tool access because of how powerful these systems are. As a result, independent creators and artists cannot check for these false copyright claims nor do they have the power to directly act on them. They need to go through a digital rights management company that does have access. And it seems like thieves are doing the same, falsifying documents to gain access to these YouTube tools through these third parties that are “trusted” with these tools by YouTube.