πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-22569 β€Ό

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44528 β€Ό

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40022 β€Ό

The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23568 β€Ό

The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40001 β€Ό

The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46163 β€Ό

Kentico Xperience 13.0.44 allows XSS via an XML document to the Media Libraries subsystem.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Evolution of Patch Management: How and When It Got So Complicated πŸ•΄

In the wake of WannaCry and its ilk, the National Vulnerability Database arose to help security organizations track and prioritize vulnerabilities to patch. Part 1 of 3.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22264 β€Ό

Improper sanitization of incoming intent in Dressroom prior to SMR Jan-2022 Release 1 allows local attackers to read and write arbitrary files without permission.

πŸ“– Read

via "National Vulnerability Database".
🦿 Behind the scenes: A day in the life of a security auditing manager 🦿

Working with clients on finding vulnerabilities within their cybersecurity frameworks is the key part of a security manager's job. Here's how one security auditing manager gets it done.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Report: DDoS attacks increasing year on year as cybercriminals demand extortionate payouts πŸ—“οΈ

Crooks attempt to cash in by upping the ante

πŸ“– Read

via "The Daily Swig".
❌ Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High ❌

Cyberattacks increased 50 percent YoY in 2021 and peaked in December due to a frenzy of Log4j exploits, researchers found.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-22116 β€Ό

In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victimÒ€ℒs browser when they open the image URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44586 β€Ό

An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0156 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0158 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25052 β€Ό

The Button Generator WordPress plugin before 2.3.3 within the wow-company admin menu page allows to include() arbitrary file with PHP extension (as well as with data:// or http:// protocols), thus leading to CSRF RCE.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22115 β€Ό

In Teedy, versions v1.5 through v1.9 are vulnerable to Stored Cross-Site Scripting (XSS) in the name of a created Tag. Since the Tag name is not being sanitized properly in the edit tag page, a low privileged attacker can store malicious scripts in the name of the Tag. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account Takeover of the administrator, and privileges escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24948 β€Ό

The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not validate the qvquery parameter of the tp_get_dl_post_info_ajax AJAX action, which could allow unauthenticated users to retrieve sensitive information, such as private and draft posts

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25054 β€Ό

The WPcalc WordPress plugin through 2.1 does not sanitize user input into the 'did' parameter and uses it in a SQL statement, leading to an authenticated SQL Injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44458 β€Ό

Linux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25047 β€Ό

The 10Web Social Photo Feed WordPress plugin before 1.4.29 was affected by a reflected Cross-Site Scripting (XSS) vulnerability in the wdi_apply_changes admin page, allowing an attacker to perform such attack against any logged in users

πŸ“– Read

via "National Vulnerability Database".