πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Behind the scenes: A day in the life of a security auditing manager 🦿

Working with clients on finding vulnerabilities within their cybersecurity frameworks is the key part of a security manager's job. Here's how one security auditing manager gets it done.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Report: DDoS attacks increasing year on year as cybercriminals demand extortionate payouts πŸ—“οΈ

Crooks attempt to cash in by upping the ante

πŸ“– Read

via "The Daily Swig".
❌ Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High ❌

Cyberattacks increased 50 percent YoY in 2021 and peaked in December due to a frenzy of Log4j exploits, researchers found.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-22116 β€Ό

In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victimÒ€ℒs browser when they open the image URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44586 β€Ό

An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0156 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0158 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25052 β€Ό

The Button Generator WordPress plugin before 2.3.3 within the wow-company admin menu page allows to include() arbitrary file with PHP extension (as well as with data:// or http:// protocols), thus leading to CSRF RCE.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22115 β€Ό

In Teedy, versions v1.5 through v1.9 are vulnerable to Stored Cross-Site Scripting (XSS) in the name of a created Tag. Since the Tag name is not being sanitized properly in the edit tag page, a low privileged attacker can store malicious scripts in the name of the Tag. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account Takeover of the administrator, and privileges escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24948 β€Ό

The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not validate the qvquery parameter of the tp_get_dl_post_info_ajax AJAX action, which could allow unauthenticated users to retrieve sensitive information, such as private and draft posts

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25054 β€Ό

The WPcalc WordPress plugin through 2.1 does not sanitize user input into the 'did' parameter and uses it in a SQL statement, leading to an authenticated SQL Injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44458 β€Ό

Linux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25047 β€Ό

The 10Web Social Photo Feed WordPress plugin before 1.4.29 was affected by a reflected Cross-Site Scripting (XSS) vulnerability in the wdi_apply_changes admin page, allowing an attacker to perform such attack against any logged in users

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43949 β€Ό

Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view private objects via a Broken Access Control vulnerability in the Custom Fields feature. The affected versions are before version 4.21.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25043 β€Ό

The WOOCS WordPress plugin before 1.3.7.3 does not sanitise and escape the custom_prices parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22121 β€Ό

In NocoDB, versions 0.81.0 through 0.83.8 are affected by CSV Injection vulnerability (Formula Injection). A low privileged attacker can create a new table to inject payloads in the table rows. When an administrator accesses the User Management endpoint and exports the data as a CSV file and opens it, the payload gets executed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0157 β€Ό

phoronix-test-suite is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24862 β€Ό

The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22114 β€Ό

In Teedy, versions v1.5 through v1.9 are vulnerable to Reflected Cross-Site Scripting (XSS). The Ò€œsearch term" search functionality is not sufficiently sanitized while displaying the results of the search, which can be leveraged to inject arbitrary scripts. These scripts are executed in a victimÒ€ℒs browser when they enter the crafted URL. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account Takeover of the administrator, by an unauthenticated attacker.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24949 β€Ό

The "WP Search Filters" widget of The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not sanitise and escape the option parameter before using it in a SQL statement, which could lead to SQL injection

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23218 β€Ό

When running with FIPS mode enabled, Mirantis Container Runtime 20.10.8 leaks memory during TLS Handshakes which could be abused to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".