πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-22703 β€Ό

In Stormshield SSO Agent 2.x before 2.1.1 and 3.x before 3.0.2, the cleartext user password and PSK are contained in the log file of the .exe installer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0245 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat prior to 2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44757 β€Ό

Zoho ManageEngine Desktop Central before 10.1.2137.9 and Desktop Central MSP before 10.1.2137.9 allow attackers to bypass authentication, and read sensitive information or upload an arbitrary ZIP archive to the server.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Researchers discover β€˜extremely easy’ 2FA bypass in Box cloud management software πŸ—“οΈ

Breaking the Box

πŸ“– Read

via "The Daily Swig".
❌ Organizations Face a β€˜Losing Battle’ Against Vulnerabilities ❌

Companies must take more β€˜innovative and proactive’ approaches to security in 2022 to combat threats that emerged last year, researchers said.

πŸ“– Read

via "Threat Post".
πŸ•΄ 5 Reasons Why M&A Is the Engine Driving Cybersecurity πŸ•΄

Consistent acquisition of key technologies and talent is a proven strategy for growth.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Avoid Putting Data At Risk During the Great Resignation πŸ•΄

Never before have companies offboarded employees at this pace, making it more likely that some processes, from protecting data to revoking the employee's access, will slip through the cracks.

πŸ“– Read

via "Dark Reading".
🦿 DHL takes top spot as most imitated brand in phishing attacks 🦿

For the final quarter of 2021, DHL surpassed Microsoft as the brand most spoofed in phishing campaigns, says Check Point Research.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-38783 β€Ό

There is a Out-of-Bound Write in the Allwinner R818 SoC Android Q SDK V1.0 camera driver "/dev/cedar_dev" through iotcl cmd IOCTL_SET_PROC_INFO and IOCTL_COPY_PROC_INFO, which could cause a system crash or EoP.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22566 β€Ό

An incorrect setting of UXN bits within mmu_flags_to_s1_pte_attr lead to privileged executable pages being mapped as executable from an unprivileged context. This can be leveraged by an attacker to bypass executability restrictions of kernel-mode pages from user-mode. An incorrect setting of PXN bits within mmu_flags_to_s1_pte_attr lead to unprivileged executable pages being mapped as executable from a privileged context. This can be leveraged by an attacker to bypass executability restrictions of user-mode pages from kernel-mode. Typically this allows a potential attacker to circumvent a mitigation, making exploitation of potential kernel-mode vulnerabilities easier. We recommend updating kernel beyond commit 7d731b4e9599088ac3073956933559da7bca6a00 and rebuilding.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33965 β€Ό

China Mobile An Lianbao WF-1 V1.0.1 router provides a web interface /api/ZRMesh/set_ZRMesh which receives parameters by POST request, and the parameter mesh_enable and mesh_device have a command injection vulnerability. An attacker can use the vulnerability to execute remote commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38694 β€Ό

SoftVibe SARABAN for INFOMA 1.1 allows SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38785 β€Ό

There is a NULL pointer deference in the Allwinner R818 SoC Android Q SDK V1.0 camera driver /dev/cedar_dev that could use the ioctl cmd IOCTL_GET_IOMMU_ADDR to cause a system crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38784 β€Ό

There is a NULL pointer dereference in the syscall open_exec function of Allwinner R818 SoC Android Q SDK V1.0 that could executable a malicious file to cause a system crash.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Chrome to bolster CSRF protections with CORS preflight checks on private network requests πŸ—“οΈ

Phased rollout begins from Chrome 98 with DevTools warnings of failed preflight requests

πŸ“– Read

via "The Daily Swig".
❌ Critical ManageEngine Desktop Server Bug Opens Orgs to Malware ❌

Zoho's comprehensive endpoint-management platform suffers from an authentication-bypass bug (CVE-2021-44757) that could lead to remote code execution.

πŸ“– Read

via "Threat Post".
πŸ•΄ Name That Toon: Nowhere to Hide πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-38695 β€Ό

SoftVibe SARABAN for INFOMA 1.1 is vulnerable to stored cross-site scripting (XSS) that allows users to store scripts in certain fields (e.g. subject, description) of the document form.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38697 β€Ό

SoftVibe SARABAN for INFOMA 1.1 allows Unauthenticated unrestricted File Upload, that allows attackers to upload files with any file extension which can lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0262 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23302 β€Ό

JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

πŸ“– Read

via "National Vulnerability Database".