πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ IT Pros May Use Cloud, But They Trust On-Prem More πŸ•΄

While opinions about the trustworthiness of the cloud are split, everyone believes that's where hackers will focus their efforts.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-21722 β€Ό

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41166 β€Ό

The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. An issue in versions prior to 3.17.1 may lead to sensitive information disclosure. An unauthorized app that does not have the otherwise required `MANAGE_DOCUMENTS` permission may view image thumbnails for images it does not have permission to view. Version 3.17.1 contains a patch. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21723 β€Ό

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0370 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22828 β€Ό

An insecure direct object reference for the file-download URL in Synametrics SynaMan before 5.0 allows a remote attacker to access unshared files via a modified base64-encoded filename string.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0387 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0372 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist bytefury/crater prior to 6.0.2.

πŸ“– Read

via "National Vulnerability Database".
❌ How to Secure Your SaaS Stack with a SaaS Security Posture Management Solution ❌

SaaS Security Posture Management (SSPM) named a must have solution by Gartner. Adaptive Shields SSPM solution allows security teams full visibility and control.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ DeepDotWeb administrator gets eight-year stretch in US prison for money laundering πŸ—“οΈ

Tal Prihar pleaded guilty to his role in darknet kickback scheme last year

πŸ“– Read

via "The Daily Swig".
⚠ β€œPwnKit” security bug gets you root on most Linux distros – what to do ⚠

An elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell

πŸ“– Read

via "Naked Security".
⚠ Apple patches Safari data leak (oh, and a zero-day) – patch now! ⚠

That infamous "supercookie" bug in Safari has now been fixed. Oh, and there was a zero-day kernel hole as well.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Solarwinds fixes code execution bug in enterprise helpdesk software πŸ—“οΈ

Exploit gave attackers access to corporate databases, although local access was required

πŸ“– Read

via "The Daily Swig".
❌ Shipment-Delivery Scams a Fav Way to Spread Malware ❌

Attackers increasingly are spoofing the courier DHL and using socially engineered messages related to packages to trick users into downloading Trickbot and other malicious payloads.

πŸ“– Read

via "Threat Post".
πŸ›  American Fuzzy Lop plus plus 4.00c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Zeek 4.2.0 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-44795 β€Ό

Single Connect does not perform an authorization check when using the "sc-assigned-credential-ui" module. A remote attacker could exploit this vulnerability to modify users permissions. The exploitation of this vulnerability might allow a remote attacker to delete permissions from other users without authenticating.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28096 β€Ό

An issue was discovered in Stormshield SNS before 4.2.3 (when the proxy is used). An attacker can saturate the proxy connection table. This would result in the proxy denying any new connections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44794 β€Ό

Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23181 β€Ό

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44793 β€Ό

Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.

πŸ“– Read

via "National Vulnerability Database".