πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-21173 β€Ό

Hidden functionality vulnerability in ELECOM LAN routers (WRH-300BK3 firmware v1.05 and earlier, WRH-300WH3 firmware v1.05 and earlier, WRH-300BK3-S firmware v1.05 and earlier, WRH-300DR3-S firmware v1.05 and earlier, WRH-300LB3-S firmware v1.05 and earlier, WRH-300PN3-S firmware v1.05 and earlier, WRH-300WH3-S firmware v1.05 and earlier, and WRH-300YG3-S firmware v1.05 and earlier) allows an attacker on the adjacent network to execute an arbitrary OS command via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22142 β€Ό

Reflected cross-site scripting vulnerability in the checkbox of php_mailform versions prior to Version 1.40 allows a remote unauthenticated attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20877 β€Ό

Cross-site scripting vulnerability in Canon laser printers and small office multifunctional printers (LBP162L/LBP162, MF4890dw, MF269dw/MF265dw/MF264dw/MF262dw, MF249dw/MF245dw/MF244dw/MF242dw/MF232w, and MF229dw/MF224dw/MF222dw sold in Japan, imageCLASS MF Series (MF113W/MF212W/MF217W/MF227DW/MF229DW, MF232W/MF244DW/MF247DW/MF249DW, MF264DW/MF267DW/MF269DW/MF269DW VP, and MF4570DN/MF4570DW/MF4770N/MF4880DW/MF4890DW) and imageCLASS LBP Series (LBP113W/LBP151DW/LBP162DW ) sold in the US, and iSENSYS (LBP162DW, LBP113W, LBP151DW, MF269dw, MF267dw, MF264dw, MF113w, MF249dw, MF247dw, MF244dw, MF237w, MF232w, MF229dw, MF217w, MF212w, MF4780w, and MF4890dw) and imageRUNNER (2206IF, 2204N, and 2204F) sold in Europe) allows remote attackers to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21799 β€Ό

Cross-site scripting vulnerability in ELECOM LAN router WRC-300FEBK-R firmware v1.13 and earlier allows an attacker on the adjacent network to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21805 β€Ό

Reflected cross-site scripting vulnerability in the attached file name of php_mailform versions prior to Version 1.40 allows a remote unauthenticated attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
❌ China Suspected of News Corp Cyberespionage Attack ❌

Attackers infiltrated the media giant’s network using business email compromise, showing corporate networks' vulnerability due to human error. Here's how to help stop BEC.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ UK anti-encryption drive meets fierce resistance from privacy, security advocates πŸ—“οΈ

Privacy campaigners sign open letter urging government to reconsider E2EE stance

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Get Started on Continuous Compliance Ahead of PCI DSS v4.0 πŸ•΄

Here's what vendors can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DeepSurface Security Secures $4.5M for Business Expansion πŸ•΄

Funding round was led by Differential Ventures, an artificial intelligence and cybersecurity seed venture fund.

πŸ“– Read

via "Dark Reading".
πŸ•΄ InterVision Unveils Ransomware Protection as a Service πŸ•΄

InterVision RPaaS solution provides protection, response, and recovery in one managed service.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Salesforce DevOps Needs Guardrails πŸ•΄

Some companies go too fast when it comes to SaaS, DevOps, and security, but smart developers and implementers will respect some basic guidelines to keep their product safe.

πŸ“– Read

via "Dark Reading".
⚠ Microsoft blocks web installation of its own App Installer files ⚠

It's a big deal when a vendor decides to block one of its own "features" for security reasons. Here's why we think it's a good idea.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-23331 β€Ό

In DataEase v1.6.1, an authenticated user can gain unauthorized access to all user information and can change the administrator password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23340 β€Ό

Joplin 2.6.10 allows remote attackers to execute system commands through malicious code in user search results.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Qualys Launches Context XDR πŸ•΄

Qualys Context XDR provides the security context that operations teams need to eliminate false positives and noise by triangulating risk posture, asset criticality, and threat intelligence.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Zero-day vulnerabilities in Nooie baby monitors could allow video feed hijack πŸ—“οΈ

Unresolved vulnerabilities also create code execution risk, warns Bitdefender

πŸ“– Read

via "The Daily Swig".
⚠ At last! Office macros from the internet to be blocked by default ⚠

It's been a long time coming, and we're not there yet, but at least Microsoft Office will be a bit safer against macro malware...

πŸ“– Read

via "Naked Security".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.6.10 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-44957 β€Ό

Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44956 β€Ό

Two Heap based buffer overflow vulnerabilities exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23852. Issues that are in the jfif_decode function at ffjpeg/src/jfif.c (line 552) could cause a Denial of Service by using a crafted jpeg file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45326 β€Ό

Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests.

πŸ“– Read

via "National Vulnerability Database".