πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-0145 β€Ό

Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22809 β€Ό

A CWE-306: Missing Authentication for Critical Function vulnerability exists that could allow modifications of the touch configurations in an unauthorized manner when an attacker attempts to modify the touch configurations. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22545 β€Ό

A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0183 β€Ό

Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39994 β€Ό

There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0534 β€Ό

A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22813 β€Ό

A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20032 β€Ό

In vow driver, there is a possible memory corruption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05852822; Issue ID: ALPS05852822.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22807 β€Ό

A CWE-1021 Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause unintended modifications of the product settings or user accounts when deceiving the user to use the web interface rendered within iframes. Affected Product: EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20037 β€Ό

In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0115 β€Ό

Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep69: WordPress woes, Wormhole holes, and a Microsoft change of heart [Podcast + Transcript] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
β™ŸοΈ Russian Govt. Continues Carding Shop Crackdown β™ŸοΈ

Russian authorities have arrested six men accused of operating some of the most active online bazaars for selling stolen payment card data. The crackdown -- the second closure of major card fraud shops by Russian authorities in as many weeks -- comes closely behind Russia's arrest of 14 alleged affiliates of the REvil ransomware gang, and has many in the cybercrime underground asking who might be next.

πŸ“– Read

via "Krebs on Security".
❌ PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE ❌

The plug-in’s default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-45901 β€Ό

The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Bot Marketplaces as a Source of Future Data Breaches πŸ•΄

Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Data Transparency Hasn't Made Us Safer Yet. Can It Uncover Breach Causality? πŸ•΄

Advanced machine learning models within an XDR framework could uncover what actually causes breaches, but first we need better data transparency.

πŸ“– Read

via "Dark Reading".
❌ SAP to Give Threat Briefing on Uber-Severe β€˜ICMAD’ Bugs ❌

SAP’s Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers to hijack identities, steal data and more.

πŸ“– Read

via "Threat Post".
πŸ›  nfstream 6.4.1 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-24111 β€Ό

In Mahara 21.04 before 21.04.3 and 21.10 before 21.10.1, portfolios created in groups that have not been shared with non-group members and portfolios created on the site and institution levels can be viewed without requiring a login if the URL to these portfolios is known.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Ransomware surge prompts joint NCSC, CISA warning to safeguard systems πŸ—“οΈ

Weekend attacks and assaults on the software supply chain mark evolving TTPs

πŸ“– Read

via "The Daily Swig".