πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-44868 β€Ό

A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-20750 β€Ό

A vulnerability in the checkpoint manager implementation of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow an unauthenticated, remote attacker to cause the checkpoint manager process to restart upon receipt of malformed TCP data. This vulnerability is due to improper input validation of an ingress TCP packet. An attacker could exploit this vulnerability by sending crafted TCP data to the affected application. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the checkpoint manager process restarting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23632 β€Ό

Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. Version 2.6.1 contains a patch for this issue. As a workaround, one may add the FDQN to the host rule. However, there is no workaround if the CNAME flattening is enabled.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript] ⚠

Latest episode - listen and learn!

πŸ“– Read

via "Naked Security".
❌ Baby Golang-Based Botnet Already Pulling in $3K/Month for Operators ❌

Kraken has already spread like wildfire, but in the past few months, the malware's author has been tinkering away, adding more infostealers and backdoors.

πŸ“– Read

via "Threat Post".
πŸ•΄ Software-Developer Security Vendor Snyk Buys Cloud Security Company πŸ•΄

Acquisition helps expand Snyk into the cloud security sector.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24683 β€Ό

HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39034 β€Ό

IBM MQ 9.1 LTS is vulnerable to a denial of service attack caused by an issue within the channel process. IBM X-Force ID: 213964.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0638 β€Ό

Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0639 β€Ό

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Teams Expect Attackers to Go After End Users First πŸ•΄

Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Reading’s Endpoint Security Survey.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Confluera Cloud Research Finds Cybersecurity Concern as Biggest Obstacle to Cloud and Multicloud Adoption πŸ•΄

Meanwhile, 84% of IT leaders are optimistic about their cybersecurity readiness for 2022.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Attackers Hone Their Playbooks, Become More Agile πŸ•΄

Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Darktrace Artificial Intelligence Stops Cyberattack at Italian Electronics Distributor πŸ•΄

Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Neustar Security Services Report Highlights Shifts in Threat Landscape Amid Maturing Cybercrime Economy πŸ•΄

Carpet bombing attacks increase sharply in 2021, along with complex multivector attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ NSA Issues Guidance for Selecting Strong Cisco Password Types πŸ•΄

Poorly protected passwords in device configuration files present a risk of compromise, agency says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22914 β€Ό

An incorrect access control issue in the component FileManager of Ovidentia CMS 6.0 allows authenticated attackers to to view and download content in the upload directory via path traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45382 β€Ό

A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46319 β€Ό

Remote Code Execution (RCE) vulnerability exists in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicious users can use this vulnerability to use "\ " or backticks to bypass the shell metacharacters in the ssid0 or ssid1 parameters to execute arbitrary commands.This vulnerability is due to the fact that CVE-2019-17509 is not fully patched and can be bypassed by using line breaks or backticks on its basis.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46314 β€Ό

A Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetNetworkTomographySettings.php of D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin because backticks can be used for command injection when judging whether it is a reasonable domain name.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22916 β€Ό

O2OA v6.4.7 was discovered to contain a remote code execution (RCE) vulnerability via /x_program_center/jaxrs/invoke.

πŸ“– Read

via "National Vulnerability Database".