πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Attackers Hone Their Playbooks, Become More Agile πŸ•΄

Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Darktrace Artificial Intelligence Stops Cyberattack at Italian Electronics Distributor πŸ•΄

Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Neustar Security Services Report Highlights Shifts in Threat Landscape Amid Maturing Cybercrime Economy πŸ•΄

Carpet bombing attacks increase sharply in 2021, along with complex multivector attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ NSA Issues Guidance for Selecting Strong Cisco Password Types πŸ•΄

Poorly protected passwords in device configuration files present a risk of compromise, agency says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22914 β€Ό

An incorrect access control issue in the component FileManager of Ovidentia CMS 6.0 allows authenticated attackers to to view and download content in the upload directory via path traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45382 β€Ό

A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46319 β€Ό

Remote Code Execution (RCE) vulnerability exists in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicious users can use this vulnerability to use "\ " or backticks to bypass the shell metacharacters in the ssid0 or ssid1 parameters to execute arbitrary commands.This vulnerability is due to the fact that CVE-2019-17509 is not fully patched and can be bypassed by using line breaks or backticks on its basis.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46314 β€Ό

A Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetNetworkTomographySettings.php of D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin because backticks can be used for command injection when judging whether it is a reasonable domain name.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22916 β€Ό

O2OA v6.4.7 was discovered to contain a remote code execution (RCE) vulnerability via /x_program_center/jaxrs/invoke.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23646 β€Ό

Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46315 β€Ό

Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetWizardConfig.php in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicoius users can use this vulnerability to use "\ " or backticks in the shell metacharacters in the ssid0 or ssid1 parameters to cause arbitrary command execution. Since CVE-2019-17510 vulnerability has not been patched and improved www/hnap1/control/setwizardconfig.php, can also use line breaks and backquotes to bypass.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25313 β€Ό

In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22922 β€Ό

TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25315 β€Ό

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25314 β€Ό

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46108 β€Ό

D-Link DSL-2730E CT-20131125 devices allow XSS via the username parameter to the password page in the maintenance configuration.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Lagging behind? New study highlights weaknesses in open source patch process πŸ—“οΈ

Patch delays create a β€˜window of opportunity’ for observant attackers

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-0660 β€Ό

Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
❌ Iranian State Broadcaster Clobbered by β€˜Clumsy, Buggy’ Code ❌

Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of Iran’s Supreme Leader was a clumsy and unsophisticated wiper attack.

πŸ“– Read

via "Threat Post".
❌ Severe WordPress Plug-In UpdraftPlus Bug Threatens Backups ❌

An oversight in a WordPress plug-in exposes PII and authentication data to malicious insiders.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Critical vulnerabilities in Zabbix Web Frontend allow authentication bypass, code execution on servers πŸ—“οΈ

Patch now to protect, say researchers

πŸ“– Read

via "The Daily Swig".