πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-24712 β€Ό

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for March 2022 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
❌ Toyota to Close Japan Plants After Suspected Cyberattack ❌

The plants will shut down on Tuesday, halting about a third of the company’s global production. Toyota doesn’t know how long the 14 plants will be unplugged.

πŸ“– Read

via "Threat Post".
πŸ•΄ Researchers Warn of Stealthy Chinese Backdoor Targeting Multiple Foreign Agencies πŸ•΄

A stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data while remaining undetected.

πŸ“– Read

via "Dark Reading".
πŸ‘1
⚠ Did we learn nothing from Y2K? Why are some coders still stuck on two digit numbers? ⚠

Calling all website coders: Y2K was then. V1H is now!

πŸ“– Read

via "Naked Security".
⚠ Instagram scammers as busy as ever: passwords and 2FA codes at risk ⚠

Instagram scams don't seem to be dying out - we're seeing more variety and trickiness than ever...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-44331 β€Ό

ARM astcenc 3.2.0 is vulnerable to Buffer Overflow in function encode_ise().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44342 β€Ό

David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow via function ok_png_transform_scanline() in "/ok_png.c:494".

πŸ“– Read

via "National Vulnerability Database".
πŸ” New Report Pushes for Strong Intellectual Property Protection πŸ”

The report encourages the United States to engage like-minded partners on new tools to counter IP theft and better protect IP at home for trade purposes.

πŸ“– Read

via "".
❌ Ukraine-Russia Cyber Warzone Splits Cyber Underground ❌

A pro-Ukraine Conti member spilled 13 months of the ransomware group's chats, while cyber actors are rushing to align with both sides.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-26315 β€Ό

qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25023 β€Ό

Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25013 β€Ό

Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the "key" and "fm" parameters in the component login.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22845 β€Ό

A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted FTP requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25014 β€Ό

Ice Hrm 30.0.0.OS was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "m" parameter in the Dashboard of the current user. This vulnerability allows attackers to compromise session credentials via user interaction with a crafted link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41112 β€Ό

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25015 β€Ό

A stored cross-site scripting (XSS) vulnerability in Ice Hrm 30.0.0.OS allows attackers to steal cookies via a crafted payload inserted into the First Name field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41111 β€Ό

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22844 β€Ό

A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted SMB requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26181 β€Ό

Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Invicti Security Adds Software Composition Analysis to Its Industry- Leading AppSec Platform πŸ•΄

Invicti SCA enables users to track and secure open-source components to reduce security risk.

πŸ“– Read

via "Dark Reading".