πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-25031 β€Ό

Remote Desktop Commander Suite Agent before v4.8 contains an unquoted service path which allows attackers to escalate privileges to the system level.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Attivo Expands Active Directory Protection from Unmanaged Devices, Including Mac, Linux, IoT/OT πŸ•΄

Attivo Networks ADSecure-DC solution joins the company’s existing suite of Active Directory protection products.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 8-Character Passwords Can Be Cracked in Less than 60 Minutes πŸ•΄

Researchers say passwords with less than seven characters can be hacked "instantly."

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Google WAF bypassed via oversized POST requests πŸ—“οΈ

Security research highlights web application firewall security risk

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-26128 β€Ό

A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26126 β€Ό

Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a non-zero-terminated binary string in isis_nb_notifications.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26125 β€Ό

Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26129 β€Ό

Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25138 β€Ό

Axelor Open Suite v5.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Name parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26127 β€Ό

A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to missing a check on the input packet length in the babel_packet_examin function in babeld/message.c.

πŸ“– Read

via "National Vulnerability Database".
πŸ” OCR Urges Organizations to Secure Health Information in 2022 πŸ”

The Director of HHS OCR called on healthcare organizations this week to strengthen their cyber posture in 2022.

πŸ“– Read

via "".
πŸ•΄ Cybersecurity Mesh Architecture: Hope or Hype? πŸ•΄

Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3620 β€Ό

A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3602 β€Ό

An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD environment, environment variables may include sensitive information that was shared with the container in order to be used only by Buildah itself (e.g. container registry credentials).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23899 β€Ό

MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via search.do in the file /web/MCmsAction.java.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0492 β€Ό

A vulnerability was found in the Linux kernelÒ€ℒs cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25125 β€Ό

MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via search.do in the file /mdiy/dict/listExcludeApp.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23898 β€Ό

MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3609 β€Ό

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24724 β€Ό

cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22700 β€Ό

CyberArk Identity versions up to and including 22.1 in the 'StartAuthentication' resource, exposes the response header 'X-CFY-TX-TM'. In certain configurations, that response header contains different, predictable value ranges which can be used to determine whether a user exists in the tenant.

πŸ“– Read

via "National Vulnerability Database".