πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-22693 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22686 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23052 β€Ό

PeteReport Version 0.5 contains a Cross Site Request Forgery (CSRF) vulnerability allowing an attacker to trick users into deleting users, products, reports and findings on the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38578 β€Ό

Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22943 β€Ό

VMware Tools for Windows (11.x.y and 10.x.y prior to 12.0.0) contains an uncontrolled search path vulnerability. A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22687 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0265 β€Ό

Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast prior to 5.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22695 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22690 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22689 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23051 β€Ό

PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code while adding an 'Attack Tree' by modifying the 'svg_file' parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22947 β€Ό

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23708 β€Ό

A flaw was discovered in Elasticsearch 7.17.0Ò€ℒs upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with Ò€œ*Ҁ� index permissions access to this index.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-4002 β€Ό

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Equifax data breach: Consumers unlikely to benefit financially from final settlement πŸ—“οΈ

Potential claimants would face an β€˜uphill battle in order to establish standing’, says US privacy law expert

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-23327 β€Ό

A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0752 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository hestiacp/hestiacp prior to 1.5.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23328 β€Ό

A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ RCE vulnerability in Dynamicweb enterprise software could allow server compromise πŸ—“οΈ

β€˜Extremely easy to exploit’ bug introduced to codebase in 2018, say researchers

πŸ“– Read

via "The Daily Swig".
πŸ•΄ DORA's Global Reach and Why Enterprises Need to Prepare πŸ•΄

The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-46393 β€Ό

There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v10 variable is directly retrieved from the http request parameter startIp. Then v10 will be splice to stack by function sscanf without any security check,which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".