πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-23708 β€Ό

A flaw was discovered in Elasticsearch 7.17.0Ò€ℒs upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with Ò€œ*Ҁ� index permissions access to this index.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-4002 β€Ό

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Equifax data breach: Consumers unlikely to benefit financially from final settlement πŸ—“οΈ

Potential claimants would face an β€˜uphill battle in order to establish standing’, says US privacy law expert

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-23327 β€Ό

A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0752 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository hestiacp/hestiacp prior to 1.5.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23328 β€Ό

A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ RCE vulnerability in Dynamicweb enterprise software could allow server compromise πŸ—“οΈ

β€˜Extremely easy to exploit’ bug introduced to codebase in 2018, say researchers

πŸ“– Read

via "The Daily Swig".
πŸ•΄ DORA's Global Reach and Why Enterprises Need to Prepare πŸ•΄

The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-46393 β€Ό

There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v10 variable is directly retrieved from the http request parameter startIp. Then v10 will be splice to stack by function sscanf without any security check,which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46394 β€Ό

There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v13 variable is directly retrieved from the http request parameter startIp. Then v13 will be splice to stack by function sscanf without any security check, which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43392 β€Ό

STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to obtain information on cryptographic secrets. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26201 β€Ό

Victor CMS v1.0 was discovered to contain a SQL injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44321 β€Ό

Mini-Inventory-and-Sales-Management-System is affected by Cross Site Request Forgery (CSRF), where an attacker can update/delete items in the inventory. The attacker must be logged into the application create a malicious file for updating the inventory details and items.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0831 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43393 β€Ό

STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to abuse signature verification. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0832 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Japanese beauty retailer Acro blames third-party hack for breach of 100k payment cards πŸ—“οΈ

Company traces compromise to vulnerability in payment processor’s systems

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep72: AirTag stalking, web server coding woes and Instascams [Podcast + Transcript] ⚠

Latest episode - listen now (or read it, if that's your preference)...

πŸ“– Read

via "Naked Security".
❌ Free HermeticRansom Ransomware Decryptor Released ❌

Cruddy cryptography means victims whose files have been encrypted by the Ukraine-tormenting ransomware can break the chains without paying extortionists.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-18327 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Alfresco Alfresco Community Edition v5.2.0 via the action parameter in the alfresco/s/admin/admin-nodebrowser API. Fixed in v6.2

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23729 β€Ό

When the device is in factory state, it can be access the shell without adb authentication process. The LG ID is LVE-SMP-210010.

πŸ“– Read

via "National Vulnerability Database".