🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2022-23349

BigAnt Software BigAnt Server v5.6.06 was discovered to contain a Cross-Site Request Forgery (CSRF).

📖 Read

via "National Vulnerability Database".
CVE-2022-23350

BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-23346

BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control issues.

📖 Read

via "National Vulnerability Database".
CVE-2022-23348

BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.

📖 Read

via "National Vulnerability Database".
CVE-2021-38745

Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.

📖 Read

via "National Vulnerability Database".
CVE-2021-40662

A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL.

📖 Read

via "National Vulnerability Database".
CVE-2021-46390

An access control issue in the authentication module of Lexar_F35 v1.0.34 allows attackers to access sensitive data and cause a Denial of Service (DoS). An attacker without access to securely protected data on a secure USB flash drive can bypass user authentication without having any information related to the password of the registered user. The secure USB flash drive transmits the password entered by the user to the authentication module in the drive after the user registers a password, and then the input password is compared with the registered password stored in the authentication module. Subsequently, the module returns the comparison result for the authentication decision. Therefore, an attacker can bypass password authentication by analyzing the functions that return the password verification or comparison results and manipulate the authentication result values. Accordingly, even if attackers enter an incorrect password, they can be authenticated as a legitimate user and can therefore exploit functions of the secure USB flash drive by manipulating the authentication result values.

📖 Read

via "National Vulnerability Database".
🕴 Binarly Coordinates Patches for 3 Firmware Flaws With Dell 🕴

The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.

📖 Read

via "Dark Reading".
🛠 Adversary3 1.0 🛠

Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.

📖 Read

via "Packet Storm Security".
🤔1
Brower-in-the-Browser Attack Makes Phishing Nearly Invisible

Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.

📖 Read

via "Threat Post".
CVE-2022-26283

Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.

📖 Read

via "National Vulnerability Database".
CVE-2022-26284

Simple Client Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the manage_client endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.

📖 Read

via "National Vulnerability Database".
CVE-2022-26183

PNPM v6.15.1 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.

📖 Read

via "National Vulnerability Database".
CVE-2022-27607

Bento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a related issue to CVE-2018-14531.

📖 Read

via "National Vulnerability Database".
CVE-2022-27090

Cscms Music Portal System v4.2 was discovered to contain a redirection vulnerability via the backurl parameter.

📖 Read

via "National Vulnerability Database".
CVE-2022-27333

idcCMS v1.10 was discovered to contain an issue which allows attackers to arbitrarily delete the install.lock file, resulting in a reset of the CMS settings and data.

📖 Read

via "National Vulnerability Database".
1
CVE-2022-26174

A remote code execution (RCE) vulnerability in Beekeeper Studio v3.2.0 allows attackers to execute arbitrary code via a crafted payload injected into the display fields.

📖 Read

via "National Vulnerability Database".
1
CVE-2022-26285

Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the apply endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.

📖 Read

via "National Vulnerability Database".
👏1
CVE-2022-26184

Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.

📖 Read

via "National Vulnerability Database".
2
CVE-2022-1034

There is a Unrestricted Upload of File vulnerability in ShowDoc v2.10.3 in GitHub repository star7th/showdoc prior to 2.10.4.

📖 Read

via "National Vulnerability Database".
🤔1
CVE-2021-45809

Multiple versions of GlobalProtect-openconnect are affected by incorrect access control in GPService through DBUS, GUI Application. The way GlobalProtect-Openconnect is set up enables arbitrary users to execute commands as root by submitting the `--script=<script>` parameter.

📖 Read

via "National Vulnerability Database".