πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-28278 β€Ό

A Heap-based Buffer Overflow vulnerability exists in jhead 3.04 and 3.05 via the RemoveSectionType function in jpgfile.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25609 β€Ό

Stored Cross-Site Scripting (XSS) in Yoo Slider Γ’β‚¬β€œ Image Slider & Video Slider (WordPress plugin) allows attackers with contributor or higher user role to inject the malicious code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4180 β€Ό

An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24731 β€Ό

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.5.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal vulnerability, allowing a malicious user with read/write access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `create` or `update` access to Applications can leak the contents of any text file on the repo-server. By crafting a malicious Helm chart and using it in an Application, the attacker can retrieve the sensitive file's contents either as part of the generated manifests or in an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from another Application's source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The problem can be mitigated by avoiding storing secrets in git, avoiding mounting secrets as files on the repo-server, avoiding decrypting secrets into files on the repo-server, and carefully limiting who can `create` or `update` Applications.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0996 β€Ό

A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25608 β€Ό

Cross-Site Request Forgery (CSRF) in Yoo Slider Γ’β‚¬β€œ Image Slider & Video Slider (WordPress plugin) allows attackers to trick authenticated users into unwanted slider duplicate or delete action.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0854 β€Ό

A memory leak flaw was found in the Linux kernelÒ€ℒs DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24730 β€Ό

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications' source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24293 β€Ό

Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-28276 β€Ό

A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a wild address read in the ProcessCanonMakerNoteDir function in makernote.c.

πŸ“– Read

via "National Vulnerability Database".
⚠ Serious Security: DEADBOLT – the ransomware that goes straight for your backups ⚠

Some tips on how to keep your network safe - even (or perhaps especially!) if you think you're safe already.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-24934 β€Ό

wpsupdater.exe in Kingsoft WPS Office through 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24768 β€Ό

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All unpatched versions of Argo CD starting with 1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. Versions starting with 0.8.0 and 0.5.0 contain limited versions of this issue. To perform exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` and `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges. A patch for this vulnerability has been released in Argo CD versions 2.3.2, 2.2.8, and 2.1.14. Some mitigation measures are available but do not serve as a substitute for upgrading. To avoid privilege escalation, limit who has push access to Application source repositories or `sync` + `override` access to Applications; and limit which repositories are available in projects where users have `update` access to Applications. To avoid unauthorized resource inspection/tampering, limit who has `delete`, `get`, or `action` access to Applications.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20095 β€Ό

iMessage (Messages app) iOS 12.4 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25269 β€Ό

Passwork On-Premise Edition before 4.6.13 has multiple XSS issues.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44226 β€Ό

Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22819 β€Ό

NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25267 β€Ό

Passwork On-Premise Edition before 4.6.13 allows migration/uploadExportFile Directory Traversal (to upload files).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25041 β€Ό

OpenEMR v6.0.0 was discovered to contain an incorrect access control issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20094 β€Ό

Instagram iOS 106.0 and prior and Android 107.0.0.11 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20096 β€Ό

Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.

πŸ“– Read

via "National Vulnerability Database".