πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-24957 β€Ό

DHC Vision eQMS through 5.4.8.322 has Persistent XSS due to insufficient encoding of untrusted input/output. To exploit the vulnerability, the attacker has to create or edit a new information object and use the XSS payload as the name. Any user that opens the object's version or history tab will be attacked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45865 β€Ό

A File Upload vulnerability exists in Sourcecodester Student Attendance Manageent System 1.0 via the file upload functionality.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Ukrainian ISP used by military disrupted by β€˜powerful’ cyber-attack πŸ—“οΈ

Russia blamed after internet knocked offline for many across the country

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-23059 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the Ò€œManage ImagesҀ� tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ—“οΈ HTML parser bug triggers Chromium XSS security flaw πŸ—“οΈ

Websites thought to be XSS-protected could have been unintentionally exposed to XSS attacks in Chrome sessions

πŸ“– Read

via "The Daily Swig".
❌ Exchange Servers Speared in IcedID Phishing Campaign ❌

The ever-evolving malware shows off new tactics that use email thread hijacking and other obfuscation techniques to provide advanced evasion techniques.

πŸ“– Read

via "Threat Post".
β™ŸοΈ Hackers Gaining Power of Subpoena Via Fake β€œEmergency Data Requests” β™ŸοΈ

There is a terrifying and highly effective "method" that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can't wait for a court order because it relates to an urgent matter of life and death.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Exploring the Intersection of Physical Security and Cybersecurity πŸ•΄

Residential, commercial, and public buildings are getting smarter; fitting them with a network of connected systems allows buildings to regulate their environment, save energy, and be more secure.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-28149 β€Ό

Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28159 β€Ό

Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28138 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credential.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28145 β€Ό

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28137 β€Ό

A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28134 β€Ό

Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28158 β€Ό

A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28152 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28135 β€Ό

Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28139 β€Ό

A missing permission check in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28146 β€Ό

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28142 β€Ό

Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28148 β€Ό

The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.

πŸ“– Read

via "National Vulnerability Database".