πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Trend Micro warns of active attacks against Apex Central console πŸ—“οΈ

Scramble to patch security dashboard

πŸ“– Read

via "The Daily Swig".
⚠ Google’s monthly Android updates patch numerous β€œget root” holes ⚠

Get the update now... if it's available for your phone. Here's how to check.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ US government launches Bureau of Cyberspace and Digital Policy to enhance cybersecurity across nation πŸ—“οΈ

Department will be tasked with addressing the security challenges and opportunities associated with cyberspace

πŸ“– Read

via "The Daily Swig".
⚠ Firefox 99 is out – no major bugs, but update anyway! ⚠

Firefox's four-weekly updates just dropped - here's what you need to know.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-26982 β€Ό

SimpleMachinesForum 2.1.1 and earlier allows remote authenticated administrators to execute arbitrary code by inserting a vulnerable php code because the themes can be modified by an administrator.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26986 β€Ό

SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41245 β€Ό

Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, CSRF tokens generated by `privUITransactionFile` aren't properly checked. Versions 2.7.6 and 3.0.0 contain a patch for this issue. As a workaround, use the session implementation by adding in the iTop config file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1243 β€Ό

CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ What We Can Learn From Lapsus$ Techniques πŸ•΄

The group is targeting the biggest weak spot in most security postures: finding anomalous behavior by authorized entities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Name That Edge Toon: In Deep Water πŸ•΄

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How IP Data Can Help Security Professionals Protect Their Networks πŸ•΄

Beefing up security requires a combination of forensic efforts and proactive mitigation. IP context aids both.

πŸ“– Read

via "Dark Reading".
❌ Authorities Fully Behead Hydra Dark Marketplace ❌

The popular underground market traded in drugs, stolen data, forged documents and more -- raking in billions in Bitcoin.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-23349 β€Ό

An intent redirection issue was doscovered in Sina Weibo Android SDK 4.2.7 (com.sina.weibo.sdk.share.WbShareTransActivity), any unexported Activities could be started by the com.sina.weibo.sdk.share.WbShareTransActivity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28847 β€Ό

Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19229 β€Ό

Jeesite 1.2.7 uses the apache shiro version 1.2.3 affected by CVE-2016-4437. Because of this version of the java deserialization vulnerability, an attacker could exploit the vulnerability to execute arbitrary commands via the rememberMe parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26635 β€Ό

PHP-Memcached v2.2.0 and below contains an improper NULL termination which allows attackers to execute CLRF injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41751 β€Ό

Buffer overflow vulnerability in file ecma-builtin-array-prototype.c:909 in function ecma_builtin_array_prototype_object_slice in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24795 β€Ό

yajl-riuby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of yajl contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution to be unlikely. A patch is available and anticipated to be part of version 1.4.2. As a workaround, avoid passing large inputs to YAJL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22355 β€Ό

IBM MQ Appliance 9.2 CD and 9.2 LTS are vulnerable to a denial of service in the Login component of the application which could allow an attacker to cause a drop in performance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27463 β€Ό

Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0602 β€Ό

Cross-site Scripting (XSS) - DOM in GitHub repository tastyigniter/tastyigniter prior to 3.3.0.

πŸ“– Read

via "National Vulnerability Database".