πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-22563 β€Ό

Dell EMC Powerscale OneFS 8.2.x - 9.2.x omit security-relevant information in /etc/master.passwd. A high-privileged user can exploit this vulnerability to not record information identifying the source of account information changes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36290 β€Ό

Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26588 β€Ό

A Cross-Site Request Forgery (CSRF) in IceHrm 31.0.0.OS allows attackers to delete arbitrary users or achieve account takeover via the app/service.php URI.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26855 β€Ό

Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability, leading to a denial of service.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-36293 β€Ό

Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26854 β€Ό

Dell PowerScale OneFS, versions 8.2.x-9.2.x, contain risky cryptographic algorithms. A remote unprivileged malicious attacker could potentially exploit this vulnerability, leading to full system access

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Removes Dangerous Banking Malware From Play Store πŸ•΄

SharkBot was hidden in apps masquerading as antivirus tools.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-26877 β€Ό

Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27149 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27883 β€Ό

A link following vulnerability in Trend Micro Antivirus for Mac 11.5 could allow an attacker to create a specially-crafted file as a symlink that can lead to privilege escalation. Please note that an attacker must at least have low-level privileges on the system to attempt to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28363 β€Ό

Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/login_process username parameter via GET. No authentication is required.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28364 β€Ό

Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/rlmswitchr_process file parameter via GET. Authentication is required.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28365 β€Ό

Reprise License Manager 14.2 is affected by an Information Disclosure vulnerability via a GET request to /goforms/rlminfo. No authentication is required. The information disclosed is associated with software versions, process IDs, network configuration, hostname(s), system architecture, and file/directory details.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1287 β€Ό

A vulnerability classified as critical was found in School Club Application System 1.0. This vulnerability affects a request to the file /scas/classes/Users.php?f=save_user. The manipulation with a POST request leads to privilege escalation. The attack can be initiated remotely and does not require authentication. The exploit has been disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1288 β€Ό

A vulnerability, which was classified as problematic, has been found in School Club Application System 1.0. This issue affects access to /scas/admin/. The manipulation of the parameter page with the input %22%3E%3Cimg%20src=x%20onerror=alert(1)%3E leads to a reflected cross site scripting. The attack may be initiated remotely and does not require any form of authentication. The exploit has been disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1290 β€Ό

Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1289 β€Ό

A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.

πŸ“– Read

via "National Vulnerability Database".
🀯1
πŸ“’ Mounting US data disasters show we're lucky to have GDPR πŸ“’

A long list of failures by US companies shows the government’s planned overhaul of the UK data protection landscape needs much closer scrutiny

πŸ“– Read

via "ITPro".
πŸ“’ Why the ECJ's metadata ruling endangers the safety of women πŸ“’

Until we live in a society in which women are safe, we might need to compromise on mass data collection

πŸ“– Read

via "ITPro".
πŸ“’ Rackspace partners with Cohesity on new data protection services for VMware workloads πŸ“’

Deal aims to eliminate legacy backup silos and provide comprehensive protection against the β€œarray of rising data threats”

πŸ“– Read

via "ITPro".
πŸ“’ Raspberry Pi OS update bolsters security against brute force attacks πŸ“’

The security change was made in line with increasing number of countries choosing to outlaw default credentials

πŸ“– Read

via "ITPro".