πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-26877 β€Ό

Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27149 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27883 β€Ό

A link following vulnerability in Trend Micro Antivirus for Mac 11.5 could allow an attacker to create a specially-crafted file as a symlink that can lead to privilege escalation. Please note that an attacker must at least have low-level privileges on the system to attempt to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28363 β€Ό

Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/login_process username parameter via GET. No authentication is required.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28364 β€Ό

Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/rlmswitchr_process file parameter via GET. Authentication is required.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28365 β€Ό

Reprise License Manager 14.2 is affected by an Information Disclosure vulnerability via a GET request to /goforms/rlminfo. No authentication is required. The information disclosed is associated with software versions, process IDs, network configuration, hostname(s), system architecture, and file/directory details.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1287 β€Ό

A vulnerability classified as critical was found in School Club Application System 1.0. This vulnerability affects a request to the file /scas/classes/Users.php?f=save_user. The manipulation with a POST request leads to privilege escalation. The attack can be initiated remotely and does not require authentication. The exploit has been disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1288 β€Ό

A vulnerability, which was classified as problematic, has been found in School Club Application System 1.0. This issue affects access to /scas/admin/. The manipulation of the parameter page with the input %22%3E%3Cimg%20src=x%20onerror=alert(1)%3E leads to a reflected cross site scripting. The attack may be initiated remotely and does not require any form of authentication. The exploit has been disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1290 β€Ό

Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1289 β€Ό

A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.

πŸ“– Read

via "National Vulnerability Database".
🀯1
πŸ“’ Mounting US data disasters show we're lucky to have GDPR πŸ“’

A long list of failures by US companies shows the government’s planned overhaul of the UK data protection landscape needs much closer scrutiny

πŸ“– Read

via "ITPro".
πŸ“’ Why the ECJ's metadata ruling endangers the safety of women πŸ“’

Until we live in a society in which women are safe, we might need to compromise on mass data collection

πŸ“– Read

via "ITPro".
πŸ“’ Rackspace partners with Cohesity on new data protection services for VMware workloads πŸ“’

Deal aims to eliminate legacy backup silos and provide comprehensive protection against the β€œarray of rising data threats”

πŸ“– Read

via "ITPro".
πŸ“’ Raspberry Pi OS update bolsters security against brute force attacks πŸ“’

The security change was made in line with increasing number of countries choosing to outlaw default credentials

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro News In Review: The Works cyber attack, Lenovo recruitment drive, old macOS vulnerabilities πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft uses sinkhole to thwart Russian state-backed Fancy Bear attacks πŸ“’

Also known as APT28 or Strontium, Fancy Bear is one of the most active APT groups in the world

πŸ“– Read

via "ITPro".
β€Ό CVE-2021-32161 β€Ό

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the File Manager feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0936 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository autolab/autolab prior to 2.8.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32160 β€Ό

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Add Users feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32157 β€Ό

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1045 β€Ό

Stored XSS viva .svg file upload in GitHub repository polonel/trudesk prior to v1.2.0.

πŸ“– Read

via "National Vulnerability Database".