๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2022-25615 โ€ผ

Cross-Site Request Forgery (CSRF) in StylemixThemes eRoom รขโ‚ฌโ€œ Zoom Meetings & Webinar (WordPress plugin) <= 1.3.8 allows cache deletion.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26094 โ€ผ

Null pointer dereference vulnerability in parser_auxC function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22055 โ€ผ

The SchedulerServer in Vmware photon allows remote attackers to inject logs through \r in the package parameter. Attackers can also insert malicious data and fake entries.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26098 โ€ผ

Heap-based buffer overflow vulnerability in sheifd_create function of libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attackers.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-24833 โ€ผ

PrivateBin is minimalist, open source online pastebin clone where the server has zero knowledge of pasted data. In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present in all versions from v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy. Users are advised to either upgrade to version 1.4.0 or to ensure the content security policy of their instance is set correctly.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-20068 โ€ผ

In mobile_log_d, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308907; Issue ID: ALPS06308907.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26097 โ€ผ

Null pointer dereference vulnerability in parser_unknown_property function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26092 โ€ผ

Improper boundary check in Quram Agif library prior to SMR Apr-2022 Release 1 allows arbitrary code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-25794 โ€ผ

An Out-Of-Bounds Read Vulnerability in Autodesk FBX Review version 1.5.2 and prior may lead to code execution through maliciously crafted ActionScript Byte Code รขโ‚ฌล“ABCรขโ‚ฌ๏ฟฝ files or information disclosure. ABC files are created by the Flash compiler and contain executable code. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-24827 โ€ผ

Elide is a Java library that lets you stand up a GraphQL/JSON-API web service with minimal effort. When leveraging the following together: Elide Aggregation Data Store for Analytic Queries, Parameterized Columns (A column that requires a client provided parameter), and a parameterized column of type TEXT. There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters. A fix is provided in Elide 6.1.4. The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-25831 โ€ผ

Improper access control vulnerability in S Secure prior to SMR Apr-2022 Release 1 allows physical attackers to access secured data in certain conditions.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-36893 โ€ผ

Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Responsive Tabs (WordPress plugin) <= 4.0.5

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-20062 โ€ผ

In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05836418; Issue ID: ALPS05836418.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-27830 โ€ผ

Improper validation vulnerability in SemBlurInfo prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-27567 โ€ผ

Null pointer dereference vulnerability in parser_hvcC function of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attackers.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Former DHS Acting IT Chief Convicted in Software, Database Theft Scheme ๐Ÿ•ด

Former DHS employees targeted confidential, proprietary software and personally identifying information (PII) for hundreds of thousands of federal employees.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2022-27528 โ€ผ

A maliciously crafted DWFX and SKP files in Autodesk Navisworks 2022 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-24837 โ€ผ

HedgeDoc is an open-source, web-based, self-hosted, collaborative markdown editor. Images uploaded with HedgeDoc version 1.9.1 and later have an enumerable filename after the upload, resulting in potential information leakage of uploaded documents. This is especially relevant for private notes and affects all upload backends, except Lutim and imgur. This issue is patched in version 1.9.3 by replacing the filename generation with UUIDv4. If you cannot upgrade to HedgeDoc 1.9.3, it is possible to block POST requests to `/uploadimage`, which will disable future uploads.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-27577 โ€ผ

The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-27840 โ€ผ

Improper access control vulnerability in SamsungRecovery prior to version 8.1.43.0 allows local attckers to delete arbitrary files as SamsungRecovery permission.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-24829 โ€ผ

Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.

๐Ÿ“– Read

via "National Vulnerability Database".