πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-24479 β€Ό

Connected User Experiences and Telemetry Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44497 β€Ό

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, can cause the bounds of a for loop to be miscalculated, which leads to a use after free condition a pointer is pushed into previously free memory by the loop.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24481 β€Ό

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24521.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21983 β€Ό

Win32 Stream Enumeration Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24534.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44482 β€Ό

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26811 β€Ό

Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five 4/15 πŸ”

In this week’s Friday Five, catch up on the latest attacks from Russian and North Korean hackers, a shocking report on businesses’ willingness to prioritize security, why consumers are caring less about their own security, and more!

πŸ“– Read

via "".
β€Ό CVE-2022-27427 β€Ό

A zero-code remote code injection vulnerability via configuration.php in Chamilo LMS v1.11.13 allows attackers to upload arbitrary code in the form of a new plugin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29072 β€Ό

7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27423 β€Ό

Chamilo LMS v1.11.13 was discovered to contain a SQL injection vulnerability via the blog_id parameter at /blog/blog.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27426 β€Ό

A Server-Side Request Forgery (SSRF) in Chamilo LMS v1.11.13 allows attackers to enumerate the internal network and execute arbitrary system commands via a crafted Phar file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27422 β€Ό

A reflected cross-site scripting (XSS) vulnerability in Chamilo LMS v1.11.13 allows attackers to execute arbitrary web scripts or HTML via user interaction with a crafted URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24279 β€Ό

The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27425 β€Ό

Chamilo LMS v1.11.13 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /blog/blog.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27421 β€Ό

Chamilo LMS v1.11.13 lacks validation on the user modification form, allowing attackers to escalate privileges to Platform Admin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29281 β€Ό

Notable before 1.9.0-beta.8 doesn't effectively prevent the opening of executable files when clicking on a link. There is improper validation of the file URI scheme. A hyperlink to an SMB share could lead to execution of an arbitrary program (or theft of NTLM credentials via an SMB relay attack, because the application resolves UNC paths).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Emergency Update Fixes Chrome Zero-Day πŸ•΄

Google patches a critical flaw in its Chrome browser, bringing its count of zero-day vulnerabilities fixed in 2022 to four.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1365 β€Ό

Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository lquixada/cross-fetch prior to 3.1.5.

πŸ“– Read

via "National Vulnerability Database".
⚠ Yet another Chrome zero-day emergency update – patch now! ⚠

The third emergency Chrome 0-day in three months - the first one was exploited by North Korea, so you might as well get this one ASAP.

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2022-29020 β€Ό

ForestBlog through 2022-02-16 allows admin/profile/save userAvatar XSS during addition of a user avatar.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29287 β€Ό

Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).

πŸ“– Read

via "National Vulnerability Database".