πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-24859 β€Ό

PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In versions prior to 1.27.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 if the code attempts to get the content stream. The reason is that the last while-loop in `ContentStream._readInlineImage` only terminates when it finds the `EI` token, but never actually checks if the stream has already ended. This issue has been resolved in version `1.27.5`. Users unable to upgrade should validate and PDFs prior to iterating over their content stream.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1054 β€Ό

The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1037 β€Ό

The EXMAGE WordPress plugin before 1.0.7 does to ensure that images added via URLs are external images, which could lead to a blind SSRF issue by using local URLs

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1063 β€Ό

The Thank Me Later WordPress plugin through 3.3.4 does not sanitise and escape the Message Subject field before outputting it in the Messages list, which could allow high privileges users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Conti’s Ransomware Toll on the Healthcare Industry β™ŸοΈ

Conti -- one of the most ruthless and successful Russian ransomware groups -- publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other healthcare facilities since first surfacing in 2018 under the name "Ryuk."

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Security-as-Code Gains More Support, But Still Nascent πŸ•΄

Google and other firms are adding security configuration to software so cloud applications and services have well-defined security settings β€” a key component of DevSecOps.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29457 β€Ό

Zoho ManageEngine ADSelfService Plus before 6121, ADAuditPlus 7060, Exchange Reporter Plus 5701, and ADManagerPlus 7131 allow NTLM Hash disclosure during certain storage-path configuration steps.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29458 β€Ό

ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Absolute Software Introduces Ransomware Response Offering πŸ•΄

.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Swimlane Extends Cloud-Based Security Automation into APJ Amid Momentous Growth in Region πŸ•΄

Swimlane’s Asia-Pacific presence grows 173%, highlighting rising demand for low-code security automation.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 76% of Organizations Worldwide Expect to Suffer a Cyberattack This Year πŸ•΄

Study shows that more than 35% have suffered seven or more successful attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29464 β€Ό

Certain WSO2 products allow unrestricted file upload with resultant remote code execution. This affects WSO2 API Manager 2.2.0 and above through 4.0.0; WSO2 Identity Server 5.2.0 and above through 5.11.0; WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, and 5.6.0; WSO2 Identity Server as Key Manager 5.3.0 and above through 5.10.0; and WSO2 Enterprise Integrator 6.2.0 and above through 6.6.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24841 β€Ό

fleetdm/fleet is an open source device management, built on osquery. All versions of fleet making use of the teams feature are affected by this authorization bypass issue. Fleet instances without teams, or with teams but without restricted team accounts are not affected. In affected versions a team admin can erroneously add themselves as admin, maintainer or observer on other teams. Users are advised to upgrade to version 4.13. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-28108 β€Ό

Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1065 β€Ό

A vulnerability within the authentication process of Abacus ERP allows a remote attacker to bypass the second authentication factor. This issue affects: Abacus ERP v2022 versions prior to R1 of 2022-01-15; v2021 versions prior to R4 of 2022-01-15; v2020 versions prior to R6 of 2022-01-15; v2019 versions later than R5 (service pack); v2018 versions later than R5 (service pack). This issue does not affect: Abacus ERP v2019 versions prior to R5 of 2020-03-15; v2018 versions prior to R7 of 2020-04-15; v2017 version and prior versions and prior versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Verica Launches Prowler Pro to Make AWS Security Simpler for Customers πŸ•΄

The enterprise grade solution will provide enhanced cloud security and provide new open-source tools.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Utah Consumer Privacy Act: New legislation adds another wrinkle to the US legal landscape πŸ—“οΈ

Soon to be enacted law provides further governance for citizens’ data

πŸ“– Read

via "The Daily Swig".
πŸ•΄ How to Interpret the EU's Guidance on DNS Abuse Worldwide πŸ•΄

From higher standards in top-level domains to increased adoption of security controls, stepped-up measures can help fight DNS abuse and protect Web domains.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-27927 β€Ό

A SQL injection vulnerability exists in Microfinance Management System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL database through the vulnerable course_code and/or customer_number parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0645 β€Ό

Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26595 β€Ό

Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user's site membership assignment UI.

πŸ“– Read

via "National Vulnerability Database".