πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-29533 β€Ό

An issue was discovered in MISP before 2.4.158. There is XSS in app/Controller/OrganisationsController.php in a situation with a "weird single checkbox page."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29529 β€Ό

An issue was discovered in MISP before 2.4.158. There is stored XSS via the LinOTP login field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29536 β€Ό

In GNOME Epiphany before 41.4 and 42.x before 42.2, an HTML document can trigger a client buffer overflow (in ephy_string_shorten in the UI process) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is not properly considered.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29528 β€Ό

An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29498 β€Ό

Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27237 β€Ό

There is a cross-site scripting (XSS) vulnerability in an NI Web Server component installed with several NI products. Depending on the product(s) in use, remediation guidance includes: install SystemLink version 2021 R3 or later, install FlexLogger 2022 Q2 or later, install LabVIEW 2021 SP1, install G Web Development 2022 R1 or later, or install Static Test Software Suite version 1.2 or later.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ NIST revamps aging enterprise patch management guidance πŸ—“οΈ

US agency highlights β€˜divide’ between security teams and their colleagues about the value of patching

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-24272 β€Ό

An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1420 β€Ό

Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.

πŸ“– Read

via "National Vulnerability Database".
⚠ Critical cryptographic Java security blunder patched – update now! ⚠

Either know the private key and use it scrupulously in your digital signature calculation.... or just send a bunch of zeros instead.

πŸ“– Read

via "Naked Security".
πŸ•΄ Adversaries Look for "Attackability" When Selecting Targets πŸ•΄

A large number of enterprise applications are affected by the vulnerability in log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that are easier to exploit and/or have the biggest payoff.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and cryptododginess [Podcast] ⚠

Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ 3 Ways We Can Improve Cybersecurity πŸ•΄

To better manage risks, companies can concentrate on resilience, sharing information to protect from cyber threats, and making the cybersecurity tent bigger by looking at workers with nontraditional skill sets.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Hack Me, I’m Famous: Bug bounty hackathon nets security researcher €10,000 overnight πŸ—“οΈ

European event saw 40 researchers team up to find bugs

πŸ“– Read

via "The Daily Swig".
πŸ›  Suricata IDPE 6.0.5 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-1022 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.5.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Alert Logic Releases MDR Incident Response Capability for Addressing a Breach πŸ•΄

Seedrs Ltd. deployed and configured Alert Logic Intelligent Response in minutes, and immediately began blocking critical threats.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0272 β€Ό

Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24868 β€Ό

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24870 β€Ό

Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to 3.0.0 beta3 a malicious script can be injected in tooltips using iTop customization mechanism. This provides a stored cross site scripting attack vector to authorized users of the system. Users are advised to upgrade. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41161 β€Ό

Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".