šŸ›” Cybersecurity & Privacy šŸ›” - News
25.9K subscribers
89.2K links
šŸ—ž The finest daily news on cybersecurity and privacy.

šŸ”” Daily releases.

šŸ’» Is your online life secure?

šŸ“© lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-24272 ‼

An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-1420 ‼

Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.

šŸ“– Read

via "National Vulnerability Database".
⚠ Critical cryptographic Java security blunder patched – update now! ⚠

Either know the private key and use it scrupulously in your digital signature calculation.... or just send a bunch of zeros instead.

šŸ“– Read

via "Naked Security".
šŸ•“ Adversaries Look for "Attackability" When Selecting Targets šŸ•“

A large number of enterprise applications are affected by the vulnerability in log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that are easier to exploit and/or have the biggest payoff.

šŸ“– Read

via "Dark Reading".
⚠ S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and cryptododginess [Podcast] ⚠

Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!

šŸ“– Read

via "Naked Security".
šŸ•“ 3 Ways We Can Improve Cybersecurity šŸ•“

To better manage risks, companies can concentrate on resilience, sharing information to protect from cyber threats, and making the cybersecurity tent bigger by looking at workers with nontraditional skill sets.

šŸ“– Read

via "Dark Reading".
šŸ—“ļø Hack Me, I’m Famous: Bug bounty hackathon nets security researcher €10,000 overnight šŸ—“ļø

European event saw 40 researchers team up to find bugs

šŸ“– Read

via "The Daily Swig".
šŸ›  Suricata IDPE 6.0.5 šŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

šŸ“– Read

via "Packet Storm Security".
‼ CVE-2022-1022 ‼

Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.5.0.

šŸ“– Read

via "National Vulnerability Database".
šŸ•“ Alert Logic Releases MDR Incident Response Capability for Addressing a Breach šŸ•“

Seedrs Ltd. deployed and configured Alert Logic Intelligent Response in minutes, and immediately began blocking critical threats.

šŸ“– Read

via "Dark Reading".
‼ CVE-2022-0272 ‼

Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-24868 ‼

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-24870 ‼

Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to 3.0.0 beta3 a malicious script can be injected in tooltips using iTop customization mechanism. This provides a stored cross site scripting attack vector to authorized users of the system. Users are advised to upgrade. There are no known workarounds for this issue.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2021-41161 ‼

Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2021-41162 ‼

Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to beta6 the `ajax.render.php?operation=wizard_helper` page did not properly escape the user supplied parameters, allowing for a cross site scripting attack vector. Users are advised to upgrade. There are no known workarounds for this issue.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-24867 ‼

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-24869 ‼

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-22436 ‼

IBM Maximo Asset Management 7.6.1.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 224164.

šŸ“– Read

via "National Vulnerability Database".
‼ CVE-2022-22435 ‼

IBM Maximo Asset Management 7.6.1.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

šŸ“– Read

via "National Vulnerability Database".
šŸ•“ Cybereason Launches Digital Forensics Incident Response šŸ•“

Cybereason MalOp Detection Engine augmented with Nuanced DFIR Intelligence reduces the mean-time-to-detect and remediate incidents.

šŸ“– Read

via "Dark Reading".
šŸ•“ UntitledNew Zscaler Research Shows Over 400% Increase in Phishing Attacks With Retail and Wholesale Industries at Greatest Risk šŸ•“

Annual ThreatLabz Report reveals phishing-as-a-service as the key source of attacks across critical industries and consumers globally; underscores urgency to adopt a zero-trust security model.

šŸ“– Read

via "Dark Reading".