πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-27888 β€Ό

Foundry Issues service versions 2.244.0 to 2.249.0 was found to be logging in a manner that captured sensitive information (session tokens). This issue was fixed in Fixed in 2.249.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27331 β€Ό

An access control issue in Zammad v5.0.3 broadcasts administrative configuration changes to all users who have an active application instance, including settings that should only be visible to authenticated users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27332 β€Ό

An access control issue in Zammad v5.0.3 allows attackers to write entries to the CTI caller log without authentication. This vulnerability can allow attackers to execute phishing attacks or cause a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28085 β€Ό

A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29700 β€Ό

A lack of password length restriction in Zammad v5.1.0 allows for the creation of extremely long passwords which can cause a Denial of Service (DoS) during password verification.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41041 β€Ό

In Eclipse Openj9 before version 0.32.0, Java 8 & 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29701 β€Ό

A lack of rate limiting in the 'forgot password' feature of Zammad v5.1.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1503 β€Ό

A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29810 β€Ό

The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile.

πŸ“– Read

via "National Vulnerability Database".
⚠ Phishing goes KISS: Don’t let plain and simple messages catch you out! ⚠

Sometimes we receive phishing tricks that we grudgingly have to admit are better than average, just because they're uncomplicated.

πŸ“– Read

via "Naked Security".
❌ Millions of Java Apps Remain Vulnerable to Log4Shell ❌

Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-1504 β€Ό

XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46441 β€Ό

In the "webupg" binary of D-Link DIR-825 G1, because of the lack of parameter verification, attackers can use "cmd" parameters to execute arbitrary system commands after obtaining authorization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46442 β€Ό

In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass authentication through parameters "autoupgrade.asp", and perform functions such as downloading configuration files and updating firmware without authorization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46421 β€Ό

Franklin Fueling Systems FFS T5 Series 1.8.7.7299 is affected by an unauthenticated directory traversal vulnerability, which allows an attacker to obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46420 β€Ό

Franklin Fueling Systems FFS TS-550 evo 2.23.4.8936 is affected by an unauthenticated directory traversal vulnerability, which allows an attacker to obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46423 β€Ό

Telesquare TLR-2005KSH 1.0.0 is affected by an unauthenticated file download vulnerability that allows a remote attacker to download a full configuration file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46422 β€Ό

Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46424 β€Ό

Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Industry Leaders Should Approach Open Source Security πŸ•΄

Here's how to reduce security risk and gain the benefits of open source software.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Fighting Fake EDRs With β€˜Credit Ratings’ for Police β™ŸοΈ

When KrebsOnSecurity last month explored how cybercriminals were using hacked email accounts at police departments worldwide to obtain warrantless Emergency Data Requests (EDRs) from social media and technology providers, many security experts called it a fundamentally unfixable problem. But don't tell that to Matt Donahue, a former FBI agent who recently quit the agency to launch a startup that aims to help tech companies do a better job screening out phony law enforcement data requests -- in part by assigning trustworthiness or "credit ratings" to law enforcement authorities worldwide.

πŸ“– Read

via "Krebs on Security".