πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-24898 β€Ό

org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28060 β€Ό

SQL Injection vulnerability in Victor CMS v1.0, via the user_name parameter to /includes/login.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29556 β€Ό

The iot-manager microservice 1.0.0 in Northern.tech Mender Enterprise before 3.2.2 allows SSRF because the Azure IoT Hub integration provides several SSRF primitives that can execute cross-tenant actions via internal API endpoints.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29904 β€Ό

The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain '-' and '_' constraints.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29907 β€Ό

The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29905 β€Ό

The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29906 β€Ό

The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29903 β€Ό

The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension's configuration. The attacker must trigger a POST request to Special:PrivateDomains.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1531 β€Ό

SQL injection vulnerability in ARAX-UI Synonym Lookup functionality in GitHub repository rtxteam/rtx prior to checkpoint_2022-04-20 . This vulnerability is critical as it can lead to remote code execution and thus complete server takeover.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1526 β€Ό

A vulnerability, which was classified as problematic, was found in Emlog Pro up to 1.2.2. This POST parameter handling of articles. The manipulation with the input <script>alert(1);</script> leads to cross site scripting. It is possible to initiate the attack remotely but it requires a signup and login by the attacker. The exploit has been disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1530 β€Ό

Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious JS on Application :)

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ GitHub offers post-mortem on recent security breach πŸ—“οΈ

Tokens stollen and abused but problem has been contained

πŸ“– Read

via "The Daily Swig".
❌ Cyberespionage APT Now Identified as Three Separate Actors ❌

The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-1533 β€Ό

Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1534 β€Ό

Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Data breach at US healthcare provider ARcare impacts 345,000 individuals πŸ—“οΈ

Sensitive medical and other personal data was potentially exposed

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Ambient.ai Expands Computer Vision Capabilities for Better Building Security πŸ•΄

The AI startup releases new threat signatures to expand the computer vision platform’s ability to identify potential physical security incidents from camera feeds.

πŸ“– Read

via "Dark Reading".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.7.7 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
❌ Security Turbulence in the Cloud: Survey Says… ❌

Exclusive Threatpost research examines organizations’ top cloud security concerns, attitudes towards zero-trust and DevSecOps.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-1536 β€Ό

A vulnerability has been found in automad up to 1.10.9 and classified as problematic. This vulnerability affects the Dashboard. The manipulation of the argument title with the input Home</title><script>alert("home")</script><title> leads to a cross site scripting. The attack can be initiated remotely but requires an authentication. The exploit details have disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44596 β€Ό

Wondershare LTD Dr. Fone as of 2021-12-06 version is affected by Remote code execution. Due to software design flaws an unauthenticated user can communicate over UDP with the "InstallAssistService.exe" service(the service is running under SYSTEM privileges) and manipulate it to execute malicious executable without any validation from a remote location and gain SYSTEM privileges

πŸ“– Read

via "National Vulnerability Database".