πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-1464 β€Ό

Stored xss bug in GitHub repository gogs/gogs prior to 0.12.7. As the repo is public , any user can view the report and when open the attachment then xss is executed. This bug allow executed any javascript code in victim account .

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42183 β€Ό

MasaCMS 7.2.1 is affected by a path traversal vulnerability in /index.cfm/_api/asset/image/.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1516 β€Ό

A NULL pointer dereference flaw was found in the Linux kernelÒ€ℒs X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Multichannel Phishing Concerns Cybersecurity Leaders in 2022 πŸ•΄

With 80% of companies using cloud collaboration tools, cybercriminals are using multichannel phishing attacks to exploit security gaps in the hybrid work model.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cisco Announces Cloud Controls Framework Is Now Available to Public πŸ•΄

The Cisco CCF helps save resources by enabling organizations to achieve cloud security certifications more efficiently.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Critical Cisco VM-Escape Bug Threatens Host Takeover πŸ•΄

The vendor also disclosed two other security vulnerabilities that would allow remote, unauthenticated attackers to inject commands as root and snoop on sensitive user information.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies πŸ•΄

The company will continue the development of Comae’s memory analysis platform and seek to incorporate its capabilities into existing solutions

πŸ“– Read

via "Dark Reading".
πŸ›  Wireshark Analyzer 3.6.5 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ FBI: Bank Losses From BEC Attacks Top $43B πŸ•΄

Law enforcement attributes a recent 65% spike in BEC attack losses to COVID-19 restrictions and the ongoing reality of a remote workforce.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-38487 β€Ό

RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43547 β€Ό

TwinOaks Computing CoreDX DDS versions prior to 5.9.1 are susceptible to exploitation when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39020 β€Ό

IBM Guardium Data Encryption (GDE) 4.0.0.7 and lower stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 213855.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1468 β€Ό

On all versions of 17.0.x, 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x on F5 BIG-IP, an authenticated iControl REST user with at least guest role privileges can cause processing delays to iControl REST requests via undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38445 β€Ό

OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26130 β€Ό

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, and 13.1.x versions prior to 13.1.5, when an Active mode-enabled FTP profile is configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing active FTP data channel connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38429 β€Ό

OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1389 β€Ό

On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP (fixed in 17.0.0), a cross-site request forgery (CSRF) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. This vulnerability allows an attacker to run a limited set of commands: ping, traceroute, and WOM diagnostics. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38427 β€Ό

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44057 β€Ό

An improper authentication vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.20 ( 2022/02/15 ) and later Photo Station 5.7.16 ( 2022/02/11 ) and later Photo Station 5.4.13 ( 2022/02/11 ) and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26340 β€Ό

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, and F5 BIG-IQ Centralized Management all versions of 8.x and 7.x, an authenticated, high-privileged attacker with no bash access may be able to access Certificate and Key files using Secure Copy (SCP) protocol from a remote system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26517 β€Ό

On F5 BIG-IP 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, and 13.1.x versions prior to 13.1.5, when the BIG-IP CGNAT Large Scale NAT (LSN) pool is configured on a virtual server and packet filtering is enabled, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

πŸ“– Read

via "National Vulnerability Database".