πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Friday Five 5/6 πŸ”

Read up on how passwords may soon be a thing of the past, how your mental health data may be at risk, how business email compromise cost organizations billions in the past five years, and much moreβ€”all in this week’s Friday Five!


πŸ“– Read

via "".
🀯1
β€Ό CVE-2022-30333 β€Ό

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23066 β€Ό

In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not. The vulnerability affects both integrity and may cause serious availability problems.

πŸ“– Read

via "National Vulnerability Database".
❌ Podcast: The State of the Secret Sprawl ❌

In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, as well as ways that developers can keep their code safe.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ BIG-IP: Proof-of-concept released for RCE vulnerability in F5 network management tool πŸ—“οΈ

Users should patch immediately

πŸ“– Read

via "The Daily Swig".
🀯1
πŸ—“οΈ Quantum leap: Biden administration commits to ensuring US leadership in emerging tech πŸ—“οΈ

Government sets out plan for post-quantum encryption

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Security Stuff Happens: Where Do You Go From Here? πŸ•΄

Despite what it may feel like when you're in the trenches after a security incident, the world doesn't stop moving. (Part 3 of a series.)

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-30286 β€Ό

pyscriptjs (aka PyScript Demonstrator) in PyScript through 2022-05-04 allows a remote user to read Python source code.

πŸ“– Read

via "National Vulnerability Database".
⚠ RubyGems supply chain rip-and-replace bug fixed – check your logs! ⚠

Imagine if you could assume the identity of, say, Franklin Delano Roosevelt simply by showing up and calling yourself "Frank".

πŸ“– Read

via "Naked Security".
⚠ You didn’t leave enough space between ROSE and AND, and AND and CROWN ⚠

What weird Google Docs bug connects the words THEREFORE, AND, SECONDLY, WHY, BUT and BESIDES?

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-23332 β€Ό

Command injection vulnerability in Manual Ping Form (Web UI) in Shenzhen Ejoin Information Technology Co., Ltd. ACOM508/ACOM516/ACOM532 609-915-041-100-020 allows a remote attacker to inject arbitrary code via the field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27224 β€Ό

An issue was discovered in Galleon NTS-6002-GPS 4.14.103-Galleon-NTS-6002.V12 4. An authenticated attacker can perform command injection as root via shell metacharacters within the Network Tools section of the web-management interface. All three networking tools are affected (Ping, Traceroute, and DNS Lookup) and their respective input fields (ping_address, trace_address, nslookup_address).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1631 β€Ό

Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the VictimÒ€ℒs Email. This allows an attacker to gain pre-authentication to the victimÒ€ℒs account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attackerÒ€ℒs persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employeeÒ€ℒs email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employeeÒ€ℒs account.

πŸ“– Read

via "National Vulnerability Database".
❌ FBI: Rise in Business Email-based Attacks is a $43B Headache ❌

A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem.

πŸ“– Read

via "Threat Post".
πŸ•΄ Deloitte Launches Expanded Cloud Security Management Platform πŸ•΄

The CSM by Deloitte platform includes cloud security policy orchestration, cyber predictive analytics, attack surface management, and cyber cloud managed services.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0814 β€Ό

The Ubigeo de Perú para Woocommerce WordPress plugin before 3.6.4 does not properly sanitise and escape some parameters before using them in SQL statements via various AJAX actions, some of which are available to unauthenticated users, leading to SQL Injections

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1104 β€Ό

The Popup Maker WordPress plugin before 1.16.5 does not sanitise and escape some of its Popup settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0836 β€Ό

The SEMA API WordPress plugin through 3.64 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1013 β€Ό

The Personal Dictionary WordPress plugin before 1.3.4 fails to properly sanitize user supplied POST data before it is being interpolated in an SQL statement and then executed, leading to a blind SQL injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0948 β€Ό

The Order Listener for WooCommerce WordPress plugin before 3.2.2 does not sanitise and escape the id parameter before using it in a SQL statement via a REST route available to unauthenticated users, leading to an SQL injection

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1338 β€Ό

The Easily Generate Rest API Url WordPress plugin through 1.0.0 does not escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".