πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-23139 β€Ό

ZTE's ZXMP M721 product has a permission and access control vulnerability. Since the folder permission viewed by sftp is 666, which is inconsistent with the actual permission. ItÒ€ℒs easy for?users to?ignore the modification?of?the file permission configuration, so that low-authority accounts could actually obtain higher operating permissions on key files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22986 β€Ό

Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via the searchString parameter to the wikiScrapper task.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22970 β€Ό

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27498 β€Ό

A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and versions prior to Feb 10, 2021 may result in a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22796 β€Ό

Sysaid Γ’β‚¬β€œ Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23166 β€Ό

Sysaid Γ’β‚¬β€œ Sysaid Local File Inclusion (LFI) Γ’β‚¬β€œ An unauthenticated attacker can access to the system by accessing to "/lib/tinymce/examples/index.html" path. in the "Insert/Edit Embedded Media" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22797 β€Ό

Sysaid Γ’β‚¬β€œ sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22985 β€Ό

Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via the key parameter to the getESRIExtraConfig task.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27478 β€Ό

A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and versions prior to Feb 10, 2021 may cause a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23742 β€Ό

Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27482 β€Ό

A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and versions prior to Feb 10, 2021 may allow the attacker to read arbitrary data.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Transforming SQL Queries Bypasses WAF Security πŸ•΄

A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Black Hat Asia: Firmware Supply-Chain Woes Plague Device Security πŸ•΄

The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29218 β€Ό

RubyGems is a package registry used to supply software for the Ruby language ecosystem. An ordering mistake in the code that accepts gem uploads allowed some gems (with platforms ending in numbers, like `arm64-darwin-21`) to be temporarily replaced in the CDN cache by a malicious package. The bug has been patched, and is believed to have never been exploited, based on an extensive review of logs and existing gems by rubygems. The easiest way to ensure that an application has not been exploited by this vulnerability is to verify all downloaded .gems checksums match the checksum recorded in the RubyGems.org database. RubyGems.org has been patched and is no longer vulnerable to this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27134 β€Ό

EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfer` function of the smart contract which allows remote attackers to win the cryptocurrency without paying ticket fee via the `std::string memo` parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Data for 120 army recruits found on the dark web πŸ“’

The website, run jointly with Capita, has been offline since mid-March as MoD assesses the scope of the breach

πŸ“– Read

via "ITPro".
πŸ“’ Millions of Lenovo laptops thought to be vulnerable to newly discovered UEFI malware attacks πŸ“’

ESET researchers said the core vulnerabilities were 'easy' to spot due to "unfortunate" and "honest" driver names

πŸ“– Read

via "ITPro".
πŸ“’ Encryption battle plays out in Australian Parliament πŸ“’

The opposition said that the government is β€œaddicted to secrecy”

πŸ“– Read

via "ITPro".
πŸ“’ Datadog's ASM platform unmasks attack flows at code level πŸ“’

The service employs distributed tracing to identify cyber criminals

πŸ“– Read

via "ITPro".
πŸ“’ Ransomware demands in Japan are almost 26 times higher than in the UK, report finds πŸ“’

Ransom demands tend to be lower in order to make it easier for organisations to pay them, according to Sophos researchers

πŸ“– Read

via "ITPro".
πŸ“’ The truth about cyber security training πŸ“’

Stop ticking boxes. Start delivering real change.

πŸ“– Read

via "ITPro".