πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-28186 β€Ό

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product receives input or data, but does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly, which may lead to denial of service or data tampering.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28187 β€Ό

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where the memory management software does not release a resource after its effective lifetime has ended, which may lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28616 β€Ό

A remote server-side request forgery (ssrf) vulnerability was discovered in HPE OneView version(s): Prior to 7.0. HPE has provided a software update to resolve this vulnerability in HPE OneView.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29174 β€Ό

countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the password and take over the account. The problem has been patched in Countly Server version 22.03.7 for servers using the new user interface and in 21.11.4 for servers using the old user interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24388 β€Ό

Vulnerability in rconfig Ò€œdateҀ� enables an attacker with user level access to the CLI to inject root level commands into Fidelis Network and Deception CommandPost, Collector, Sensor, and Sandbox components as well as neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1118 β€Ό

Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ When Your Smart ID Card Reader Comes With Malware β™ŸοΈ

Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder's appropriate security level. But many government employees aren't issued an approved card reader device that lets them use these cards at home or remotely, and so turn to low-cost readers they find online. What could go wrong? Here's one example.

πŸ“– Read

via "Krebs on Security".
πŸ—“οΈ Facebook account takeover: Researcher scoops $40k bug bounty for chained exploit πŸ—“οΈ

Youssef Sammouda returns with more Facebook hacks – this time leveraging stolen Google authentication tokens to gain access to social media accounts

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-30976 β€Ό

GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30975 β€Ό

In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41946 β€Ό

In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scripting (XSS) vulnerability in Parental Control --> Access Time Restriction --> Username field, a user cannot delete the rule due to the XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30974 β€Ό

compile in regexp.c in Artifex MuJS through 1.2.0 results in stack consumption because of unlimited recursion, a different issue than CVE-2019-11413.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-25061 β€Ό

The random_password_generator (aka RandomPasswordGenerator) gem through 1.0.0 for Ruby uses Kernel#rand to generate passwords, which, due to its cyclic nature, can facilitate password prediction.

πŸ“– Read

via "National Vulnerability Database".
⚠ Pwn2Own hacking schedule released – Windows and Linux are top targets ⚠

What's better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?

πŸ“– Read

via "Naked Security".
πŸ‘1
❌ April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell ❌

Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.

πŸ“– Read

via "Threat Post".
πŸ‘1
πŸ•΄ How Threat Actors Are a Click Away From Becoming Quasi-APTs πŸ•΄

As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29643 β€Ό

TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the macAddress parameter in the function setMacQos. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28956 β€Ό

An issue in the getcfg.php component of D-Link DIR816L_FW206b01 allows attackers to access the device via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29645 β€Ό

TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a hard coded password for root stored in the component /etc/shadow.sample.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28955 β€Ό

An access control issue in D-Link DIR816L_FW206b01 allows unauthenticated attackers to access folders folder_view.php and category_view.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29638 β€Ό

TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setIpQosRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".