πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-30033 β€Ό

Tenda TX9 Pro V22.03.02.10 is vulnerable to Buffer Overflow via the functtion setIPv6Status() in httpd module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1771 β€Ό

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30993 β€Ό

Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1670 β€Ό

When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1183 β€Ό

On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Rogue cloud users could sabotage fellow off-prem tenants via critical Flux flaw πŸ—“οΈ

Mischief-makers could β€˜disrupt the availability, integrity and confidentiality’ of other tenants

πŸ“– Read

via "The Daily Swig".
❌ Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover ❌

Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.

πŸ“– Read

via "Threat Post".
πŸ•΄ Phishing Attacks for Initial Access Surged 54% in Q1 πŸ•΄

For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.

πŸ“– Read

via "Dark Reading".
⚠ Pwn2Own hacking schedule released – Windows and Linux are top targets ⚠

What's better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?

πŸ“– Read

via "Naked Security".
⚠ S3 Ep83: Cracking passwords, patching Firefox, and Apple vulns [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Scary Tactics Used in Mobile App Attacks πŸ•΄

Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Encrypted email service CTemplar announces closure πŸ—“οΈ

Privacy-focused service to shut down by the end of the month

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-1785 β€Ό

Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Active attacks against VMware flaws prompts emergency update directive πŸ—“οΈ

CISA orders US federal agencies to implement patches ASAP

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-41938 β€Ό

An issue was discovered in ShopXO CMS 2.2.0. After entering the management page, there is an arbitrary file upload vulnerability in three locations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22976 β€Ό

Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37413 β€Ό

GRANDCOM DynWEB before 4.2 contains a SQL Injection vulnerability in the admin login interface. A remote unauthenticated attacker can exploit this vulnerability to obtain administrative access to the webpage, access the user database, modify web content and upload custom files. The backend login script does not verify and sanitize user-provided strings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26631 β€Ό

Improper input validation vulnerability in Mangboard commerce package could lead to occur for abnormal request. A remote attacker can exploit this vulnerability to manipulate the total order amount into a negative number and then pay for the order.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22978 β€Ό

In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26630 β€Ό

Improper input validation vulnerability in HANDY GroupwareÒ€ℒs ActiveX moudle allows attackers to download or execute arbitrary files. This vulnerability can be exploited by using the file download or execution path as the parameter value of the vulnerable function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30018 β€Ό

Mobotix Control Center (MxCC) through 2.5.4.5 has Insufficiently Protected Credentials, Storing Passwords in a Recoverable Format via the MxCC.ini config file. The credential storage method in this software enables an attacker/user of the machine to gain admin access to the software and gain access to recordings/recording locations.

πŸ“– Read

via "National Vulnerability Database".
❀2