πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-1294 β€Ό

The IMDB info box WordPress plugin through 2.0 does not sanitize and escape some of its settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0376 β€Ό

The User Meta WordPress plugin before 2.4.3 does not sanitise and escape the Form Name, as well as Shared Field Labels before outputting them in the admin dashboard when editing a form, which could allow high privilege users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1387 β€Ό

The No Future Posts WordPress plugin through 1.4 does not escape its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1564 β€Ό

The Form Maker by 10Web WordPress plugin before 1.14.12 does not sanitize and escape the Custom Text settings, which could allow high privilege user such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
πŸ›  GRR 3.4.6.0 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Read

via "Packet Storm Security".
❌ Zero-Day β€˜Follina’ Bug Lays Older Microsoft Office Versions Open to Attack ❌

Malware loads itself from remote servers and bypasses Microsoft's Defender AV scanner, according to reports.

πŸ“– Read

via "Threat Post".
πŸ•΄ 6 Steps to Ensure Cyber Resilience πŸ•΄

To minimize the impact of cyber incidents, organizations must be pragmatic and develop a strategy of resilience for dealing with break-ins, advanced malware, and data theft.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Dozens of high-traffic websites vulnerable to β€˜account pre-hijacking’, study finds πŸ—“οΈ

Validation check loopholes exposed

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep84: Government demand, Mozilla velocity, and Clearview fine [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Data breach at Australian pension provider Spirit Super impacts 50k victims following phishing attack πŸ—“οΈ

β€˜Super fund’ confirms user information has been exposed

πŸ“– Read

via "The Daily Swig".
⚠ Beware the Smish! Home delivery scams with a professional feel… ⚠

Home delivery scams are getting leaner, and meaner, and more likely to "look about right". Here's an example to show you what we mean...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-1931 β€Ό

Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1934 β€Ό

Use After Free in GitHub repository mruby/mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3555 β€Ό

A Buffer Overflow vulnerability in the RSTP server component of Eufy Indoor 2K Indoor Camera allows a local attacker to achieve remote code execution. This issue affects: Eufy Indoor 2K Indoor Camera 2.0.9.3 version and prior versions.

πŸ“– Read

via "National Vulnerability Database".
❌ EnemyBot Malware Targets Web Servers, CMS Tools and Android OS ❌

Malware borrows generously from code used by other botnets such as Mirai, Qbot and Zbot.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Connecticut becomes fifth US state to enact comprehensive consumer privacy law πŸ—“οΈ

The newly signed CTPA is more consumer-friendly than similar legislation in other US states

πŸ“– Read

via "The Daily Swig".
πŸ•΄ How to Keep Your Enterprise Safe From Digital Supply Chain Attacks πŸ•΄

Digital supply chains are more vulnerable than ever; here's what you need to do to secure them.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1942 β€Ό

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30973 β€Ό

We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23082 β€Ό

In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function ΓƒΒ’Γ’β€šΒ¬Γ‹Ε“isFileOutsideDirΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’ fails to sanitize the user input which may lead to path traversal.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for June 2022 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".