πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2017-20036 β€Ό

A vulnerability, which was classified as problematic, was found in PHPList 3.2.6. Affected is an unknown function of the file /lists/admin/ of the component Bounce Rule. The manipulation leads to cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20034 β€Ό

A vulnerability classified as problematic was found in PHPList 3.2.6. This vulnerability affects unknown code of the file /lists/admin/ of the component List Name. The manipulation leads to cross site scripting (Persistent). The attack can be initiated remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20032 β€Ό

A vulnerability was found in PHPList 3.2.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Subscription. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20031 β€Ό

A vulnerability was found in PHPList 3.2.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument sortby with the input password leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20033 β€Ό

A vulnerability classified as problematic has been found in PHPList 3.2.6. This affects an unknown part of the file /lists/admin/. The manipulation of the argument page with the input send\'\";><script>alert(8)</script> leads to cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20029 β€Ό

A vulnerability was found in PHPList 3.2.6 and classified as critical. This issue affects some unknown processing of the file /lists/index.php of the component Edit Subscription. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20035 β€Ό

A vulnerability, which was classified as problematic, has been found in PHPList 3.2.6. This issue affects some unknown processing of the file /lists/admin/ of the component Subscribe. The manipulation leads to cross site scripting (Persistent). The attack may be initiated remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42811 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SafeNet KeySecure allows an authenticated user to read arbitrary files from the underlying system on which the product is deployed.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Separate Fujitsu cloud storage vulnerabilities could enable attackers to destroy virtual backups πŸ—“οΈ

Sysadmins should update their installations immediately

πŸ“– Read

via "The Daily Swig".
πŸ•΄ In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities πŸ•΄

Cloud migration, DevSecOps, cyber insurance, and more have emerged as important motivators for cybersecurity investment and focus.

πŸ“– Read

via "Dark Reading".
❌ U.S. Water Utilities Prime Cyberattack Target, Experts ❌

Environmentalists and policymakers warn water treatment plants are ripe for attack.

πŸ“– Read

via "Threat Post".
πŸ•΄ How 4 Young Musicians Hacked Sheet Music to Help Fight the Cold War πŸ•΄

In 1985, a group of klezmer musicians from the US rendezvoused with underground dissidents in Tbilisi, Georgia. This is the story of how they pulled it off with homebrew cryptography.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Artificial Intelligence and Security: What You Should Know πŸ•΄

Next-generation AI products learn proactively and identify changes in the networks, users, and databases using "data drift" to adapt to specific threats as they evolve.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 6/10 πŸ”

Read up on how Apple is getting ahead of the curve on security, how you could be targeted in a Facebook phishing scam, why a different type of cyberattack could surpass ransomware, and more all in this week’s Friday Five!


πŸ“– Read

via "".
β€Ό CVE-2021-44582 β€Ό

A Privilege Escalation vulnerability exists in Sourcecodester Money Transfer Management System 1.0, which allows a remote malicious user to gain elevated privileges to the Admin role via any URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31788 β€Ό

IdeaLMS 2022 allows SQL injection via the IdeaLMS/ChatRoom/ClassAccessControl/6?isBigBlueButton=0&ClassID= pathname.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44117 β€Ό

A Cross Site Request Forgery (CSRF) vulnerability exists in TheDayLightStudio Fuel CMS 1.5.0 via a POST call to /fuel/sitevariables/delete/4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32563 β€Ό

An issue was discovered in Couchbase Sync Gateway 3.x before 3.0.2. Admin credentials are not verified when using X.509 client-certificate authentication from Sync Gateway to Couchbase Server. When Sync Gateway is configured to authenticate with Couchbase Server using X.509 client certificates, the admin credentials provided to the Admin REST API are ignored, resulting in privilege escalation for unauthenticated users. The Public REST API is not impacted by this issue. A workaround is to replace X.509 certificate based authentication with Username and Password authentication inside the bootstrap configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27502 β€Ό

RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ IBM bolsters cyber security offerings with Randori acquisition πŸ“’

It plans to use the company’s attack surface management and offensive security offerings to strengthen its cloud and AI capabilities

πŸ“– Read

via "ITPro".
πŸ“’ Double extortion ransomware pushes average payments close to $1 million πŸ“’

As the average payment approaches the landmark figure, experts reflect on times when the going rate was just $500

πŸ“– Read

via "ITPro".