πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-2061 β€Ό

Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1918 β€Ό

The ToolBar to Share plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0. This is due to missing nonce validation on the plugin_toolbar_comparte page. This makes it possible for unauthenticated attackers to update the plugins settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1779 β€Ό

The Auto Delete Posts WordPress plugin through 1.3.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and delete specific posts, categories and attachments at once.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1780 β€Ό

The LaTeX for WordPress plugin through 3.4.10 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack which could also lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31041 β€Ό

Open Forms is an application for creating and publishing smart forms. Open Forms supports file uploads as one of the form field types. These fields can be configured to allow only certain file extensions to be uploaded by end users (e.g. only PDF / Excel / ...). The input validation of uploaded files is insufficient in versions prior to 1.0.9 and 1.1.1. Users could alter or strip file extensions to bypass this validation. This results in files being uploaded to the server that are of a different file type than indicated by the file name extension. These files may be downloaded (manually or automatically) by staff and/or other applications for further processing. Malicious files can therefore find their way into internal/trusted networks. Versions 1.0.9 and 1.1.1 contain patches for this issue. As a workaround, an API gateway or intrusion detection solution in front of open-forms may be able to scan for and block malicious content before it reaches the Open Forms application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1781 β€Ό

The postTabs WordPress plugin through 2.10.6 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, which also lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2067 β€Ό

SQL Injection in GitHub repository francoisjacquet/rosariosis prior to 9.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-31400 β€Ό

A cross-site scripting (XSS) vulnerability in /staff/setup/email-addresses of Helpdeskz v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email name field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2066 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts prior to 2022.06.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Cybercriminals use reverse tunneling and URL shorteners to launch β€˜virtually undetectable’ phishing campaigns πŸ—“οΈ

New hacking technique allows threat actors to evade some of the most effective phishing countermeasures

πŸ“– Read

via "The Daily Swig".
πŸ‘1
πŸ—“οΈ Kaiser Permanente data breach exposed healthcare records of 70,000 patients πŸ—“οΈ

Health plan provider plays down ID theft fears after breach at Washington state division

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-1820 β€Ό

The Keep Backup Daily plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the Γ’β‚¬ΛœtÒ€ℒ parameter in versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30310 β€Ό

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesnΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1658 β€Ό

Vulnerable versions of the Jupiter Theme (<= 6.10.1) allow arbitrary plugin deletion by any authenticated user, including users with the subscriber role, via the abb_remove_plugin AJAX action registered in the framework/admin/control-panel/logic/plugin-management.php file. Using this functionality, any logged-in user can delete any installed plugin on the site.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31759 β€Ό

AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30309 β€Ό

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-off" POST request doesnΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31751 β€Ό

The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31756 β€Ό

The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31758 β€Ό

The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31762 β€Ό

The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29244 β€Ό

npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.

πŸ“– Read

via "National Vulnerability Database".