πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-32358 β€Ό

Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/classes/Master.php?f=delete_inquiry.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32354 β€Ό

Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/?page=user/manage_user&id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32238 β€Ό

When a user opens manipulated Encapsulated Post Script (.eps, ai.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31047 β€Ό

TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29241 β€Ό

Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter Notebook. Prior to version 1.17.1, if notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this URL can be used from a cross-site scripting payload or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system. This issue is patched in version 1.17.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32237 β€Ό

When a user opens manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31050 β€Ό

TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32363 β€Ό

Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/categories/view_category.php?id=.

πŸ“– Read

via "National Vulnerability Database".
⚠ Follina gets fixed – but it’s not listed in the Patch Tuesday patches! ⚠

We tried it out to make sure, so you don't have to.

πŸ“– Read

via "Naked Security".
πŸ‘2
πŸ—“οΈ Data breach at US ambulance billing service Comstar exposed patients’ healthcare information πŸ—“οΈ

Medical payments company admits network intrusion

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2021-40212 β€Ό

An exploitable out-of-bounds write vulnerability in PotPlayer 1.7.21523 build 210729 may lead to code execution, information disclosure, and denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1958 β€Ό

A vulnerability classified as critical has been found in FileCloud. Affected is the NTFS handler which leads to improper access controls. It is possible to launch the attack remotely but it demands some form of authentication. Upgrading to version 21.3.5.18513 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Security researcher receives legal threat over patched Powertek data center vulnerabilities πŸ—“οΈ

Vendor threatened legal action following disclosure and fixes being issued, bug hunter claims

πŸ“– Read

via "The Daily Swig".
❌ Travel-related Cybercrime Takes Off as Industry Rebounds ❌

Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.

πŸ“– Read

via "Threat Post".
❌ In Cybersecurity, What You Can’t See Can Hurt You ❌

The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing?

πŸ“– Read

via "Threat Post".
❌ DragonForce Gang Unleash Hacks Against Govt. of India ❌

In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-20132 β€Ό

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20137 β€Ό

In onCreateContextMenu of NetworkProviderSettings.java, there is a possible way for non-owner users to change WiFi settings due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-206986392

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41413 β€Ό

ok-file-formats master 2021-9-12 is affected by a buffer overflow in ok_jpg_convert_data_unit_grayscale and ok_jpg_convert_YCbCr_to_RGB.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39691 β€Ό

In WindowManager, there is a possible tapjacking attack due to an incorrect window flag when processing user input. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-157929241

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2086 β€Ό

A vulnerability, which was classified as critical, has been found in SourceCodester Bank Management System 1.0. Affected by this issue is login.php. The manipulation of the argument password with the input 1'and 1=2 union select 1,sleep(10),3,4,5 --+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

πŸ“– Read

via "National Vulnerability Database".