πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-45918 β€Ό

NHIÒ€ℒs health insurance web service component has insufficient validation for input string length, which can result in heap-based buffer overflow attack. A remote attacker can exploit this vulnerability to flood the memory space reserved for the program, in order to terminate service without authentication, which requires a system restart to recover service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20061 β€Ό

A vulnerability has been found in Elefant CMS 1.3.12-RC and classified as problematic. This vulnerability affects unknown code of the file /admin/extended. The manipulation of the argument name with the input %3Cimg%20src=no%20onerror=alert(1)%3E leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26669 β€Ό

ASUS Control Center is vulnerable to SQL injection. An authenticated remote attacker with general user privilege can inject SQL command to specific API parameters to acquire database schema or access data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20059 β€Ό

A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21742 β€Ό

Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20063 β€Ό

A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Attackers can use β€˜Scroll to Text Fragment’ web browser feature to steal data – research πŸ—“οΈ

In some scenarios, CSS style specifications can be manipulated to cause browsers to send data to an attacker-controlled server

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code πŸ•΄

Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Internet scans find 1.6 million secrets leaked by websites πŸ—“οΈ

Probe surfaces β€˜alarmingly huge’ number of unredacted tokens and keys

πŸ“– Read

via "The Daily Swig".
πŸ•΄ The Cybersecurity Diversity Gap: Advice for Organizations Looking to Thrive πŸ•΄

Companies need to fill some of the 3.5 million empty cybersecurity seats with workers who bring different experiences, perspectives, and cultures to the table. Cut a few doors and windows into the security hiring box.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-25772 β€Ό

A cross-site scripting (XSS) vulnerability in the web tracking component of Mautic before 4.3.0 allows remote attackers to inject executable javascript

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Lessons From Protecting Live Events πŸ•΄

Security defenders working for large venues and international events need to be able to move at machine speed because they have a limited time to detect and recover from attacks. The show must go on, always.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Critical Citrix ADM vulnerability creates means to reset admin passwords πŸ—“οΈ

Improper access control flaw poses DoS-to-RCE hijack risk

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-31795 β€Ό

An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41683 β€Ό

There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41682 β€Ό

There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2134 β€Ό

Denial of Service in GitHub repository inventree/inventree prior to 0.8.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1720 β€Ό

Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31794 β€Ό

An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.7.8 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code πŸ•΄

Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.

πŸ“– Read

via "Dark Reading".