πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2017-20059 β€Ό

A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21742 β€Ό

Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20063 β€Ό

A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Attackers can use β€˜Scroll to Text Fragment’ web browser feature to steal data – research πŸ—“οΈ

In some scenarios, CSS style specifications can be manipulated to cause browsers to send data to an attacker-controlled server

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code πŸ•΄

Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Internet scans find 1.6 million secrets leaked by websites πŸ—“οΈ

Probe surfaces β€˜alarmingly huge’ number of unredacted tokens and keys

πŸ“– Read

via "The Daily Swig".
πŸ•΄ The Cybersecurity Diversity Gap: Advice for Organizations Looking to Thrive πŸ•΄

Companies need to fill some of the 3.5 million empty cybersecurity seats with workers who bring different experiences, perspectives, and cultures to the table. Cut a few doors and windows into the security hiring box.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-25772 β€Ό

A cross-site scripting (XSS) vulnerability in the web tracking component of Mautic before 4.3.0 allows remote attackers to inject executable javascript

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Lessons From Protecting Live Events πŸ•΄

Security defenders working for large venues and international events need to be able to move at machine speed because they have a limited time to detect and recover from attacks. The show must go on, always.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Critical Citrix ADM vulnerability creates means to reset admin passwords πŸ—“οΈ

Improper access control flaw poses DoS-to-RCE hijack risk

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-31795 β€Ό

An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41683 β€Ό

There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41682 β€Ό

There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2134 β€Ό

Denial of Service in GitHub repository inventree/inventree prior to 0.8.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1720 β€Ό

Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31794 β€Ό

An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.7.8 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code πŸ•΄

Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DDoS Attacks Delay Putin Speech at Russian Economic Forum πŸ•΄

A Kremlin spokesman said that the St. Petersburg International Economic Forum accreditation and admissions systems were shut down by a DDoS attack.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Name That Toon: Cuter Than a June Bug πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Why Paper Receipts are Money at the Drive-Thru β™ŸοΈ

Check out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the store owner's message what happened.

πŸ“– Read

via "Krebs on Security".