πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-31302 β€Ό

maccms8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32414 β€Ό

Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31303 β€Ό

maccms10 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31306 β€Ό

Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31374 β€Ό

An arbitrary file upload vulnerability /images/background/1.php in of SolarView Compact 6.0 allows attackers to execute arbitrary code via a crafted php file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31307 β€Ό

Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33139 β€Ό

A vulnerability has been identified in SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Reducing Risk With Zero Trust πŸ•΄

Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Jacuzzi customer details could be exposed by SmartTub web bugs, claims researcher πŸ—“οΈ

Iconic hot tub manufacturer addresses flaws that also apparently exposed numerous backend services

πŸ“– Read

via "The Daily Swig".
πŸ›  OpenSSL Toolkit 1.1.1p πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Wireshark Analyzer 3.6.6 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ BRATA Android Malware Evolves Into an APT πŸ•΄

The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Evolving Beyond the Password: It's Time to Up the Ante πŸ•΄

While there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2)

πŸ“– Read

via "Dark Reading".
❌ Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management ❌

Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Today's dynamic IT environment demands an advanced vulnerability management program to deal with the complex attack surface and curb security risks.

πŸ“– Read

via "Threat Post".
⚠ Capital One identity theft hacker finally gets convicted ⚠

It took three years, but the Capital One cracker was convicted in the end. Don't get caught out in a data breach of your own!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-1833 β€Ό

A flaw was found in AMQ Broker Operator 7.9.4 installed via UI using OperatorHub where a low-privilege user that has access to the namespace where the AMQ Operator is deployed has access to clusterwide edit rights by checking the secrets. The service account used for building the Operator gives more permission than expected and an attacker could benefit from it. This requires at least an already compromised low-privilege account or insider attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30874 β€Ό

There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23342 β€Ό

The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase releases 21.1.1.1000 through 21.1.15.1000 are vulnerable to a username enumeration vulnerability. An attacker can obtain valid users based on the response returned for invalid and valid users by sending a POST login request to the /mobilebroker/ServiceToBroker.svc/Json/Connect endpoint. This can lead to user enumeration against the underlying Active Directory integrated systems.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27870 β€Ό

A maliciously crafted TGA file in Autodesk AutoCAD 2023 may be used to write beyond the allocated buffer while parsing TGA file. This vulnerability may be exploited to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32973 β€Ό

An authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31786 β€Ό

IdeaLMS 2022 allows reflected Cross Site Scripting (XSS) via the IdeaLMS/Class/Assessment/ PATH_INFO.

πŸ“– Read

via "National Vulnerability Database".