πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-34750 β€Ό

An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikibase and WikibaseLexeme extensions. This is related to Special:NewLexeme and Special:NewProperty.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40607 β€Ό

The schm_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40944 β€Ό

In GPAC MP4Box 1.1.0, there is a Null pointer reference in the function gf_filter_pid_get_packet function in src/filter_core/filter_pid.c:5394, as demonstrated by GPAC. This can cause a denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Ready meal distributor Apetito restores β€˜limited’ deliveries in UK following cyber-attack πŸ—“οΈ

β€˜Manual workaround’ kickstarts phased recovery after cybercrooks disrupt meal provision to vulnerable people

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Dozens of cryptography libraries vulnerable to private key theft πŸ—“οΈ

Signing mechanism security shortcomings exposed

πŸ“– Read

via "The Daily Swig".
πŸ›  MIMEDefang Email Scanner 3.0 πŸ› 

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

πŸ“– Read

via "Packet Storm Security".
πŸ›  American Fuzzy Lop plus plus 4.01c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Ransomware Volume Nearly Doubles 2021 Totals in a Single Quarter πŸ•΄

Like a hydra, every time one ransomware gang drops out (REvil or Conti), plenty more step up to fill the void (Black Basta).

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0085 β€Ό

Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23763 β€Ό

Origin validation error vulnerability in NeoRSÒ€ℒs ActiveX moudle allows attackers to download and execute arbitrary files. Remote attackers can use this vulerability to encourage users to access crafted web pages, causing damage such as malicious code infections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30560 β€Ό

When an attacker obtaining the administrative account and password, or through a man-in-the-middle attack, the attacker could send a specified crafted packet to the vulnerable interface then lead the device to crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30561 β€Ό

When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in, the attacker could log in to the device by replaying the user's login packet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30562 β€Ό

If the user enables the https function on the device, an attacker can modify the userÒ€ℒs request data packet through a man-in-the-middle attack ,Injection of a malicious URL in the Host: header of the HTTP Request results in a 302 redirect to an attacker-controlled page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30563 β€Ό

When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in through ONVIF, he can log in to the device by replaying the user's login packet.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A WAF Is Not a Free Lunch: Teaching the Shift-Left Security Mindset πŸ•΄

Developers need to think like WAF operators for security. Start with secure coding and think of Web application firewalls not as a prophylactic but as part of the secure coding test process.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Can Zero-Knowledge Crypto Solve Our Password Problems? πŸ•΄

Creating temporary keys that are not stored in central repositories and time out automatically could improve security for even small businesses.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Atlassian Confluence Exploits Peak at 100K Daily πŸ•΄

Swarms of breach attempts against the Atlassian Confluence vulnerability are likely to continue for years, researchers say, averaging 20,000 attempts daily as of this week.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0987 β€Ό

A flaw was found in PackageKit in the way some of the methods exposed by the Transaction interface examines files. This issue allows a local user to measure the time the methods take to execute and know whether a file owned by root or other users exists.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40553 β€Ό

piwigo 11.5.0 is affected by a remote code execution (RCE) vulnerability in the LocalFiles Editor.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33108 β€Ό

XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3779 β€Ό

A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.

πŸ“– Read

via "National Vulnerability Database".