πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-2288 β€Ό

Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2289 β€Ό

Use After Free in GitHub repository vim/vim prior to 9.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33971 β€Ό

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32284 β€Ό

Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-33948 β€Ό

HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34151 β€Ό

Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33208 β€Ό

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2300 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2301 β€Ό

Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0250 β€Ό

The Redirection for Contact Form 7 WordPress plugin before 2.5.0 does not escape a link generated before outputting it in an attribute, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1946 β€Ό

The Gallery WordPress plugin before 2.0.0 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1301 β€Ό

The WP Contact Slider WordPress plugin before 2.4.7 does not sanitize and escape the Text to Display settings of sliders, which could allow high privileged users such as editor and above to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25066 β€Ό

The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1967 β€Ό

The WP Championship WordPress plugin before 9.3 is lacking CSRF checks in various places, allowing attackers to make a logged in admin perform unwanted actions, such as create and delete arbitrary teams as well as update the plugin's settings. Due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25056 β€Ό

The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2268 β€Ό

The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE

πŸ“– Read

via "National Vulnerability Database".
⚠ Canadian cybercriminal pleads guilty to β€œNetWalker” attacks in US ⚠

Bust in Canada, now bust in the USA as well.

πŸ“– Read

via "Naked Security".
πŸ›  Global Socket 1.4.37 πŸ› 

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Bash / Netcat Reverse Shells πŸ› 

This script is a great tool for pentesters needing to create reverse shells using either bash or netcat.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ Australia’s Monash University launches public bug bounty program πŸ—“οΈ

Education institution will pay up to $2,500 for valid vulnerabilities

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ β€˜Does anybody like CAPTCHAs?’ – Cloudflare CTO John Graham-Cumming envisages a frictionless future for website Turing tests πŸ—“οΈ

British software engineer also talks HTTP/3, zero trust, and lava lamp-powered cryptography

πŸ“– Read

via "The Daily Swig".