πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-2342 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to v0.64.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32567 β€Ό

The Appfire Jira Misc Custom Fields (JMCF) app 2.4.6 for Atlassian Jira allows XSS via a crafted project name to the Add Auto Indexing Rule function.

πŸ“– Read

via "National Vulnerability Database".
⚠ OpenSSL fixes two β€œone-liner” crypto bugs – what you need to know ⚠

"As bad as Heartbleed"? We heard that concern a week ago, but we think it's less ungood than that...

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Fortinet patch batch remedies multiple path traversal vulnerabilities πŸ—“οΈ

Four high, six medium, and one low severity issue fixed

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Inside NIST's 4 Crypto Algorithms for a Post-Quantum World πŸ•΄

With the world potentially less than a decade away from breaking current encryption around critical data, researchers weigh in on planning for the post-quantum world.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-25046 β€Ό

A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25047 β€Ό

The password reset token in CWP v0.9.8.1126 is generated using known or predictable values.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-1785 β€Ό

In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31854 β€Ό

Codoforum v5.1 was discovered to contain an arbitrary file upload vulnerability via the logo change option in the admin panel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32206 β€Ό

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-3207 β€Ό

In Openshift Origin 3 the cookies being set in console have no 'secure', 'HttpOnly' attributes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25048 β€Ό

Command injection vulnerability in CWP v0.9.8.1126 that allows normal users to run commands as the root user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32208 β€Ό

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32205 β€Ό

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on `foo.example.com` can set cookies that also would match for `bar.example.com`, making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32207 β€Ό

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-1784 β€Ό

In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34007 β€Ό

EQS Integrity Line through 2022-07-01 allows a stored XSS via a crafted whistleblower entry.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33996 β€Ό

Incorrect permission management in Devolutions Server before 2022.2 allows a new user with a preexisting username to inherit the permissions of that previous user.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cybersecurity Has a Talent Shortage & Non-Technical People Offer a Way Out πŸ•΄

It's time to tap the large reservoir of talent with analytical skills to help tackle cybersecurity problems. Train workers in cybersecurity details while using their ability to solve problems.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ SMEs slow to adopt MFA – study πŸ—“οΈ

Authentication shortcomings leave sensitive data at risk

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Buggy 'Log in With Google' API Implementation Opens Crypto Wallets to Account Takeover πŸ•΄

Improper implementations of authentication APIs at a global crypto wallet service provider could have resulted in the loss of account control β€” and millions of dollars β€” from personal and business accounts.

πŸ“– Read

via "Dark Reading".