πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-2368 β€Ό

Business Logic Errors in GitHub repository microweber/microweber prior to 1.2.20.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1794 β€Ό

The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30792 β€Ό

In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29926 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation in Cybozu, Inc. showed that it was not a vulnerability. Notes: https://jvn.jp/en/jp/JVN14077132/

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2302 β€Ό

Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30791 β€Ό

In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ β€˜Dirty dancing’ in OAuth: Researcher discloses how cyber-attacks can lead to account hijacking πŸ—“οΈ

Single-click account takeovers are made possible by taking advantage of quirks in OAuth

πŸ“– Read

via "The Daily Swig".
⚠ Apache β€œCommons Configuration” patches Log4Shell-style bug – what you need to know ⚠

It's a bit like Log4J, but for configuration files, not for logging.

πŸ“– Read

via "Naked Security".
⚠ That didn’t last! Microsoft turns off the Office security it just turned on ⚠

An Office anti-malware setting that took more than 20 years to arrive... and fewer than 20 weeks to vanish again.

πŸ“– Read

via "Naked Security".
πŸ•΄ Proposed SEC Rules Require More Transparency About Cyber-Risk πŸ•΄

The new guidelines would require public companies to file periodic disclosures about their cybersecurity practices and notify the SEC within 96 hours of a material breach.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials πŸ•΄

Scams pressure victims to "resolve an issue that could impact their status, business."

πŸ“– Read

via "Dark Reading".
πŸ•΄ Diversity in Cybersecurity: Fostering Gender-Inclusive Teams That Perform Better πŸ•΄

Proactive steps in recruiting women to cybersecurity teams, along with policies focused on diversity, equity, and inclusion, help make cybersecurity teams more effective. Addressing specific barriers that female candidates face will make those teams more inclusive and more representative.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1057 β€Ό

The Pricing Deals for WooCommerce WordPress plugin through 2.0.2.02 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1910 β€Ό

The Shortcodes and extra features for Phlox WordPress plugin before 2.9.8 does not sanitise and escape a parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2091 β€Ό

The Cache Images WordPress plugin before 3.2.1 does not implement nonce checks, which could allow attackers to make any logged user upload images via a CSRF attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2093 β€Ό

The WP Duplicate Page WordPress plugin before 1.3 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1951 β€Ό

The core plugin for kitestudio WordPress plugin before 2.3.1 does not sanitise and escape some parameters before outputting them back in a response of an AJAX action, available to both unauthenticated and authenticated users when a premium theme from the vendor is active, leading to a Reflected Cross-Site Scripting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2050 β€Ό

The WP-Paginate WordPress plugin before 2.1.9 does not escape one of its settings, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1599 β€Ό

The Admin Management Xtended WordPress plugin before 2.4.5 does not have CSRF checks in some of its AJAX actions, allowing attackers to make a logged users with the right capabilities to call them. This can lead to changes in post status (draft, published), slug, post date, comment status (enabled, disabled) and more.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1546 β€Ό

The WooCommerce - Product Importer WordPress plugin through 1.5.2 does not sanitise and escape the imported data before outputting it back in the page, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1952 β€Ό

The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.

πŸ“– Read

via "National Vulnerability Database".