🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-35171 ‼

When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-22998 ‼

Implemented protections on AWS credentials that were not properly protected.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-35172 ‼

SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-31593 ‼

SAP Business One client - version 10.0 allows an attacker with low privileges, to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-35225 ‼

SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (XSS) vulnerability, therefore changing the scope of the attack. This leads to limited impact on confidentiality and integrity of data.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-1025 ‼

All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-35224 ‼

SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This attack can be used to non-permanently deface or modify portal content. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim?s web browser session.

📖 Read

via "National Vulnerability Database".
🕴 PyPI Mandates 2FA, Plans Google Titan Key Giveaway 🕴

Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.

📖 Read

via "Dark Reading".
‼ CVE-2022-30211 ‼

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-22031 ‼

Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-33633 ‼

Skype for Business and Lync Remote Code Execution Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-21845 ‼

Windows Kernel Information Disclosure Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-30226 ‼

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22022, CVE-2022-22041, CVE-2022-30206.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-30216 ‼

Windows Server Service Tampering Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-22047 ‼

Windows CSRSS Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22026, CVE-2022-22049.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-22029 ‼

Windows Network File System Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22039.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-30225 ‼

Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-33668 ‼

Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-29600 ‼

The oelib (aka One is Enough Library) extension through 4.1.5 for TYPO3 allows SQL Injection.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-22027 ‼

Windows Fax Service Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22024.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-30214 ‼

Windows DNS Server Remote Code Execution Vulnerability.

📖 Read

via "National Vulnerability Database".