πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-30245 β€Ό

Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36461 β€Ό

An Arbitrary File Upload vulnerability exists in Microweber 1.1.3 that allows attackers to getshell via the Settings Upload Picture section by uploading pictures with malicious code, user.ini.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36553 β€Ό

Cross Site Scripting (XSS) vulnerability in sourcecodester Multi Restaurant Table Reservation System 1.0 via the Area(food_type) field to /dashboard/menu-list.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36552 β€Ό

Cross Site Scripting (XSS) vulnerability in sourcecodester Multi Restaurant Table Reservation System 1.0 via the Made field to /dashboard/menu-list.php.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep91: CodeRed, OpenSSL, Java bugs and Office macros [Podcast + Transcript] ⚠

Latest episode - listen now! Great discussion, technical content, solid advice... all covered in plain English.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ More than 4,000 individuals’ medical data left exposed for 16 years πŸ—“οΈ

Private healthcare information was accessible since 2006

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine πŸ•΄

Researchers who helped thwart the Russian nation-state group's recent attack on Ukraine's power supply will disclose at Black Hat USA what they found while reverse-engineering the powerful Industroyer2 malware used by the powerful hacking team.

πŸ“– Read

via "Dark Reading".
⚠ 7 cybersecurity tips for your summer vacation! ⚠

Here you go - seven thoughtful cybersecurity tips to help you travel safely...

πŸ“– Read

via "Naked Security".
❌ Emerging H0lyGh0st Ransomware Tied to North Korea ❌

Microsoft has linked a threat that emerged in June 2021 and targets small-to-mid-sized businesses to state-sponsored actors tracked as DEV-0530.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-35409 β€Ό

An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.2.0. In some configurations, an unauthenticated attacker can send an invalid ClientHello message to a DTLS server that causes a heap-based buffer over-read of up to 255 bytes. This can cause a server crash or possibly information disclosure based on error responses. Affected configurations have MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and MBEDTLS_SSL_IN_CONTENT_LEN less than a threshold that depends on the configuration: 258 bytes if using mbedtls_ssl_cookie_check, and possibly up to 571 bytes with a custom cookie check function.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2020-35305 β€Ό

Cross site scripting (XSS) in gollum 5.0 to 5.1.2 via the filename parameter to the 'New Page' dialog.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23141 β€Ό

ZXMP M721 has an information leak vulnerability. Since the serial port authentication on the ZBOOT interface is not effective although it is enabled, an attacker could use this vulnerability to log in to the device to obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ex-CIA Programmer Found Guilty of Stealing Vault 7 Data, Giving It to Wikileaks πŸ•΄

Joshua Schulte has been convicted for his role in the Vault 7 Wikileaks data dump that exposed invasive US cyber intelligence tactics.

πŸ“– Read

via "Dark Reading".
πŸ•΄ What Are the Risks of Employees Going on a 'Hybrid Holiday'? πŸ•΄

As more employees plan on taking a "hybrid holiday" β€” longer holidays with the intention of working remotely from the travel destination for part of that time β€” organizations have to consider the risks. The biggest one? Wi-Fi networks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How Attackers Could Dupe Developers into Downloading Malicious Code From GitHub πŸ•΄

Developers need to be cautious about whom they trust on GitHub because it's easy to establish fake credibility on the platform, security vendor warns.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-34232 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34222 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34230 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34241 β€Ό

Adobe Character Animator version 4.4.7 (and earlier) and 22.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34234 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34215 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".