๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2022-28860 โ€ผ

An authentication downgrade in the server in Citilog 8.0 allows an attacker (in a man in the middle position between the server and its smart camera Axis M1125) to achieve HTTP access to the camera.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-0902 โ€ผ

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-28861 โ€ผ

The server in Citilog 8.0 allows an attacker (in a man in the middle position between the server and its smart camera Axis M1125) to see FTP credentials in a cleartext HTTP traffic. These can be used for FTP access to the server.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-35899 โ€ผ

There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSDK.exe) 1.0.0.4. This might allow a local user to escalate privileges by creating a %PROGRAMFILES(X86)%\ASUS\GameSDK.exe file.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2022-30628 โ€ผ

It was possible to download all receipts without authentication. Must first access the API https://XXXX.supersmart.me/services/v4/customer/signin to get a TOKEN. Then you can then access the API that provides invoice images based on the URL https://XXXX.supersmart.me/services/v4/invoiceImg?orderId=XXXXX

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-28666 โ€ผ

Broken Access Control vulnerability in YIKES Inc. Custom Product Tabs for WooCommerce plugin <= 1.7.7 at WordPress leading to &yikes-the-content-toggle option update.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-32430 โ€ผ

An access control issue in Lin CMS Spring Boot v0.2.1 allows attackers to access the backend information and functions within the application.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-34767 โ€ผ

Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability รขโ‚ฌโ€œ the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-32289 โ€ผ

Cross-Site Request Forgery (CSRF) vulnerability in Sygnoos Popup Builder plugin <= 4.1.0 at WordPress leading to popup status change.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30337 โ€ผ

Cross-Site Request Forgery (CSRF) vulnerability in JoomUnited WP Meta SEO plugin <= 4.4.8 at WordPress allows an attacker to update the social settings.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Google Becomes First Cloud Operator to Join Healthcare ISAC ๐Ÿ•ด

Google Cloud pledges experts and other resources to Health Information Sharing and Analysis Center, a community of healthcare infrastructure operators and owners.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Equitable Digital Identity Verification Requires Moving Past Flawed Legacy Systems ๐Ÿ•ด

Data science can be used to improve access to government assistance while reducing fraud.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2022-34487 โ€ผ

Unauthenticated Arbitrary Option Update vulnerability in biplob018's Shortcode Addons plugin <= 3.0.2 at WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-33198 โ€ผ

Unauthenticated WordPress Options Change vulnerability in Biplob Adhikari's Accordions plugin <= 2.0.2 at WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-28700 โ€ผ

Authenticated Arbitrary File Creation via Export function vulnerability in GiveWP's GiveWP plugin <= 2.20.2 at WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30536 โ€ผ

Authenticated Stored Cross-Site Scripting (XSS) vulnerability in Florent Maillefaud's WP Maintenance plugin <= 6.0.7 at WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-31475 โ€ผ

Authenticated (custom plugin role) Arbitrary File Read via Export function vulnerability in GiveWP's GiveWP plugin <= 2.20.2 at WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ›  AIEngine 2.2.0 ๐Ÿ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

๐Ÿ“– Read

via "Packet Storm Security".
๐Ÿ•ด Mysterious, Cloud-Enabled macOS Spyware Blows Onto the Scene ๐Ÿ•ด

The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2022-0974 โ€ผ

Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-20891 โ€ผ

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.

๐Ÿ“– Read

via "National Vulnerability Database".