πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-0972 β€Ό

Use after free in Extensions in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0973 β€Ό

Use after free in Safe Browsing in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0976 β€Ό

Heap buffer overflow in GPU in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2327 β€Ό

io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2209 β€Ό

io_uring uses work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. The mapping of flags is incomplete, which leads to multiple incorrect reference counts and hence use-after-free. We recommend upgrading past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Grafana patches vulnerability that could lead to admin account takeover πŸ—“οΈ

Open source analytics platform fixes bug that could lead to authentication bypass, privilege escalation

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep92: Log4Shell4Ever, travel tips, and scamminess [Audio + Text] ⚠

Latest episode - listen, read or both!

πŸ“– Read

via "Naked Security".
⚠ Apple patches β€œ0-day” browser bug fixed 2 weeks ago in Chrome, Edge ⚠

One vendor's zero-day is another vendor's routine patch...

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Zyxel firewall vulnerabilities left business networks open to abuse πŸ—“οΈ

Severity of code execution bug mitigated by β€˜high uptake’ of previous patch

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-36131 β€Ό

The Better PDF Exporter add-on 10.0.0 for Atlassian Jira is prone to stored XSS via a crafted description to the PDF Templates overview page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31168 β€Ό

Zulip is an open source team chat tool. Due to an incorrect authorization check in Zulip Server 5.4 and earlier, a member of an organization could craft an API call that grants organization administrator privileges to one of their bots. The vulnerability is fixed in Zulip Server 5.5. Members who donΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t own any bots, and lack permission to create them, canΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t exploit the vulnerability. As a workaround for the vulnerability, an organization administrator can restrict the `Who can create bots` permission to administrators only, and change the ownership of existing bots.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ What Firewalls Can β€” and Can't β€” Accomplish πŸ•΄

Understanding the limitations of firewalls is important to protecting the organization from evolving threats.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 7/22 πŸ”

A new PayPal phishing campaign makes the rounds, the FBI sounds the alarm on fake cryptocurrency apps, and more - catch up on the news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ—“οΈ β€˜We’re still fighting last decade’s battle’ – Sonatype CTO Brian Fox on the struggle to secure the neglected software supply chain πŸ—“οΈ

Open source security expert warns there is still a β€˜long road’ ahead to prepare for the next attack wave

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-34509 β€Ό

The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34037 β€Ό

An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-2136 β€Ό

The affected product is vulnerable to multiple SQL injections that require low privileges for exploitation and may allow an unauthorized attacker to disclose information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34982 β€Ό

The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2135 β€Ό

The affected product is vulnerable to multiple SQL injections, which may allow an unauthorized attacker to disclose information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36200 β€Ό

Under certain circumstances an unauthenticated user could access the the web API for Metasys ADS/ADX/OAS 10 versions prior to 10.1.6 and 11 versions prior to 11.0.2 and enumerate users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2142 β€Ό

The affected product is vulnerable to a SQL injection with high attack complexity, which may allow an unauthorized attacker to disclose information.

πŸ“– Read

via "National Vulnerability Database".