πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S3 Ep92: Log4Shell4Ever, travel tips, and scamminess [Audio + Text] ⚠

Latest episode - listen, read or both!

πŸ“– Read

via "Naked Security".
⚠ Apple patches β€œ0-day” browser bug fixed 2 weeks ago in Chrome, Edge ⚠

One vendor's zero-day is another vendor's routine patch...

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Zyxel firewall vulnerabilities left business networks open to abuse πŸ—“οΈ

Severity of code execution bug mitigated by β€˜high uptake’ of previous patch

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-36131 β€Ό

The Better PDF Exporter add-on 10.0.0 for Atlassian Jira is prone to stored XSS via a crafted description to the PDF Templates overview page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31168 β€Ό

Zulip is an open source team chat tool. Due to an incorrect authorization check in Zulip Server 5.4 and earlier, a member of an organization could craft an API call that grants organization administrator privileges to one of their bots. The vulnerability is fixed in Zulip Server 5.5. Members who donΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t own any bots, and lack permission to create them, canΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t exploit the vulnerability. As a workaround for the vulnerability, an organization administrator can restrict the `Who can create bots` permission to administrators only, and change the ownership of existing bots.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ What Firewalls Can β€” and Can't β€” Accomplish πŸ•΄

Understanding the limitations of firewalls is important to protecting the organization from evolving threats.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 7/22 πŸ”

A new PayPal phishing campaign makes the rounds, the FBI sounds the alarm on fake cryptocurrency apps, and more - catch up on the news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ—“οΈ β€˜We’re still fighting last decade’s battle’ – Sonatype CTO Brian Fox on the struggle to secure the neglected software supply chain πŸ—“οΈ

Open source security expert warns there is still a β€˜long road’ ahead to prepare for the next attack wave

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-34509 β€Ό

The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34037 β€Ό

An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-2136 β€Ό

The affected product is vulnerable to multiple SQL injections that require low privileges for exploitation and may allow an unauthorized attacker to disclose information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34982 β€Ό

The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2135 β€Ό

The affected product is vulnerable to multiple SQL injections, which may allow an unauthorized attacker to disclose information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36200 β€Ό

Under certain circumstances an unauthenticated user could access the the web API for Metasys ADS/ADX/OAS 10 versions prior to 10.1.6 and 11 versions prior to 11.0.2 and enumerate users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2142 β€Ό

The affected product is vulnerable to a SQL injection with high attack complexity, which may allow an unauthorized attacker to disclose information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2143 β€Ό

The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34520 β€Ό

Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34502 β€Ό

Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34501 β€Ό

The bin-collection package in PyPI before v0.1 included a code execution backdoor inserted by a third party.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2470 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.21.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2137 β€Ό

The affected product is vulnerable to two SQL injections that require high privileges for exploitation and may allow an unauthorized attacker to disclose information

πŸ“– Read

via "National Vulnerability Database".