πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-36901 β€Ό

Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36920 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34529 β€Ό

WASM3 v0.5.0 was discovered to contain a segmentation fault via the component Compile_Memory_CopyFill.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36892 β€Ό

Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36921 β€Ό

A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36894 β€Ό

An arbitrary file write vulnerability in Jenkins CLIF Performance Testing Plugin 64.vc0d66de1dfb_f and earlier allows attackers with Overall/Read permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36887 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Job Configuration History Plugin 1155.v28a_46a_cc06a_5 and earlier allows attackers to delete entries from job, agent, and system configuration history, or restore older versions of job, agent, and system configurations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36906 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23100 β€Ό

OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36899 β€Ό

Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.

πŸ“– Read

via "National Vulnerability Database".
❌ Messaging Apps Tapped as Platform for Cybercriminal Activity ❌

Built-in Telegram and Discord services are fertile ground for storing stolen data, hosting malware and using bots for nefarious purposes.

πŸ“– Read

via "Threat Post".
πŸ•΄ Average Data Breach Costs Soar to $4.4M in 2022 πŸ•΄

Those costs are usually passed on to consumers, not investors, as compromised businesses raise prices for goods and services.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Is Your Home or Small Business Built on Secure Foundations? Think Again… πŸ•΄

Did you know that the standard router relied upon in homes and by thousands of small businesses is the most frequently attacked IoT device? James Willison, Project and Engagement Manager, IoT Security Foundation, explores the issue and reveals an ongoing initiative from the foundation that is designed to better secure the devices.

πŸ“– Read

via "Dark Reading".
πŸ•΄ US Offers $10M Double-Reward for North Korea Cyberattacker Info πŸ•΄

North Korean state-sponsored actors, who help economically prop up Kim Jong Un's dictatorship, continue to pummel US infrastructure.

πŸ“– Read

via "Dark Reading".
πŸ›  Clam AntiVirus Toolkit 0.105.1 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-33943 β€Ό

Authenticated (contributor or higher user role) Cross-Site Scripting (XSS) vulnerability in Nico Amarilla's BxSlider WP plugin <= 2.0.0 at WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35672 β€Ό

Adobe Acrobat Reader version 22.001.20085 (and earlier), 20.005.30314 (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35669 β€Ό

Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 20.005.30334 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware πŸ•΄

Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-34120 β€Ό

Barangay Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the module editing function at /pages/activity/activity.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34121 β€Ό

Cuppa CMS v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the component /templates/default/html/windows/right.php.

πŸ“– Read

via "National Vulnerability Database".