πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-22685 β€Ό

Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology WebDAV Server before 2.4.0-0062 allows remote authenticated users to delete arbitrary files via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27611 β€Ό

Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Audio Station before 6.5.4-3367 allows remote authenticated users to delete arbitrary files via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22683 β€Ό

Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Media Server before 1.8.1-2876 allows remote attackers to execute arbitrary code via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36364 β€Ό

Apache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via `httpclient_impl` connection property; however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare cases remote code execution. To exploit the vulnerability: 1) the attacker needs to have privileges to control JDBC connection parameters; 2) and there should be a vulnerable class (constructor with URL parameter and ability to execute code) in the classpath. From Apache Calcite Avatica 1.22.0 onwards, it will be verified that the class implements the expected interface before invoking its constructor.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37010 β€Ό

In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37009 β€Ό

In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Onfido bug bounty program launched to help shore up ID verification defenses πŸ—“οΈ

Initiative adds another layer of protection for end-to-end identity verification platform

πŸ“– Read

via "The Daily Swig".
πŸ•΄ What Women Should Know Before Joining the Cybersecurity Industry πŸ•΄

Three observations about our industry that might help demystify security for women entrants.

πŸ“– Read

via "Dark Reading".
πŸ›  Wireshark Analyzer 3.6.7 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ‘2
πŸ—“οΈ GitHub enhances 2FA for npm, improves security and manageability πŸ—“οΈ

New features also include ability to connect social media accounts

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep93: Office security, breach costs, and leisurely patches [Audio + Text] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-1805 β€Ό

When connecting to Amazon Workspaces, the SHA256 presented by AWS connection provisioner is not fully verified by Zero Clients. The issue could be exploited by an adversary that places a MITM (Man in the Middle) between a zero client and AWS session provisioner in the network. This issue is only applicable when connecting to an Amazon Workspace from a PCoIP Zero Client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22644 β€Ό

Ovarro TBox TWinSoft uses the custom hardcoded user Ò€œTWinSoftҀ� with a hardcoded key.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22650 β€Ό

An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22640 β€Ό

An attacker can decrypt the Ovarro TBox login password by communication capture and brute force attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22646 β€Ό

The Ò€œipkҀ� package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1948 β€Ό

An issue has been discovered in GitLab affecting all versions starting from 15.0 before 15.0.1. Missing validation of input used in quick actions allowed an attacker to exploit XSS by injecting HTML in contact details.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22648 β€Ό

Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2016-2138 β€Ό

In kippo-graph before version 1.5.1, there is a cross-site scripting vulnerability in xss_clean() in class/KippoInput.class.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27509 β€Ό

Unauthenticated redirection to a malicious website

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35882 β€Ό

Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in GS Plugins GS Testimonial Slider plugin <= 1.9.1 at WordPress.

πŸ“– Read

via "National Vulnerability Database".