πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Trio of XSS bugs in open source web apps could lead to complete system compromise πŸ—“οΈ

Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impact

πŸ“– Read

via "The Daily Swig".
πŸ•΄ VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware πŸ•΄

Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-28437 β€Ό

This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28434 β€Ό

This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7795 β€Ό

The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25867 β€Ό

The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28433 β€Ό

This affects all versions of package node-latex-pdf.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28451 β€Ό

This affects the package image-tiler before 2.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23385 β€Ό

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29154 β€Ό

An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34613 β€Ό

Mealie 1.0.0beta3 contains an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34618 β€Ό

A stored cross-site scripting (XSS) vulnerability in Mealie 1.0.0beta3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the recipe description text field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28425 β€Ό

This affects all versions of package curljs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28423 β€Ό

This affects all versions of package monorepo-build.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28424 β€Ό

This affects all versions of package s3-kilatstorage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28453 β€Ό

This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js.

πŸ“– Read

via "National Vulnerability Database".
⚠ Cryptocoin β€œtoken swapper” Nomad loses $200 million in coding blunder ⚠

Transactions were only approved, it seems, if they were initiated by... errrrr, by anyone.

πŸ“– Read

via "Naked Security".
πŸ•΄ Microsoft Intros New Attack Surface Management, Threat Intel Tools πŸ•΄

Microsoft says the new tools will give security teams an attacker's-eye view of their systems and supercharge their investigation and remediation efforts.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Capital One Breach Conviction Exposes Scale of Cloud Entitlement Risk πŸ•΄

To protect against similar attacks, organizations should focus on bringing cloud entitlements and configurations under control.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-34625 β€Ό

Mealie1.0.0beta3 was discovered to contain a Server-Side Template Injection vulnerability, which allows attackers to execute arbitrary code via a crafted Jinja2 template.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30571 β€Ό

The iWay Service Manager Console component of TIBCO Software Inc.'s TIBCO iWay Service Manager contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker with network access to execute scripts targeting the affected system or the victim's local system. Affected releases are TIBCO Software Inc.'s TIBCO iWay Service Manager: versions 8.0.6 and below.

πŸ“– Read

via "National Vulnerability Database".