πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-28451 β€Ό

This affects the package image-tiler before 2.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23385 β€Ό

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29154 β€Ό

An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34613 β€Ό

Mealie 1.0.0beta3 contains an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34618 β€Ό

A stored cross-site scripting (XSS) vulnerability in Mealie 1.0.0beta3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the recipe description text field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28425 β€Ό

This affects all versions of package curljs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28423 β€Ό

This affects all versions of package monorepo-build.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28424 β€Ό

This affects all versions of package s3-kilatstorage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28453 β€Ό

This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js.

πŸ“– Read

via "National Vulnerability Database".
⚠ Cryptocoin β€œtoken swapper” Nomad loses $200 million in coding blunder ⚠

Transactions were only approved, it seems, if they were initiated by... errrrr, by anyone.

πŸ“– Read

via "Naked Security".
πŸ•΄ Microsoft Intros New Attack Surface Management, Threat Intel Tools πŸ•΄

Microsoft says the new tools will give security teams an attacker's-eye view of their systems and supercharge their investigation and remediation efforts.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Capital One Breach Conviction Exposes Scale of Cloud Entitlement Risk πŸ•΄

To protect against similar attacks, organizations should focus on bringing cloud entitlements and configurations under control.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-34625 β€Ό

Mealie1.0.0beta3 was discovered to contain a Server-Side Template Injection vulnerability, which allows attackers to execute arbitrary code via a crafted Jinja2 template.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30571 β€Ό

The iWay Service Manager Console component of TIBCO Software Inc.'s TIBCO iWay Service Manager contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker with network access to execute scripts targeting the affected system or the victim's local system. Affected releases are TIBCO Software Inc.'s TIBCO iWay Service Manager: versions 8.0.6 and below.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35220 β€Ό

Teamplus Pro community discussion function has an Γ’β‚¬Λœallocation of resource without limits or throttlingÒ€ℒ vulnerability. A remote attacker with general user privilege posting a thread with large content can cause the receiving client device to allocate too much memory, leading to abnormal termination of this clientÒ€ℒs Teamplus Pro application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1293 β€Ό

The embedded neutralization of Script-Related HTML Tag, was by-passed in the case of some extra conditions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35217 β€Ό

The NHI cardÒ€ℒs web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35219 β€Ό

The NHI cardÒ€ℒs web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet key parameter. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30572 β€Ό

The iWay Service Manager Console component of TIBCO Software Inc.'s TIBCO iWay Service Manager contains an easily exploitable Directory Traversal vulnerability that allows a low privileged attacker with network access to read arbitrary resources on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO iWay Service Manager: versions 8.0.6 and below.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35218 β€Ό

The NHI cardÒ€ℒs web service component has a heap-based buffer overflow vulnerability due to insufficient validation for packet origin parameter length. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35222 β€Ό

HiCOS Citizen verification component has a stack-based buffer overflow vulnerability due to insufficient parameter length validation. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.

πŸ“– Read

via "National Vulnerability Database".