๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2020-27802 โ€ผ

An floating point exception was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-2980 โ€ผ

NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0258.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-3929 โ€ผ

A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-2982 โ€ผ

Use After Free in GitHub repository vim/vim prior to 9.0.0259.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-2997 โ€ผ

Session Fixation in GitHub repository snipe/snipe-it prior to 6.0.10.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-35937 โ€ผ

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-36699 โ€ผ

Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/manage_category.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-35938 โ€ผ

A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-36703 โ€ผ

Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /stocks/manage_stockin.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-23210 โ€ผ

A floating point exception (divide-by-zero) issue was discovered in SoX in functon read_samples() of voc.c file. An attacker with a crafted file, could cause an application to crash.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-3979 โ€ผ

A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-4112 โ€ผ

A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-23159 โ€ผ

A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function lsx_read_w_buf() in formats_i.c file. The vulnerability is exploitable with a crafted file, that could cause an application to crash.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-27801 โ€ผ

A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-3914 โ€ผ

It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-27800 โ€ผ

A heap-based buffer over-read was discovered in the get_le32 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-27796 โ€ผ

A heap-based buffer over-read was discovered in the invert_pt_dynamic function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-32570 โ€ผ

In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some logรขโ‚ฌโ„ขs files, under a common path, and read information stored in the logรขโ‚ฌโ„ขs files in order to conduct privilege escalation.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-36168 โ€ผ

A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php:

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-35192 โ€ผ

D-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via the User parameter or Pwd parameter to Login.asp.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-3020 โ€ผ

An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive "shell" that isn't limited to the commands specified in hawk_invoke, allowing escalation to root.

๐Ÿ“– Read

via "National Vulnerability Database".