πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Google Fixes 24 Vulnerabilities with New Chrome Update πŸ•΄

But one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version 105 of Chrome.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-38812 β€Ό

AeroCMS 0.1.1 is vulnerable to SQL Injection via the author parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37183 β€Ό

Piwigo 12.3.0 is vulnerable to Cross Site Scripting (XSS) via /search/1940/created-monthly-list.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36046 β€Ό

Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn't being shared across requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36566 β€Ό

Rengine v1.3.0 was discovered to contain a command injection vulnerability via the scan engine function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37184 β€Ό

The application manage_website.php on Garage Management System 1.0 is vulnerable to Shell File Upload. The already authenticated malicious user, can upload a dangerous RCE or LCE exploit file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37128 β€Ό

In D-Link DIR-816 A2_v1.10CNB04.img the network can be initialized without authentication via /goform/wizard_end.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38153 β€Ό

An issue was discovered in wolfSSL before 5.5.0 (when --enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2 handshake, and the client has a non-empty session cache, the session cache frees a pointer that points to unallocated memory, causing the client to crash with a "free(): invalid pointer" message. NOTE: It is likely that this is also exploitable during TLS 1.3 handshakes between a client and a malicious server. With TLS 1.3, it is not possible to exploit this as a man-in-the-middle.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Gov to force through tough telecoms regulations to boost network security πŸ“’

Regulator Ofcom will have powers to monitor, investigate and fine providers that fail to meet the new requirements

πŸ“– Read

via "ITPro".
πŸ“’ Cuba ransomware group claims attack on Montenegro government πŸ“’

The double extortion specialists claim to have stolen the data days before Montenegro announced a sustained and co-ordinated series of cyber attacks targeting it from Russia

πŸ“– Read

via "ITPro".
πŸ“’ MI5 reveals it has been working with an AI non-profit on national security since 2017 πŸ“’

The security service has been working with The Alan Turing Institute and has decided to unveil the partnership today to allow the pair to work more closely together

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-37123 β€Ό

D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/form2userconfig.cgi.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37125 β€Ό

D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/NTPSyncWithHost.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36051 β€Ό

ZITADEL combines the ease of Auth0 and the versatility of Keycloak.**Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role.`ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login. **Actions**, for example, allow creating authorizations (user grants) on newly created users programmatically. Due to a missing authorization check, **Actions** were able to grant authorizations for projects that belong to other organizations inside the same Instance. Granting authorizations via API and Console is not affected by this vulnerability. There is currently no known workaround, users should update.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37130 β€Ό

In D-Link DIR-816 A2_v1.10CNB04.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36619 β€Ό

In D-link DIR-816 A2_v1.10CNB04.img,the network can be reset without authentication via /goform/setMAC.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37129 β€Ό

D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3072 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ WatchGuard firewall exploit threatens appliance takeover πŸ—“οΈ

One-two bug punch leads to β€˜worst possible impact’, said researcher

πŸ“– Read

via "The Daily Swig".
πŸ‘1
πŸ•΄ (ISC)(2) Launches 'Certified in Cybersecurity' Entry-Level Certification to Address Global Workforce Gap πŸ•΄

After a rigorous pilot program, the association's newest certification is officially operational. More than 1,500 pilot participants who passed the exam are on the path to full certification.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Real-World Cloud Attacks: The True Tasks of Cloud Ransomware Mitigation πŸ•΄

Cloud breaches are inevitable β€” and so is cloud ransomware. (Second of two parts.)

πŸ“– Read

via "Dark Reading".