πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-39799 β€Ό

An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. This could lead to stealing session information and impersonating the affected user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35295 β€Ό

Under certain conditions, the application SAP BusinessObjects Business Intelligence Platform (Version Management System) - versions 420, 430, exposes sensitive information to an actor over the network with high privileges that is not explicitly authorized to have access to that information, leading to a high impact on Confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3179 β€Ό

Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39801 β€Ό

SAP GRC Access control Emergency Access Management allows an authenticated attacker to access a Firefighter session even after it is closed in Firefighter Logon Pad. This attack can be launched only within the firewall. On successful exploitation the attacker can gain access to admin session and completely compromise the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39014 β€Ό

Under certain conditions SAP BusinessObjects Business Intelligence Platform Central Management Console (CMC) - version 430, allows an attacker to access certain unencrypted sensitive parameters which would otherwise be restricted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35294 β€Ό

An attacker with basic business user privileges could craft and upload a malicious file to SAP NetWeaver Application Server ABAP, which is then downloaded and viewed by other users resulting in a stored Cross-Site-Scripting attack. This could lead to information disclosure including stealing authentication information and impersonating the affected user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3029 β€Ό

In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isnΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyberattackers Abuse Facebook Ad Manager in Savvy Credential-Harvesting Campaign πŸ•΄

Facebook lead-generation forms are being repurposed to collect passwords and credit card information from unsuspecting Facebook advertisers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ U-Haul Customer Contract Search Tool Compromised πŸ•΄

Password compromise led to unauthorized access to a customer contract search tool over a five-month window, according to the company.

πŸ“– Read

via "Dark Reading".
πŸ•΄ ShadowPad Threat Actors Return With Fresh Government Strikes, Updated Tools πŸ•΄

Cyber spies are using legitimate apps for DLL sideloading, deploying an updated range of malware, including the new "Logdatter" info-stealer.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-26929 β€Ό

.NET Framework Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35830 β€Ό

Remote Procedure Call Runtime Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34722 β€Ό

Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34721.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35835 β€Ό

Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34731, CVE-2022-34733, CVE-2022-35834, CVE-2022-35836, CVE-2022-35840.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35832 β€Ό

Windows Event Tracing Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34732 β€Ό

Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35803 β€Ό

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37969.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35834 β€Ό

Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34731, CVE-2022-34733, CVE-2022-35835, CVE-2022-35836, CVE-2022-35840.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30196 β€Ό

Windows Secure Channel Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-35833.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33679 β€Ό

Windows Kerberos Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33647.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34730 β€Ό

Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34732, CVE-2022-34734.

πŸ“– Read

via "National Vulnerability Database".