πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Uber and Rockstar – has a LAPSUS$ linchpin just been busted (again)? ⚠

Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?

πŸ“– Read

via "Naked Security".
⚠ Morgan Stanley fined millions for selling off devices full of customer PII ⚠

Critical data on old disks always seems inaccessible if you really need it. But when you DON''T want it back, guess what happens...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3296 β€Ό

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3297 β€Ό

Use After Free in GitHub repository vim/vim prior to 9.0.0579.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41343 β€Ό

registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41347 β€Ό

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41352 β€Ό

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36159 β€Ό

Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36158 β€Ό

Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3301 β€Ό

Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38553 β€Ό

Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38970 β€Ό

ieGeek IG20 hipcam RealServer V1.0 is vulnerable to Incorrect Access Control. The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to arbitrary devices.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Java template framework Pebble vulnerable to command injection πŸ—“οΈ

Issue still yet to be patched, but workarounds are available

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-3024 β€Ό

The Simple Bitcoin Faucets WordPress plugin through 1.7.0 does not have any authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscribers to call it and add/delete/edit Bonds. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1755 β€Ό

The SVG Support WordPress plugin before 2.5 does not properly handle SVG added via an URL, which could allow users with a role as low as author to perform Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40924 β€Ό

Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point of the "save_animal" file of the "Animals" module in the background management system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3119 β€Ό

The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3135 β€Ό

The SEO Smart Links WordPress plugin through 3.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3070 β€Ό

The Generate PDF WordPress plugin before 3.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2352 β€Ό

The Post SMTP Mailer/Email Log WordPress plugin before 2.1.7 does not have proper authorisation in some AJAX actions, which could allow high privilege users such as admin to perform blind SSRF on multisite installations for example.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40927 β€Ό

Online Leave Management System v1.0 is vulnerable to SQL Injection via /leave_system/classes/Master.php?f=delete_designation.

πŸ“– Read

via "National Vulnerability Database".