๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.1K subscribers
88.5K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2021-27861 โ€ผ

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-27853 โ€ผ

Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-37346 โ€ผ

EC-CUBE plugin 'Product Image Bulk Upload Plugin' 1.0.0 and 4.1.0 contains an insufficient verification vulnerability when uploading files. Exploiting this vulnerability allows a remote unauthenticated attacker to upload arbitrary files other than image files. If a user with an administrative privilege of EC-CUBE where the vulnerable plugin is installed is led to upload a specially crafted file, an arbitrary script may be executed on the system.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-39835 โ€ผ

An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-38975 โ€ผ

DOM-based cross-site scripting vulnerability in EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote attacker to inject an arbitrary script by having an administrative user of the product to visit a specially crafted page.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-38335 โ€ผ

Vtiger CRM v7.4.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the e-mail template modules.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-37209 โ€ผ

JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-3324 โ€ผ

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40199 โ€ผ

Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-41604 โ€ผ

Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-41571 โ€ผ

An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Local file inclusion can occur.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40878 โ€ผ

In Exam Reviewer Management System 1.0, an authenticated attacker can upload a web-shell php file in profile page to achieve Remote Code Execution (RCE).

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40352 โ€ผ

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_traveller.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-41570 โ€ผ

An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Unauthenticated SQL injection can occur.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40353 โ€ผ

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/up_booking.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40817 โ€ผ

Zammad 5.2.1 has a fine-grained permission model that allows to configure read-only access to tickets. However, agents were still wrongly able to perform some operations on such tickets, like adding and removing links, tags. and related answers. This issue has been fixed in 5.2.2.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-31367 โ€ผ

Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40816 โ€ผ

Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40354 โ€ผ

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_booking.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40877 โ€ผ

Exam Reviewer Management System 1.0 is vulnerable to SQL Injection via the รขโ‚ฌหœidรขโ‚ฌโ„ข parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-23006 โ€ผ

A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.

๐Ÿ“– Read

via "National Vulnerability Database".