πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-37209 β€Ό

JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3324 β€Ό

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40199 β€Ό

Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41604 β€Ό

Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41571 β€Ό

An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Local file inclusion can occur.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40878 β€Ό

In Exam Reviewer Management System 1.0, an authenticated attacker can upload a web-shell php file in profile page to achieve Remote Code Execution (RCE).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40352 β€Ό

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_traveller.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41570 β€Ό

An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Unauthenticated SQL injection can occur.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40353 β€Ό

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/up_booking.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40817 β€Ό

Zammad 5.2.1 has a fine-grained permission model that allows to configure read-only access to tickets. However, agents were still wrongly able to perform some operations on such tickets, like adding and removing links, tags. and related answers. This issue has been fixed in 5.2.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31367 β€Ό

Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40816 β€Ό

Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40354 β€Ό

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_booking.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40877 β€Ό

Exam Reviewer Management System 1.0 is vulnerable to SQL Injection via the Γ’β‚¬ΛœidÒ€ℒ parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23006 β€Ό

A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37193 β€Ό

Chipolo ONE Bluetooth tracker (2020) Chipolo iOS app version 4.13.0 is vulnerable to Incorrect Access Control. Chipolo devices suffer from access revocation evasion attacks once the malicious sharee obtains the access credentials.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Infosec Partners announces new XZERO Early Warning System πŸ“’

New cyberattack detection service serves up real-time information on suspect activity and advance notice of imminent security incidents

πŸ“– Read

via "ITPro".
πŸ“’ FARGO ransomware targets vulnerable Microsoft SQL servers in new wave of attacks πŸ“’

Victims who don't pay the ransom risk having their stolen files exposed on the threat actor's Telegram channel

πŸ“– Read

via "ITPro".
πŸ“’ Australia looks to amend privacy rules following Optus data breach πŸ“’

The breach is currently being investigated by the Australian Federal Police

πŸ“– Read

via "ITPro".
πŸ“’ Vectra appoints Nuvias Group as sole UK distributor πŸ“’

The AI-based threat detection and response provider will leverage Nuvias’ 1,600-strong UK partner network

πŸ“– Read

via "ITPro".
πŸ“’ CIO Priorities: 2020 vs 2023 πŸ“’

Zero Trust, SaaS Security, and its impact on SD-WAN being a priority

πŸ“– Read

via "ITPro".