πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-3333 β€Ό

A vulnerability, which was classified as problematic, was found in Zephyr Project Manager up to 3.2.4. Affected is an unknown function of the file /v1/tasks/create/ of the component REST Call Handler. The manipulation of the argument onanimationstart leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.2.5 is able to address this issue. It is recommended to upgrade the affected component. VDB-209370 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3332 β€Ό

A vulnerability classified as critical has been found in SourceCodester Food Ordering Management System. This affects an unknown part of the file router.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-209583.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3348 β€Ό

Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.

πŸ“– Read

via "National Vulnerability Database".
⚠ WhatsApp β€œzero-day exploit” news scare – what you need to know ⚠

Is WhatsApp currently under active attack by cyercriminals? Is this a clear and current danger? How worried should WhatsApp users be?

πŸ“– Read

via "Naked Security".
πŸ•΄ Jamf Announces Intent to Acquire ZecOps, to Provide a Market-Leading Security Solution for Mobile Devices as Targeted Attacks Continue to Grow πŸ•΄

ZecOps extends Jamf's mobile security capabilities by adding advanced detections and incident response.

πŸ“– Read

via "Dark Reading".
⚠ Optus breach – Aussie telco told it will have to pay to replace IDs ⚠

Licence compromised? Passport number burned? Need a new one? Who's going to pay?

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-40486 β€Ό

TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3349 β€Ό

A vulnerability was found in Sony PS4 and PS5. It has been classified as critical. This affects the function UVFAT_readupcasetable of the component exFAT Handler. The manipulation of the argument dataLength leads to heap-based buffer overflow. It is possible to launch the attack on the physical device. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-209679.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2760 β€Ό

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Rancher stored secrets in plaintext, exposed Kubernetes clusters to takeover πŸ—“οΈ

Maintainers patch vulnerability and offer mitigation advice over bug that affects all Kubernetes objects

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Illumio Introduces New Solution to Stop Endpoint Ransomware from Spreading Across the Hybrid Attack Surface πŸ•΄

Illumio Endpoint extends zero trust segmentation to see risk and set policy across macOS and Windows devices.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Vulnerability in Apache Pulsar allowed manipulator-in-the-middle attacks πŸ—“οΈ

Clients vulnerable due to improper certificate validation

πŸ“– Read

via "The Daily Swig".
πŸ›  nfstream 6.5.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Suricata IDPE 6.0.8 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-40083 β€Ό

Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22524 β€Ό

In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 an unauthenticated remote attacker could utilize a SQL-Injection vulnerability to gain full database access, modify users and stop services .

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22522 β€Ό

In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 a remote, unauthenticated attacker could make use of hard-coded credentials to gain full access to the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40912 β€Ό

ETAP Lighting International NV ETAP Safety Manager 1.0.0.32 is vulnerable to Cross Site Scripting (XSS). Input passed to the GET parameter 'action' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22523 β€Ό

An improper authentication vulnerability exists in the Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 Web-App which allows an authentication bypass to the context of an unauthorised user if free-access is disabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28816 β€Ό

In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 the Sentilo Proxy is prone to reflected XSS which only affects the Sentilo service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40082 β€Ό

Hertz v0.3.0 ws discovered to contain a path traversal vulnerability via the normalizePath function.

πŸ“– Read

via "National Vulnerability Database".