πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-38053 β€Ό

Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41036, CVE-2022-41037, CVE-2022-41038.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38048 β€Ό

Microsoft Office Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37973 β€Ό

Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38049 β€Ό

Microsoft Office Graphics Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37965 β€Ό

Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41043 β€Ό

Microsoft Office Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3453 β€Ό

A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /transcation.php. The manipulation of the argument buyer_name leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-210437 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38047 β€Ό

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-41081.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22035 β€Ό

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38046 β€Ό

Web Account Manager Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34689 β€Ό

Windows CryptoAPI Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37609 β€Ό

Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37599 β€Ό

A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39296 β€Ό

MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37983 β€Ό

Microsoft DWM Core Library Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37975 β€Ό

Windows Group Policy Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38041 β€Ό

Windows Secure Channel Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Microsoft Patch Tuesday, October 2022 Edition β™ŸοΈ

Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited. However, noticeably absent from this month's Patch Tuesday are any updates to address a pair of zero-day flaws being exploited this past month in Microsoft Exchange Server.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched πŸ•΄

The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2022-41173 β€Ό

Due to lack of proper memory management, when a victim opens manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41183 β€Ό

Due to lack of proper memory management, when a victim opens manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.

πŸ“– Read

via "National Vulnerability Database".