πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-38048 β€Ό

Microsoft Office Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37973 β€Ό

Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38049 β€Ό

Microsoft Office Graphics Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37965 β€Ό

Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41043 β€Ό

Microsoft Office Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3453 β€Ό

A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /transcation.php. The manipulation of the argument buyer_name leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-210437 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38047 β€Ό

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-41081.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22035 β€Ό

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38046 β€Ό

Web Account Manager Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34689 β€Ό

Windows CryptoAPI Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37609 β€Ό

Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37599 β€Ό

A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39296 β€Ό

MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37983 β€Ό

Microsoft DWM Core Library Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37975 β€Ό

Windows Group Policy Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38041 β€Ό

Windows Secure Channel Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Microsoft Patch Tuesday, October 2022 Edition β™ŸοΈ

Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited. However, noticeably absent from this month's Patch Tuesday are any updates to address a pair of zero-day flaws being exploited this past month in Microsoft Exchange Server.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched πŸ•΄

The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2022-41173 β€Ό

Due to lack of proper memory management, when a victim opens manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41183 β€Ό

Due to lack of proper memory management, when a victim opens manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39013 β€Ό

Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the attacker to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1