πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-31678 β€Ό

VMware Cloud Foundation (NSX-V) contains an XML External Entity (XXE) vulnerability. On VCF 3.x instances with NSX-V deployed, this may allow a user to exploit this issue leading to a denial-of-service condition or unintended information disclosure.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-37913 β€Ό

Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33859 β€Ό

A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operationÒ€ℒs vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html .

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38397 β€Ό

Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37915 β€Ό

A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system leading to a complete system compromise of Aruba EdgeConnect Enterprise Orchestration with versions 9.1.x branch only, Any 9.1.x Orchestrator instantiated as a new machine with a release prior to 9.1.3.40197, Orchestrators upgraded to 9.1.x were not affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36206 β€Ό

All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep106: Facial recognition without consent – should it be banned? ⚠

Latest episode - listen (or read) now. Teachable moments for X-Ops professionals!

πŸ“– Read

via "Naked Security".
πŸ‘1
⚠ Updates to Apple’s zero-day update story – iPhone and iPad users read this! ⚠

Turns out that Tuesday's zero-day for iOS 16 is Friday's zero-day for iOS 15...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3322 β€Ό

Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3320 β€Ό

It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrative restrictions on a Zero Trust enrolled endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3321 β€Ό

It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3512 β€Ό

Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3337 β€Ό

It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Zed Attack Proxy 2.12.0 Cross Platform Package πŸ› 

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-3741 β€Ό

Impact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \n\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Upcoming β€˜critical’ OpenSSL update prompts feverish speculation πŸ—“οΈ

Is the new Heartbleed or just a bleeding distraction?

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2021-38737 β€Ό

SEMCMS v 1.1 is vulnerable to SQL Injection via Ant_Pro.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3018 β€Ό

An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 9.3 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 allows a project maintainer to access the DataDog integration API key from webhook logs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35388 β€Ό

Hospital Management System v 4.0 is vulnerable to Cross Site Scripting (XSS) via /hospital/hms/admin/patient-search.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37781 β€Ό

Employee Record Management System v 1.2 is vulnerable to Cross Site Scripting (XSS) via editempprofile.php.

πŸ“– Read

via "National Vulnerability Database".