πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-36898 β€Ό

Auth. SQL Injection (SQLi) vulnerability in Quiz And Survey Master plugin <= 7.3.4 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3708 β€Ό

The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied via the 'url' parameter found via the /v1/hotlink/proxy REST API Endpoint. This made it possible for authenticated users to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43231 (canteen_management_system) β€Ό

Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/manage_website.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43232 (canteen_management_system) β€Ό

Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchOrderData.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3228 β€Ό

Using custom code, an attacker can write into name or description fields larger than the appropriate buffer size causing a stack-based buffer overflow on Host Engineering H0-ECOM100 Communications Module Firmware versions v5.0.155 and prior. This may allow an attacker to crash the affected device or cause it to become unresponsive.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3401 β€Ό

The Bricks theme for WordPress is vulnerable to remote code execution due to the theme allowing site editors to include executable code blocks in website content in versions 1.2 to 1.5.3. This, combined with the missing authorization vulnerability (CVE-2022-3400), makes it possible for authenticated attackers with minimal permissions, such as a subscriber, can edit any page, post, or template on the vulnerable WordPress website and inject a code execution block that can be used to achieve remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41636 β€Ό

Communication traffic involving "Ethernet Q Commands" service of Haas Controller version 100.20.000.1110 is transmitted in cleartext. This allows an attacker to obtain sensitive information being passed to and from the controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43228 (barangay_management_system) β€Ό

Barangay Management System v1.0 was discovered to contain a SQL injection vulnerability via the hidden_id parameter at /clearance/clearance.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43233 (canteen_management_system) β€Ό

Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchSelectedUser.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Cyber security engineer vs analyst: What's the difference? πŸ“’

We examine the differences between these two roles and the varying prospects for both career paths

πŸ“– Read

via "ITPro".
πŸ“’ The big book of ZTNA security use cases πŸ“’

Know your ZTNA protection index

πŸ“– Read

via "ITPro".
πŸ“’ Forrester: Autonomous β€˜set and forget security’ is β€œa pipe dream” πŸ“’

Leading analyst says the complexity of security will always outmatch automated systems, keeping human security a necessary expense

πŸ“– Read

via "ITPro".
πŸ“’ Australian patient data breached for months in country's latest major cyber incident πŸ“’

The pathology company claims to have carried out an investigation when it was hit with a cyber attack but didn’t find any evidence that information had been compromised

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Second-ever OpenSSL critical vulnerability teased, 10 years after Heartbleed πŸ“’

All OpenSSL versions beyond 3.0 are at risk, with more details due to be released alongside a patch on 1 November

πŸ“– Read

via "ITPro".
πŸ“’ Information security vs cyber security vs network security: What are the differences? πŸ“’

A guide to the essential differences between information, network, and cyber security and the basic tenets of each

πŸ“– Read

via "ITPro".
πŸ“’ See Tickets admits it took nine months to remove malicious code from site πŸ“’

Any customer who gave their details to the company for nearly three years could be at risk

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-3754 β€Ό

Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.8.

πŸ“– Read

via "National Vulnerability Database".
⚠ Updates to Apple’s zero-day update story – iPhone and iPad users read this! ⚠

Turns out that Tuesday's zero-day for iOS 16 is Friday's zero-day for iOS 15...

πŸ“– Read

via "Naked Security".
πŸ‘2
⚠ Chrome issues urgent zero-day fix – update now! ⚠

We've said it before/And we'll say it again/It's not *if* you should patch/It's a matter of *when*. (Hint: now!)

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3756 β€Ό

A vulnerability was found in Exiv2. It has been classified as critical. Affected is the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The name of the patch is bf4f28b727bdedbd7c88179c30d360e54568a62e. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212496.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42777 β€Ό

Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0, when Compilation Mode is used, allows an attacker to execute arbitrary C# code on any machine that renders a report, including the application server or a user's local machine, as demonstrated by System.Diagnostics.Process.Start.

πŸ“– Read

via "National Vulnerability Database".