πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Forrester: Autonomous β€˜set and forget security’ is β€œa pipe dream” πŸ“’

Leading analyst says the complexity of security will always outmatch automated systems, keeping human security a necessary expense

πŸ“– Read

via "ITPro".
πŸ“’ Australian patient data breached for months in country's latest major cyber incident πŸ“’

The pathology company claims to have carried out an investigation when it was hit with a cyber attack but didn’t find any evidence that information had been compromised

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Second-ever OpenSSL critical vulnerability teased, 10 years after Heartbleed πŸ“’

All OpenSSL versions beyond 3.0 are at risk, with more details due to be released alongside a patch on 1 November

πŸ“– Read

via "ITPro".
πŸ“’ Information security vs cyber security vs network security: What are the differences? πŸ“’

A guide to the essential differences between information, network, and cyber security and the basic tenets of each

πŸ“– Read

via "ITPro".
πŸ“’ See Tickets admits it took nine months to remove malicious code from site πŸ“’

Any customer who gave their details to the company for nearly three years could be at risk

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-3754 β€Ό

Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.8.

πŸ“– Read

via "National Vulnerability Database".
⚠ Updates to Apple’s zero-day update story – iPhone and iPad users read this! ⚠

Turns out that Tuesday's zero-day for iOS 16 is Friday's zero-day for iOS 15...

πŸ“– Read

via "Naked Security".
πŸ‘2
⚠ Chrome issues urgent zero-day fix – update now! ⚠

We've said it before/And we'll say it again/It's not *if* you should patch/It's a matter of *when*. (Hint: now!)

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3756 β€Ό

A vulnerability was found in Exiv2. It has been classified as critical. Affected is the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The name of the patch is bf4f28b727bdedbd7c88179c30d360e54568a62e. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212496.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42777 β€Ό

Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0, when Compilation Mode is used, allows an attacker to execute arbitrary C# code on any machine that renders a report, including the application server or a user's local machine, as demonstrated by System.Diagnostics.Process.Start.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3755 β€Ό

A vulnerability was found in Exiv2 and classified as problematic. This issue affects the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The name of the patch is 6bb956ad808590ce2321b9ddf6772974da27c4ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212495.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3757 β€Ό

A vulnerability was found in Exiv2. It has been declared as critical. Affected by this vulnerability is the function QuickTimeVideo::decodeBlock of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The name of the patch is d3651fdbd352cbaf259f89abf7557da343339378. It is recommended to apply a patch to fix this issue. The identifier VDB-212497 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42915 β€Ό

curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44033 β€Ό

An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44032 β€Ό

An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44019 β€Ό

In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44034 β€Ό

An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44020 β€Ό

An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44022 β€Ό

PwnDoc through 0.5.3 might allow remote attackers to identify valid user account names by leveraging response timings for authentication attempts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44023 β€Ό

PwnDoc through 0.5.3 might allow remote attackers to identify disabled user account names by leveraging response timings for authentication attempts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3766 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.8.

πŸ“– Read

via "National Vulnerability Database".