πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-28763 β€Ό

The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41772 β€Ό

Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41657 β€Ό

Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42923 β€Ό

Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'id' parameter in the 'appCore/index.php?r=adm/mediagallery/delete' function in order to dump the entire database or delete all contents from the 'core_user_file' table.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40287 β€Ό

The application was found to be vulnerable to an authenticated Stored Cross-Site Scripting (XSS) vulnerability in messaging functionality, leading to privilege escalation or a compromise of a targeted account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40294 β€Ό

The application was identified to have an CSV injection in data export functionality, allowing for malicious code to be embedded within export data and then triggered in exported data viewers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42924 β€Ό

Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'dyn_filter' parameter in the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function in order to dump the entire database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3783 β€Ό

A vulnerability, which was classified as problematic, has been found in node-red-dashboard. This issue affects some unknown processing of the file components/ui-component/ui-component-ctrl.js of the component ui_text Format Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9305d1a82f19b235dfad24a7d1dd4ed244db7743. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212555.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40290 β€Ό

The application was vulnerable to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in the barcode generation functionality, allowing attackers to generate an unsafe link that could compromise users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41681 β€Ό

There is a vulnerability on Forma LMS version 3.1.0 and earlier that could allow an authenticated attacker (with the role of student) to privilege escalate in order to upload a Zip file through the SCORM importer feature. The exploitation of this vulnerability could lead to a remote code injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41679 β€Ό

Forma LMS version 3.1.0 and earlier are affected by an Cross-Site scripting vulnerability, that could allow a remote attacker to inject javascript code on the Ò€œback_urlҀ� parameter in appLms/index.php?modname=faq&op=play function. The exploitation of this vulnerability could allow an attacker to steal the user´s cookies in order to log in to the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40190 β€Ό

SAUTER Controls moduWeb firmware version 2.7.1 is vulnerable to reflective cross-site scripting (XSS). The web application does not adequately sanitize request strings of malicious JavaScript. An attacker utilizing XSS could then execute malicious code in usersÒ€ℒ browsers and steal sensitive information, including user credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3784 β€Ό

A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212563.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3785 β€Ό

A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212564.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40291 β€Ό

The application was vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing an attacker to coerce users into sending malicious requests to the site to delete their account, or in rare circumstances, hijack their account and create other admin accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41680 β€Ό

Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'search[value] parameter in the appLms/ajax.server.php?r=mycertificate/getMyCertificates' function in order to dump the entire database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43752 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42925 β€Ό

There is a vulnerability on Forma LMS version 3.1.0 and earlier that could allow an authenticated attacker (with the role of student) to privilege escalate in order to upload a Zip file through the plugin upload component. The exploitation of this vulnerability could lead to a remote code injection.

πŸ“– Read

via "National Vulnerability Database".
⚠ Psychotherapy extortion suspect: arrest warrant issued ⚠

Wanted! Not only the extortionist who abused the data, but also the CEO who let it happen.

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2021-27784 β€Ό

The provided HCL Launch Container images contain non-unique HTTPS certificates and a database encryption key. The fix provides directions and tools to replace the non-unique keys and certificates. This does not affect the standard installer packages.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Australia's Department of Defence becomes latest victim of regional ransomware attacks πŸ“’

Military information was not stolen in the breach, which may affect the records of 40,000 defence personnel

πŸ“– Read

via "ITPro".
πŸ‘1