πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-43105 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the shareSpeed parameter in the fromSetWifiGusetBasic function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44623 β€Ό

In JetBrains TeamCity version before 2022.10, Project Viewer could see scrambled secure values in the MetaRunner settings

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43101 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43108 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43107 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the time parameter in the setSmartPowerManagement function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39262 β€Ό

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44646 β€Ό

In JetBrains TeamCity version before 2022.10, no audit items were added upon editing a user's settings

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39276 β€Ό

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44624 β€Ό

In JetBrains TeamCity version before 2022.10, Password parameters could be exposed in the build log if they contained special characters

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39382 β€Ό

Keystone is a headless CMS for Node.js Ò€” built with GraphQL and React.`@keystone-6/core@3.0.0 || 3.0.1` users that use `NODE_ENV` to trigger security-sensitive functionality in their production builds are vulnerable to `NODE_ENV` being inlined to `"development"` for user code, irrespective of what your environment variables. If you do not use `NODE_ENV` in your user code to trigger security-sensitive functionality, you are not impacted by this vulnerability. Any dependencies that use `NODE_ENV` to trigger particular behaviors (optimizations, security or otherwise) should still respect your environment's configured `NODE_ENV` variable. The application's dependencies, as found in `node_modules` (including `@keystone-6/core`), are typically not compiled as part of this process, and thus should be unaffected. We have tested this assumption by verifying that `NODE_ENV=production yarn keystone start` still uses secure cookies when using `statelessSessions`. This vulnerability has been fixed in @keystone-6/core@3.0.2, regression tests have been added for this vulnerability in #8063.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43103 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parameter in the formSetQosBand function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43109 β€Ό

D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43104 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep107: Eight months to kick out the crooks and you think that’s GOOD? [Audio + Text] ⚠

Listen now - latest episode - audio plus full transcript

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2022-42753 β€Ό

SalonERP version 3.0.2 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the page parameter against XSS attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3258 β€Ό

Incorrect Permission Assignment for Critical Resource vulnerability in HYPR Workforce Access on Windows allows Authentication Abuse.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3852 β€Ό

The VR Calendar plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.3. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to delete, and modify calendars as well as the plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43372 β€Ό

Emlog Pro v1.7.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /admin/store.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42750 β€Ό

CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3675 β€Ό

Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora CoreOS releases have a misconfiguration which allows booting non-default OSTree deployments without entering a password. This allows someone with access to the GRUB menu to boot into an older version of Fedora CoreOS, reverting any security fixes that have recently been applied to the machine. A password is still required to modify kernel command-line arguments and to access the GRUB command line.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42751 β€Ό

CandidATS version 3.0.0 allows an external attacker to elevate privileges in the application. This is possible because the application suffers from CSRF. This allows to persuade an administrator to create a new account with administrative permissions.

πŸ“– Read

via "National Vulnerability Database".