πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-43103 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parameter in the formSetQosBand function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43109 β€Ό

D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43104 β€Ό

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep107: Eight months to kick out the crooks and you think that’s GOOD? [Audio + Text] ⚠

Listen now - latest episode - audio plus full transcript

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2022-42753 β€Ό

SalonERP version 3.0.2 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the page parameter against XSS attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3258 β€Ό

Incorrect Permission Assignment for Critical Resource vulnerability in HYPR Workforce Access on Windows allows Authentication Abuse.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3852 β€Ό

The VR Calendar plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.3. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to delete, and modify calendars as well as the plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43372 β€Ό

Emlog Pro v1.7.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /admin/store.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42750 β€Ό

CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3675 β€Ό

Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora CoreOS releases have a misconfiguration which allows booting non-default OSTree deployments without entering a password. This allows someone with access to the GRUB menu to boot into an older version of Fedora CoreOS, reverting any security fixes that have recently been applied to the machine. A password is still required to modify kernel command-line arguments and to access the GRUB command line.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42751 β€Ό

CandidATS version 3.0.0 allows an external attacker to elevate privileges in the application. This is possible because the application suffers from CSRF. This allows to persuade an administrator to create a new account with administrative permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40131 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in a3rev Software Page View Count plugin <= 2.5.5 on WordPress allows an attacker to reset the plugin settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36404 β€Ό

Auth. (subscriber+) Broken Access Control vulnerability in David Cole Simple SEO plugin <= 1.8.12 on WordPress allows attackers to create or delete sitemap.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40276 β€Ό

Zettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43061 β€Ό

Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability in the component /operations/travellers.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41713 β€Ό

deep-object-diff version 1.1.0 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the '__proto__' property to be edited.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44862 β€Ό

Netskope client is impacted by a vulnerability where an authenticated, local attacker can view sensitive information stored in NSClient logs which should be restricted. The vulnerability exists because the sensitive information is not masked/scrubbed before writing in the logs. A malicious user can use the sensitive information to download data and impersonate another user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42745 β€Ό

CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42743 β€Ό

deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44628 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in JumpDEMAND Inc. 4ECPS Web Forms plugin <= 0.2.17 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44627 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple SEO plugin <= 1.8.12 on WordPress allows attackers to create or delete sitemaps.

πŸ“– Read

via "National Vulnerability Database".