πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-41669 β€Ό

A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34686 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn. Further investigation showed that it was not a vulnerability. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41670 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41671 β€Ό

A CWE-89: Improper Neutralization of Special Elements used in SQL Command (Γ’β‚¬ΛœSQL InjectionÒ€ℒ) vulnerability exists that allows adversaries with local user privileges to craft a malicious SQL query and execute as part of project migration which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).

πŸ“– Read

via "National Vulnerability Database".
⚠ The OpenSSL security update story – how can you tell what needs fixing? ⚠

How to Hack! Finding OpenSSL library files and accurately identifying their version numbers...

πŸ“– Read

via "Naked Security".
⚠ S3 Ep107: Eight months to kick out the crooks and you think that’s GOOD? [Audio + Text] ⚠

Listen now - latest episode - audio plus full transcript

πŸ“– Read

via "Naked Security".
⚠ Twitter Blue Badge email scams – Don’t fall for them! ⚠

That was the week that was...

πŸ“– Read

via "Naked Security".
πŸ‘2
β€Ό CVE-2022-27893 β€Ό

The Foundry Magritte plugin osisoft-pi-web-connector versions 0.15.0 - 0.43.0 was found to be logging in a manner that captured authentication requests. This vulnerability is resolved in osisoft-pi-web-connector version 0.44.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39432 β€Ό

diplib v3.0.0 is vulnerable to Double Free.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34055 β€Ό

jhead 3.06 is vulnerable to Buffer Overflow via exif.c in function Put16u.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39344 β€Ό

Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38660 β€Ό

HCL XPages applications are susceptible to a Cross Site Request Forgery (CSRF) vulnerability. An unauthenticated attacker could exploit this vulnerability to perform actions in the application on behalf of the logged in user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38654 β€Ό

HCL Domino is susceptible to an information disclosure vulnerability. In some scenarios, local calls made on the server to search the Domino directory will ignore xACL read restrictions. An authenticated attacker could leverage this vulnerability to access attributes from a user's person record.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3868 β€Ό

A vulnerability classified as critical has been found in SourceCodester Sanitization Management System. Affected is an unknown function of the file /php-sms/classes/Master.php?f=save_quote. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213012.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3869 β€Ό

Code Injection in GitHub repository froxlor/froxlor prior to 0.10.38.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-42905 β€Ό

In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42919 β€Ό

Python 3.9.x and 3.10.x through 3.10.8 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.4, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40284 β€Ό

A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37710 β€Ό

Patterson Dental Eaglesoft 21 has AES-256 encryption but there are two ways to obtain a keyfile: (1) keybackup.data > License > Encryption Key or (2) Eaglesoft.Server.Configuration.data > DbEncryptKeyPrimary > Encryption Key. Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3558 β€Ό

The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3494 β€Ό

The Complianz WordPress plugin before 6.3.4, and Complianz Premium WordPress plugin before 6.3.6 allow a translators to inject arbitrary SQL through an unsanitized translation. SQL can be injected through an infected translation file, or by a user with a translator role through translation plugins such as Loco Translate or WPML.

πŸ“– Read

via "National Vulnerability Database".