πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-28748 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38120 β€Ό

UPSMON PROÒ€ℒs has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to bypass authentication and access arbitrary system files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45196 β€Ό

Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34666 β€Ό

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37345 β€Ό

Improper authentication in BIOS firmware[A1] for some Intel(R) NUC Kits before version RY0386 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3957 β€Ό

A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28611 β€Ό

Improper input validation in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40750 β€Ό

IBM WebSphere Application Server 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236588.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36377 β€Ό

Incorrect default permissions in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36789 β€Ό

Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38099 β€Ό

Improper input validation in BIOS firmware for some Intel(R) NUC 11 Compute Elements before version EBTGL357.0065 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36938 β€Ό

DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
⚠ Dangerous SIM-swap lockscreen bypass – update Android now! ⚠

A bit like leaving the front door keys under the doormat...

πŸ“– Read

via "Naked Security".
πŸ‘2
πŸ•΄ Quantum Cryptography Apocalypse: A Timeline and Action Plan πŸ•΄

Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Avatier Achieves ISO 27001 Certification for its Information Security Management System πŸ•΄

Designation recognizes highest caliber of information security.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Privacy4Cars Secures Fourth Patent to Remove Privacy Information From Vehicles and Create Compliance Logs πŸ•΄

Data-deletion service's patent covers removing personal information such as geolocation, biometrics, and phone records from a vehicle by using a user-computing device

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ—“οΈ All Day DevOps: Third of Log4j downloads still pull vulnerable version despite threat of supply chain attacks πŸ—“οΈ

AppSec engineer keynote says Log4j revealed lessons were not learned from the Equifax breach

πŸ“– Read

via "The Daily Swig".
⚠ β€œGucci Master” business email scammer Hushpuppi gets 11 years ⚠

Learn how to protect yourself from big-money tricksters like the Hushpuppis of the world...

πŸ“– Read

via "Naked Security".
πŸ•΄ Unpatched Zimbra Platforms Are Probably Compromised, CISA Says πŸ•΄

Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Australia Declares War on Cybercrime Syndicates πŸ•΄

An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.

πŸ“– Read

via "Dark Reading".
🀯2πŸ‘1
πŸ•΄ Researchers Sound Alarm on Dangerous BatLoader Malware Dropper πŸ•΄

BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.

πŸ“– Read

via "Dark Reading".
πŸ‘1πŸ€”1