๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2022-36784 โ€ผ

Elsight รขโ‚ฌโ€œ Elsight Halo Remote Code Execution (RCE) Elsight Halo web panel allows us to perform connection validation. through the POST request : /api/v1/nics/wifi/wlan0/ping we can abuse DESTINATION parameter and leverage it to remote code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-36357 โ€ผ

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ULTIMATE TABLES plugin <= 1.6.5 on WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-23748 โ€ผ

mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-36787 โ€ผ

Webvendome - Webvendome SQL Injection. SQL Injection in the Parameter " DocNumber" Request : Get Request : /webvendome/showfiles.aspx?jobnumber=nullDoc Number=HERE.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-41775 โ€ผ

SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-28766 โ€ผ

Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-20460 โ€ผ

In (TBD) mprot_unmap? of (TBD), there is a possible way to corrupt the memory mapping due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239557547References: N/A

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-36905 โ€ผ

Multiple Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in Quiz And Survey Master plugin <= 7.3.4 on WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-43332 โ€ผ

A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Site title field of the Configuration Panel.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-43447 โ€ผ

SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-41315 โ€ผ

Auth. Stored Cross-Site Scripting (XSS) vulnerability in Ezoic plugin <= 2.8.8 on WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-28768 โ€ผ

The Zoom Client for Meetings Installer for macOS (Standard and for IT Admin) before version 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to root.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-41791 โ€ผ

Auth. (subscriber+) CSV Injection vulnerability in ProfileGrid plugin <= 5.1.6 on WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-45069 โ€ผ

Auth. (contributor+) Privilege Escalation vulnerability in Crowdsignal Dashboard plugin <= 3.0.9 on WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-44591 โ€ผ

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anthologize plugin <= 0.8.0 on WordPress.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-43096 โ€ผ

Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via the UART port.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-39181 โ€ผ

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-43506 โ€ผ

SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-42533 โ€ผ

In shared_metadata_init of SharedMetadata.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239415718References: N/A

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ—“๏ธ Ibexa DXP patched for GraphQL password hash leak vulnerability ๐Ÿ—“๏ธ

Organizations advised to mandate password resets out of caution

๐Ÿ“– Read

via "The Daily Swig".
๐Ÿ•ด The Next Generation of Supply Chain Attacks Is Here to Stay ๐Ÿ•ด

With the proliferation of interconnected third-party applications, new strategies are needed to close the security gap.

๐Ÿ“– Read

via "Dark Reading".