πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-41315 β€Ό

Auth. Stored Cross-Site Scripting (XSS) vulnerability in Ezoic plugin <= 2.8.8 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28768 β€Ό

The Zoom Client for Meetings Installer for macOS (Standard and for IT Admin) before version 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41791 β€Ό

Auth. (subscriber+) CSV Injection vulnerability in ProfileGrid plugin <= 5.1.6 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45069 β€Ό

Auth. (contributor+) Privilege Escalation vulnerability in Crowdsignal Dashboard plugin <= 3.0.9 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44591 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anthologize plugin <= 0.8.0 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43096 β€Ό

Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via the UART port.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39181 β€Ό

GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43506 β€Ό

SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42533 β€Ό

In shared_metadata_init of SharedMetadata.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239415718References: N/A

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Ibexa DXP patched for GraphQL password hash leak vulnerability πŸ—“οΈ

Organizations advised to mandate password resets out of caution

πŸ“– Read

via "The Daily Swig".
πŸ•΄ The Next Generation of Supply Chain Attacks Is Here to Stay πŸ•΄

With the proliferation of interconnected third-party applications, new strategies are needed to close the security gap.

πŸ“– Read

via "Dark Reading".
πŸ•΄ County of Tehama, Calif., Identifies and Addresses Data Security Incident πŸ•΄

The county reports unauthorized access to files in its Department of Social Services' systems between Nov. 18, 2021, and April 9. It has added enhanced alert and monitoring software and is offering complimentary credit monitoring and identity theft protection services to those whose personal information may have been compromised in the breach.

πŸ“– Read

via "Dark Reading".
⚠ Black Friday and retail season – watch out for PayPal β€œmoney request” scams ⚠

Don't let a keen eye for bargains lead you into risky online behaviour...

πŸ“– Read

via "Naked Security".
πŸ‘1
⚠ S3 Ep109: How one leaked email password could drain your business [Audio + Transcript] ⚠

Latest episode - listen now! Cybersecurity news plus loads of great advice...

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2022-45471 β€Ό

In JetBrains Hub before 2022.3.15181 Throttling was missed when sending emails to a particular email address

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Palo Alto Networks Focuses on Secure Coding with $195M Cider Deal πŸ•΄

PAN plans to add Cider's CI/CD security platform to its Prisma Cloud suite of AppSec tools.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Secure Offboarding in the Spotlight as Tech Layoffs Mount πŸ•΄

A secure-by-design culture is needed to develop a comprehensive offboarding and identity management strategy that limits potential for broader compromise in case of unauthorized access.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45474 β€Ό

drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45473 β€Ό

In drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44378 β€Ό

Automotive Shop Management System v1.0 is vulnerable to SQL via /asms/classes/Master.php?f=delete_mechanic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44204 β€Ό

D-Link DIR3060 DIR3060A1_FW111B04.bin is vulnerable to Buffer Overflow.

πŸ“– Read

via "National Vulnerability Database".