πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Startup OpsHelm Tackles Cloud Misconfigurations πŸ•΄

The company emerges from stealth with an automated security remediation product identifies and remediates cloud misconfigurations.

πŸ“– Read

via "Dark Reading".
πŸ‘4
β€Ό CVE-2022-4093 β€Ό

SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period. This affect 16.0.1 and 16.0.2 only. 16.0.0 or lower, and 16.0.3 or higher are not affected

πŸ“– Read

via "National Vulnerability Database".
πŸ‘4
β€Ό CVE-2022-4087 β€Ό

A vulnerability was found in iPXE. It has been declared as problematic. This vulnerability affects the function tls_new_ciphertext of the file src/net/tls.c of the component TLS. The manipulation of the argument pad_len leads to information exposure through discrepancy. The name of the patch is 186306d6199096b7a7c4b4574d4be8cdb8426729. It is recommended to apply a patch to fix this issue. VDB-214054 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3589 β€Ό

An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45146 β€Ό

An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ #BeCyberSmart All Year Round With Educational Resources From Microsoft πŸ•΄

Improved cyber hygiene keeps users and their identities, devices, and data more secure and reduces the organization’s risk exposure.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Better Together: Why It's Time for Ops and Security to Converge πŸ•΄

Threat actors are becoming only more sophisticated and determined.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ A Third of Global Organizations Were Breached Over Seven Times in the Past Year πŸ•΄

Cyber Risk Index report highlights elevated risk as organizations struggle with visibility.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-3861 β€Ό

The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ BlueVoyant Research Reveals Private Equity Portfolio Company Cybersecurity Challenges πŸ•΄

New study identifies critical focus areas for portfolio companies to reduce cyber risks and costs associated with breaches.

πŸ“– Read

via "Dark Reading".
⚠ How social media scammers buy time to steal your 2FA codes ⚠

The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-45017 β€Ό

A cross-site scripting (XSS) vulnerability in the Overview Page settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Loop field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45012 β€Ό

A cross-site scripting (XSS) vulnerability in the Modify Page module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Source field.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-38148 β€Ό

Silverstripe silverstripe/framework through 4.11 allows SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45016 β€Ό

A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Footer field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40129 β€Ό

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing Optional Content Group API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44167 β€Ό

Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38097 β€Ό

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40470 β€Ό

Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45015 β€Ό

A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Footer field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4096 β€Ό

Server-Side Request Forgery (SSRF) in GitHub repository appsmithorg/appsmith prior to 1.8.2.

πŸ“– Read

via "National Vulnerability Database".