πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-45146 β€Ό

An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ #BeCyberSmart All Year Round With Educational Resources From Microsoft πŸ•΄

Improved cyber hygiene keeps users and their identities, devices, and data more secure and reduces the organization’s risk exposure.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Better Together: Why It's Time for Ops and Security to Converge πŸ•΄

Threat actors are becoming only more sophisticated and determined.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ A Third of Global Organizations Were Breached Over Seven Times in the Past Year πŸ•΄

Cyber Risk Index report highlights elevated risk as organizations struggle with visibility.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-3861 β€Ό

The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ BlueVoyant Research Reveals Private Equity Portfolio Company Cybersecurity Challenges πŸ•΄

New study identifies critical focus areas for portfolio companies to reduce cyber risks and costs associated with breaches.

πŸ“– Read

via "Dark Reading".
⚠ How social media scammers buy time to steal your 2FA codes ⚠

The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-45017 β€Ό

A cross-site scripting (XSS) vulnerability in the Overview Page settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Loop field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45012 β€Ό

A cross-site scripting (XSS) vulnerability in the Modify Page module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Source field.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-38148 β€Ό

Silverstripe silverstripe/framework through 4.11 allows SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45016 β€Ό

A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Footer field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40129 β€Ό

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing Optional Content Group API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44167 β€Ό

Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38097 β€Ό

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40470 β€Ό

Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45015 β€Ό

A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Footer field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4096 β€Ό

Server-Side Request Forgery (SSRF) in GitHub repository appsmithorg/appsmith prior to 1.8.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38146 β€Ό

Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44158 β€Ό

Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via function via set_device_name.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44156 β€Ό

Tenda AC15 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetIpMacBind.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45013 β€Ό

A cross-site scripting (XSS) vulnerability in the Show Advanced Option module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Section Header field.

πŸ“– Read

via "National Vulnerability Database".