🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Major Security Breach From Business Users' Low-Code Apps Could Come in 2023, Analysts Warn 🕴

Here's what that means about our current state as an industry, and why we should be happy about it.

📖 Read

via "Dark Reading".
‼ CVE-2022-43117 ‼

Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Name, Username, Description and Site Feature parameters.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44174 ‼

Tenda AC18 V15.03.05.05 is vulnerable to Buffer Overflow via function formSetDeviceName.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44183 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44180 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function addWifiMacFilter.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44171 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function form_fast_setting_wifi_set.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-35897 ‼

An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44172 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function R7WebsSecurityHandler.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44830 ‼

Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-38755 ‼

A vulnerability has been identified in Micro Focus Filr in versions prior to 4.3.1.1. The vulnerability could be exploited to allow a remote unauthenticated attacker to enumerate valid users of the system. Remote unauthenticated user enumeration. This issue affects: Micro Focus Filr versions prior to 4.3.1.1.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-40746 ‼

IBM i Access Family 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.0 could allow a local authenticated attacker to execute arbitrary code on the system, caused by DLL search order hijacking vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236581.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45422 ‼

When LG SmartShare is installed, local privilege escalation is possible through DLL Hijacking attack. The LG ID is LVE-HOT-220005.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44178 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow. via function formWifiWpsOOB.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44177 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44175 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetMacFilterCfg.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44176 ‼

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function fromSetRouteStatic.

📖 Read

via "National Vulnerability Database".
🕴 Name That Toon: Fall Cleanup 🕴

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

📖 Read

via "Dark Reading".
🕴 Investors Are Pouring Cash Into These 10 Cybersecurity Startups 🕴

Following the dollars reveals pen-test and intrusion-detection startups are the most attractive to investors right now, collectively getting more than $3 billion in funding.

📖 Read

via "Dark Reading".
🕴 Luna Moth's Novel, Malware-Free Extortion Campaign Takes Flight 🕴

Luna Moth is relying solely on call-back phishing, as well as legitimate tools, to steal data and extract ransoms from victims of all stripes in an expanding cyberattack effort.

📖 Read

via "Dark Reading".
🕴 Google Releases YARA Rules to Disrupt Cobalt Strike Abuse 🕴

The popular pen-testing tool is often cracked and repurposed by threat actors. Google now has a plan to address that.

📖 Read

via "Dark Reading".
🕴 Microsoft Warns of Rise in Stolen Cloud Tokens Used to Bypass MFA 🕴

Analysts see an uptick in token theft from authenticated users, allowing threat actors to bypass MFA protections.

📖 Read

via "Dark Reading".