πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-44096 β€Ό

Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45332 β€Ό

LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44097 β€Ό

Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45869 β€Ό

A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40265 β€Ό

Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version "65" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version "65" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3859 β€Ό

An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46338 β€Ό

g810-led 0.4.2, a LED configuration tool for Logitech Gx10 keyboards, contained a udev rule to make supported device nodes world-readable and writable, allowing any process on the system to read traffic from keyboards, including sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4228 β€Ό

A vulnerability classified as problematic has been found in SourceCodester Book Store Management System 1.0. This affects an unknown part of the file /bsms_ci/index.php/user/edit_user/. The manipulation of the argument password leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214587.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4229 β€Ό

A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4232 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. Affected is an unknown function. The manipulation of the argument cmd leads to unrestricted upload. It is possible to launch the attack remotely. VDB-214590 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4233 β€Ό

A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /event/admin/?page=user/list. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-214591.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4231 β€Ό

A vulnerability, which was classified as problematic, has been found in Tribal Systems Zenario CMS 9.3.57595. This issue affects some unknown processing of the component Remember Me Handler. The manipulation leads to session fixiation. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214589 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Tailscale VPN nodes vulnerable to DNS rebinding, RCE πŸ—“οΈ

Users should manually update to the latest version now

πŸ“– Read

via "The Daily Swig".
πŸ•΄ CyberRatings.org Revives NSS Labs Research πŸ•΄

The NSS Labs archive, available with free registration, consists of over 800 test reports, analyst briefs, and research published by NSS Labs from 2013 β€” 2020.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Delinea Introduces Granular Privileged Access Controls on Servers πŸ•΄

New functionality further reduces the risk of lateral movement.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Identity Digital Releases Its First DNS Anti-Abuse Report πŸ•΄

The quarterly report, made possible by its Dynamic Defenseβ„’ service, demonstrates significant progress in mitigating domain abuse among its top-level domains (TLDs).

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Evolution of Business Email Compromise πŸ•΄

The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.

πŸ“– Read

via "Dark Reading".
πŸ•΄ API Secrets: Where the Bearer Model Breaks Down πŸ•΄

Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24441 β€Ό

The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as Γ’β‚¬ΛœtrustedÒ€ℒ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22984 β€Ό

The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26366 β€Ό

Cross-Site Request Forgery (CSRF) in AdRotate Banner Manager Plugin <= 5.9 on WordPress.

πŸ“– Read

via "National Vulnerability Database".