πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-46338 β€Ό

g810-led 0.4.2, a LED configuration tool for Logitech Gx10 keyboards, contained a udev rule to make supported device nodes world-readable and writable, allowing any process on the system to read traffic from keyboards, including sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4228 β€Ό

A vulnerability classified as problematic has been found in SourceCodester Book Store Management System 1.0. This affects an unknown part of the file /bsms_ci/index.php/user/edit_user/. The manipulation of the argument password leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214587.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4229 β€Ό

A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4232 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. Affected is an unknown function. The manipulation of the argument cmd leads to unrestricted upload. It is possible to launch the attack remotely. VDB-214590 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4233 β€Ό

A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /event/admin/?page=user/list. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-214591.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4231 β€Ό

A vulnerability, which was classified as problematic, has been found in Tribal Systems Zenario CMS 9.3.57595. This issue affects some unknown processing of the component Remember Me Handler. The manipulation leads to session fixiation. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214589 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Tailscale VPN nodes vulnerable to DNS rebinding, RCE πŸ—“οΈ

Users should manually update to the latest version now

πŸ“– Read

via "The Daily Swig".
πŸ•΄ CyberRatings.org Revives NSS Labs Research πŸ•΄

The NSS Labs archive, available with free registration, consists of over 800 test reports, analyst briefs, and research published by NSS Labs from 2013 β€” 2020.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Delinea Introduces Granular Privileged Access Controls on Servers πŸ•΄

New functionality further reduces the risk of lateral movement.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Identity Digital Releases Its First DNS Anti-Abuse Report πŸ•΄

The quarterly report, made possible by its Dynamic Defenseβ„’ service, demonstrates significant progress in mitigating domain abuse among its top-level domains (TLDs).

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Evolution of Business Email Compromise πŸ•΄

The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.

πŸ“– Read

via "Dark Reading".
πŸ•΄ API Secrets: Where the Bearer Model Breaks Down πŸ•΄

Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24441 β€Ό

The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as Γ’β‚¬ΛœtrustedÒ€ℒ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22984 β€Ό

The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26366 β€Ό

Cross-Site Request Forgery (CSRF) in AdRotate Banner Manager Plugin <= 5.9 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38801 β€Ό

In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38803 β€Ό

Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38802 β€Ό

Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45842 β€Ό

Unauth. Race Condition vulnerability in WP ULike Plugin <= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4242 β€Ό

A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214592.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ SPHERE Receives $31M for Series B Funding From Edison Partners, Forgepoint Capital πŸ•΄

New investment will accelerate growth and expansion of SaaS identity-hygiene platform.

πŸ“– Read

via "Dark Reading".
πŸ‘1