πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-44295 β€Ό

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/orders/assign_team.php?id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46149 β€Ό

Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to out-of-bounds read due to logic error handling list-of-list. This issue may lead someone to remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type. Exfiltration of memory is possible if the victim performs additional certain actions on a list-of-pointer type. To be vulnerable, an application must perform a specific sequence of actions, described in the GitHub Security Advisory. The bug is present in inlined code, therefore the fix will require rebuilding dependent applications. Cap'n Proto has C++ fixes available in versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3. The `capnp` Rust crate has fixes available in versions 0.13.7, 0.14.11, and 0.15.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Clam AntiVirus Toolkit 1.0.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Suricata IDPE 6.0.9 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-23746 β€Ό

The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Nvidia GPU Driver Bugs Threaten Device Takeover & More πŸ•΄

If unpatched, a host of GPU Display Driver flaws could expose gamers, graphic designers, and others to code execution, denial of service, data tampering, and more.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2022-46156 β€Ό

The Synthetic Monitoring Agent for Grafana's Synthetic Monitoring application provides probe functionality and executes network checks for monitoring remote targets. Users running the Synthetic Monitoring agent prior to version 0.12.0 in their local network are impacted. The authentication token used to communicate with the Synthetic Monitoring API is exposed through a debugging endpoint. This token can be used to retrieve the Synthetic Monitoring checks created by the user and assigned to the agent identified with that token. The Synthetic Monitoring API will reject connections from already-connected agents, so access to the token does not guarantee access to the checks. Version 0.12.0 contains a fix. Users are advised to rotate the agent tokens. After upgrading to version v0.12.0 or later, it's recommended that users of distribution packages review the configuration stored in `/etc/synthetic-monitoring/synthetic-monitoring-agent.conf`, specifically the `API_TOKEN` variable which has been renamed to `SM_AGENT_API_TOKEN`. As a workaround for previous versions, it's recommended that users review the agent settings and set the HTTP listening address in a manner that limits the exposure, for example, localhost or a non-routed network, by using the command line parameter `-listen-address`, e.g. `-listen-address localhost:4050`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40204 β€Ό

A cross-site scripting (XSS) vulnerability exists in all current versions of Digital Alert Systems DASDEC software via the Host Header in undisclosed pages after login.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-18265 β€Ό

Digital Alert SystemsÒ€ℒ DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability that allows remote attackers to inject arbitrary web script or HTML via the SSH username, username field of the login page, or via the HTTP host header. The injected content is stored in logs and rendered when viewed in the web application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46162 β€Ό

discourse-bbcode is the official BBCode plugin for Discourse. Prior to commit 91478f5, CSS injection can occur when rendering content generated with the discourse-bccode plugin. This vulnerability only affects sites which have the discourse-bbcode plugin installed and enabled. This issue is patched in commit 91478f5. As a workaround, ensure that the Content Security Policy is enabled and monitor any posts that contain bbcode.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Podcast transcript: The front line of fraud tech πŸ“’

Read the full transcript for this episode of the IT Pro Podcast

πŸ“– Read

via "ITPro".
πŸ“’ Getting board-level buy-in for security strategy πŸ“’

Why cyber security needs to be a board-level issue

πŸ“– Read

via "ITPro".
πŸ“’ "Unacceptable" data scraping lands Meta a Β£228m data protection fine πŸ“’

The much-awaited decision follows the scraping of half a billion users' data and received unanimous approval from EU regulators

πŸ“– Read

via "ITPro".
πŸ“’ The IT Pro Podcast: The front line of fraud tech πŸ“’

With tools such as deepfakes, the future of fraud tech relies on cutting edge AI as much as good security practice

πŸ“– Read

via "ITPro".
πŸ“’ Hyundai vulnerability allowed remote hacking of locks, engine πŸ“’

Researchers discovered flaws in a number of apps linked to car brands that allowed for personal details and remote control of vehicles using easily-obtained IDs

πŸ“– Read

via "ITPro".
πŸ“’ The NFT bubble bursting means a brighter future for crypto assets πŸ“’

Sales slump as the market decides β€œno one wants a gorilla with a hat on”, but the downturn might give rise to a much brighter future for NFTs

πŸ“– Read

via "ITPro".
πŸ“’ Best free malware removal tools 2022 πŸ“’

Worried your device is infected? Here are some of the best free tools for removing malicious software from your systems

πŸ“– Read

via "ITPro".
πŸ•΄ CI Fuzz CLI Brings Fuzz Testing to Java Applications πŸ•΄

CI Fuzz CLI, the open source fuzzing tool with just three commands, integrates fuzz testing directly into the software development workflow.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45640 β€Ό

Tenda Tenda AC6V1.0 V15.03.05.19 is affected by buffer overflow. Causes a denial of service (local).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45045 β€Ό

Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker, possibly using the default admin:tlJwpbo6 credentials, can connect to port 34567 and execute arbitrary operating system commands via a crafted JSON file during an upgrade request. Since at least 2021, Xiongmai has applied patches to prevent attackers from using this mechanism to execute telnetd.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40849 β€Ό

ThinkCMF version 6.0.7 is affected by Stored Cross-Site Scripting (XSS). An attacker who successfully exploited this vulnerability could inject a Persistent XSS payload in the Slideshow Management section that execute arbitrary JavaScript code on the client side, e.g., to steal the administrator's PHP session token (PHPSESSID).

πŸ“– Read

via "National Vulnerability Database".