πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S3 Ep111: The business risk of a sleazy β€œnudity unfilter” [Audio + Text] ⚠

Latest episode - listen now (or read if you prefer)...

πŸ“– Read

via "Naked Security".
⚠ LastPass admits to customer data breach caused by previous breach ⚠

Seems that the developer account that the crooks breached last time gave indirect access to customer data this time round.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-45562 β€Ό

Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44928 β€Ό

D-Link DVG-G5402SP GE_1.03 was discovered to contain a command injection vulnerability via the Maintenance function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43325 β€Ό

An unauthenticated command injection vulnerability in the product license validation function of Telos Alliance Omnia MPX Node 1.3.* - 1.4.* allows attackers to execute arbitrary commands via a crafted payload injected into the license input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44929 β€Ό

An access control issue in D-Link DVG-G5402SP GE_1.03 allows unauthenticated attackers to escalate privileges via arbitrarily editing VoIP SIB profiles.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44930 β€Ό

D-Link DHP-W310AV 3.10EU was discovered to contain a command injection vulnerability via the System Checks function.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Go SAML library vulnerable to authentication bypass πŸ—“οΈ

An attacker could masquerade as an authenticated user without presenting credentials

πŸ“– Read

via "The Daily Swig".
πŸ•΄ AWS Unveils Amazon Security Lake at re:Invent 2022 πŸ•΄

Amazon Security Lake will allow organizations to create a purpose-built, standards-based data lake to aggregate and store security data.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-2808 β€Ό

Algan YazΓƒβ€žΓ‚Β±lΓƒβ€žΓ‚Β±m Prens Student Information System product has an authenticated Insecure Direct Object Reference (IDOR) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2807 β€Ό

Algan YazΓƒβ€žΓ‚Β±lΓƒβ€žΓ‚Β±m Prens Student Information System product has an unauthenticated SQL Injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4270 β€Ό

Incorrect privilege assignment issue in M-Files Web in M-Files Web versions before 22.5.11436.1 could have changed permissions accidentally.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46366 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A Risky Business: Choosing the Right Methodology πŸ•΄

Rather than regarding risk assessment as a negative exercise, consider it one that benefits your organization's aims, and then translate the risk level to its impact on operations, reputation, or finances.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SOC Turns to Homegrown Machine Learning to Catch Cyber-Intruders πŸ•΄

A do-it-yourself machine-learning system helped a French bank detect three types of exfiltration attacks missed by current rules-based systems, attendees will learn at Black Hat Europe.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45482 β€Ό

Lazy Mouse server enforces weak password requirements and doesn't implement rate limiting, allowing remote unauthenticated users to easily and quickly brute force the PIN and execute arbitrary commands. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45480 β€Ό

PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45215 β€Ό

A cross-site scripting (XSS) vulnerability in Book Store Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the Add New System User module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4271 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository osticket/osticket prior to 1.16.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45483 β€Ό

Lazy Mouse allows an attacker (in a man in the middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43272 β€Ό

DCMTK v3.6.7 was discovered to contain a memory leak via the T_ASC_Association object.

πŸ“– Read

via "National Vulnerability Database".