πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-42706 β€Ό

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34881 β€Ό

Generation of Error Message Containing Sensitive Information vulnerability in Hitachi JP1/Automatic Operation allows local users to gain sensitive information. This issue affects JP1/Automatic Operation: from 10-00 through 10-54-03, from 11-00 before 11-51-09, from 12-00 before 12-60-01.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25912 β€Ό

The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2022-40603 β€Ό

A cross-site scripting (XSS) vulnerability in the CGI program of Zyxel ZyWALL/USG series firmware versions 4.30 through 4.72, VPN series firmware versions 4.30 through 5.31, USG FLEX series firmware versions 4.50 through 5.31, and ATP series firmware versions 4.32 through 5.31, which could allow an attacker to trick a user into visiting a crafted URL with the XSS payload. Then, the attacker could gain access to some browser-based information if the malicious script is executed on the victimÒ€ℒs browser.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2022-24439 β€Ό

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2022-46151 β€Ό

Querybook is an open source data querying UI. In affected versions user provided data is not escaped in the error field of the auth callback url in `querybook/server/app/auth/oauth_auth.py` and `querybook/server/app/auth/okta_auth.py`. This may allow attackers to perform reflected cross site scripting (XSS) if Content Security Policy (CSP) is not enabled or `unsafe-inline` is allowed. Users are advised to upgrade to the latest, patched version of querybook (version 3.14.2 or greater). Users unable to upgrade may enable CSP and not allow unsafe-inline or manually escape query parameters in a reverse proxy.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘2πŸ”₯1
β€Ό CVE-2022-42761 β€Ό

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42779 β€Ό

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42771 β€Ό

In wlan driver, there is a race condition, This could lead to local denial of service in wlan services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39102 β€Ό

In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42764 β€Ό

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42769 β€Ό

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Machine Learning Models: A Dangerous New Attack Vector πŸ•΄

Threat actors can weaponize code within AI technology to gain initial network access, move laterally, deploy malware, steal data, or even poison an organization's supply chain.

πŸ“– Read

via "Dark Reading".
πŸ•΄ AlgoSec Acquires Prevasio To Disrupt Agentless Cloud Security Market πŸ•΄

Organizations of all sizes can now protect their cloud-native applications easily and cost-effectively across containers and all other cloud assets.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Russian Actors Use Compromised Healthcare Networks Against Ukrainian Orgs πŸ•΄

Victims include at least 15 healthcare organizations, one Fortune 500 company, and other organizations in multiple countries, security vendor says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Applying the OODA Loop to Cybersecurity and Secure Access Service Edge πŸ•΄

Organizations can best defend themselves on the cyber battlefield by adopting a military-style defense.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Hardening Identities With Phish-Resistant MFA πŸ•΄

Extending multifactor authentication to include device identity assurance offers more authentication confidence than what multiple user-identity factors can by themselves.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Intellicene Brand Launches After Completion of Acquisition by Volaris Group πŸ•΄

Global security technology provider with 20+ years of experience embraces the next evolution of its business with refreshed brand and invigorated leadership.

πŸ“– Read

via "Dark Reading".
πŸ›  Faraday 4.3.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
πŸ›  GNUnet P2P Framework 0.19.0 πŸ› 

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-40209 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Xylus Themes WP Smart Import plugin <= 1.0.2 on WordPress.

πŸ“– Read

via "National Vulnerability Database".