πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-41735 β€Ό

IBM Business Process Manager 21.0.1 through 21.0.3.1, 20.0.0.1 through 20.0.0.2 19.0.0.1 through 19.0.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 65687.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44361 β€Ό

An issue was discovered in ZZCMS 2022. There is a cross-site scripting (XSS) vulnerability in admin/ad_list.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44371 β€Ό

hope-boot 1.0.0 has a deserialization vulnerability that can cause Remote Code Execution (RCE).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 4 Arrested for Filing Fake Tax Returns With Stolen Data πŸ•΄

Cybercrooks allegedly stole personal data, used it to file IRS tax documents, and routed refunds to bank accounts under their control.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45550 β€Ό

AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46770 β€Ό

qubes-mirage-firewall (aka Mirage firewall for QubesOS) 0.8.x through 0.8.3 allows guest OS users to cause a denial of service (CPU consumption and loss of forwarding) via a crafted multicast UDP packet (IP address range of 224.0.0.0 through 239.255.255.255).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44373 β€Ό

A stack overflow vulnerability exists in TrendNet Wireless AC Easy-Upgrader TEW-820AP (Version v1.0R, firmware version 1.01.B01) which may result in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44351 β€Ό

Skycaiji v2.5.1 was discovered to contain a deserialization vulnerability via /SkycaijiApp/admin/controller/Mystore.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Key Security Announcements From AWS re:Invent 2022 πŸ•΄

At AWS re:Invent last week, the cloud giant previewed security services including Amazon Security Lake for security telemetry, Verified Permissions for developers, and a VPN bypass service.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Fraudsters Siphon $360M from Retailers Using 50M Fake Shoppers πŸ•΄

Cyberattackers focused on ad fraud and clickjacking stole millions during Black Friday by hijacking shopper accounts and tying up transactions.

πŸ“– Read

via "Dark Reading".
πŸ€”1
β€Ό CVE-2022-23487 β€Ό

js-libp2p is the official javascript Implementation of libp2p networking stack. Versions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2pÒ€ℒs connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the hostÒ€ℒs operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to update their js-libp2p dependency to `v0.38.0` or greater. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4341 β€Ό

A vulnerability has been found in csliuwy coder-chain_gdut and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /back/index.php/user/User/?1. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215095.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23491 β€Ό

Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23486 β€Ό

libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.45.1 an attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victimÒ€ℒs process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network. Users are advised to upgrade to `libp2p` `v0.45.1` or above. Users unable to upgrade should reference the DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor their application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23492 β€Ό

go-libp2p is the offical libp2p implementation in the Go programming language. Version `0.18.0` and older of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2pÒ€ℒs connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the hostÒ€ℒs operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to upgrade their version of go-libp2p to version `0.18.1` or newer. Users unable to upgrade may consult the denial of service (dos) mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23476 β€Ό

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4349 β€Ό

A vulnerability classified as problematic has been found in CTF-hacker pwn. This affects an unknown part of the file delete.html. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-215109 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46792 β€Ό

Hasura GraphQL Engine before 2.15.2 mishandles row-level authorization in the Update Many API for Postgres backends. The fixed versions are 2.10.2, 2.11.3, 2.12.1, 2.13.2, 2.14.1, and 2.15.2. (Versions before 2.10.0 are unaffected.)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36609 β€Ό

A vulnerability was found in annyshow DuxCMS 2.1. It has been classified as problematic. This affects an unknown part of the file admin.php&r=article/AdminContent/edit of the component Article Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215115.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ NodeBB prototype pollution flaw could lead to account takeover πŸ—“οΈ

β€˜Not a prototype pollution vulnerability as you might normally understand it’

πŸ“– Read

via "The Daily Swig".
πŸ‘1
πŸ•΄ Where to Find the Best Open Source Security Technology πŸ•΄

A free resource, updated monthly, lists the most-popular, highly rated OSS projects.

πŸ“– Read

via "Dark Reading".
πŸ‘1