🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Phishing in the Cloud: We're Gonna Need a Bigger Boat 🕴

SasS security is everyone's problem.

📖 Read

via "Dark Reading".
🕴 Interpres Security Emerges from Stealth to Help Companies to Optimize Security Performance 🕴

Startup raises $8.5 million in seed funding led by Ten Eleven Ventures.

📖 Read

via "Dark Reading".
🛠 TOR Virtual Network Tunneling Tool 0.4.7.12 🛠

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

📖 Read

via "Packet Storm Security".
🛠 Wireshark Analyzer 4.0.2 🛠

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

📖 Read

via "Packet Storm Security".
‼ CVE-2022-45509 ‼

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the account parameter at /goform/addUserName.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-41802 ‼

Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-39903 ‼

Improper access control vulnerability in RCS call prior to SMR Dec-2022 Release 1 allows local attackers to access RCS incoming call number.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45523 ‼

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/L7Im.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45501 ‼

Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/wifiSSIDset.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-39915 ‼

Improper access control vulnerability in Calendar prior to versions 11.6.08.0 in Android Q(10), 12.2.11.3000 in Android R(11), 12.3.07.2000 in Android S(12), and 12.4.02.0 in Android T(13) allows attackers to access sensitive information via implicit intent.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45511 ‼

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the PPPOEPassword parameter at /goform/QuickIndex.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45499 ‼

Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/WifiMacFilterGet.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-39902 ‼

Improper authorization in Exynos baseband prior to SMR DEC-2022 Release 1 allows remote attacker to get sensitive information including IMEI via emergency call.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-4364 ‼

A vulnerability classified as critical has been found in Teledyne FLIR AX8 up to 1.46.16. Affected is an unknown function of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-215118 is the identifier assigned to this vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45506 ‼

Tenda W30E v1.0.1.25(633) was discovered to contain a command injection vulnerability via the fileNameMit parameter at /goform/delFileName.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-38754 ‼

A potential vulnerability has been identified in Micro Focus Operations Bridge - Containerized. The vulnerability could be exploited by a malicious authenticated OBM (Operations Bridge Manager) user to run Java Scripts in the browser context of another OBM user. Please note: The vulnerability is only applicable if the Operations Bridge Manager capability is deployed. A potential vulnerability has been identified in Micro Focus Operations Bridge Manager (OBM). The vulnerability could be exploited by a malicious authenticated OBM user to run Java Scripts in the browser context of another OBM user. This issue affects: Micro Focus Micro Focus Operations Bridge Manager versions prior to 2022.11. Micro Focus Micro Focus Operations Bridge- Containerized versions prior to 2022.11.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45505 ‼

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the cmdinput parameter at /goform/exeCommand.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-39904 ‼

Exposure of Sensitive Information vulnerability in Samsung Settings prior to SMR Dec-2022 Release 1 allows local attackers to access the Network Access Identifier via log.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45508 ‼

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the new_account parameter at /goform/editUserName.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-4123 ‼

A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45507 ‼

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the editNameMit parameter at /goform/editFileName.

📖 Read

via "National Vulnerability Database".