πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-4364 β€Ό

A vulnerability classified as critical has been found in Teledyne FLIR AX8 up to 1.46.16. Affected is an unknown function of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-215118 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45506 β€Ό

Tenda W30E v1.0.1.25(633) was discovered to contain a command injection vulnerability via the fileNameMit parameter at /goform/delFileName.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38754 β€Ό

A potential vulnerability has been identified in Micro Focus Operations Bridge - Containerized. The vulnerability could be exploited by a malicious authenticated OBM (Operations Bridge Manager) user to run Java Scripts in the browser context of another OBM user. Please note: The vulnerability is only applicable if the Operations Bridge Manager capability is deployed. A potential vulnerability has been identified in Micro Focus Operations Bridge Manager (OBM). The vulnerability could be exploited by a malicious authenticated OBM user to run Java Scripts in the browser context of another OBM user. This issue affects: Micro Focus Micro Focus Operations Bridge Manager versions prior to 2022.11. Micro Focus Micro Focus Operations Bridge- Containerized versions prior to 2022.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45505 β€Ό

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the cmdinput parameter at /goform/exeCommand.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39904 β€Ό

Exposure of Sensitive Information vulnerability in Samsung Settings prior to SMR Dec-2022 Release 1 allows local attackers to access the Network Access Identifier via log.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45508 β€Ό

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the new_account parameter at /goform/editUserName.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4123 β€Ό

A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45507 β€Ό

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the editNameMit parameter at /goform/editFileName.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45513 β€Ό

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/P2pListFilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45512 β€Ό

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeEmailFilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39895 β€Ό

Improper access control vulnerability in ContactListUtils in Phone prior to SMR Dec-2022 Release 1 allows to access contact group information via implicit intent.

πŸ“– Read

via "National Vulnerability Database".
⚠ Credit card skimming – the long and winding road of supply chain failure ⚠

Don't keep calling home to a JavaScript server that closed its doors eight years ago!

πŸ“– Read

via "Naked Security".
β™ŸοΈ New Ransom Payment Schemes Target Executives, Telemedicine β™ŸοΈ

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the "patient." The other involves carefully editing email inboxes of public company executives to make it appear that some were involved in insider trading.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2022-38599 β€Ό

Teleport v3.2.2, Teleport v3.5.6-rc6, and Teleport v3.6.3-b2 was discovered to contain an information leak via the /user/get-role-list web interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40939 β€Ό

In certain Secustation products the administrator account password can be read. This affects V2.5.5.3116-S50-SMA-B20171107A, V2.3.4.1301-M20-TSA-B20150617A, V2.5.5.3116-S50-RXA-B20180502A, V2.5.5.3116-S50-SMA-B20190723A, V2.5.5.3116-S50-SMB-B20161012A, V2.3.4.2103-S50-NTD-B20170508B, V2.5.5.3116-S50-SMB-B20160601A, V2.5.5.2601-S50-TSA-B20151229A, and V2.5.5.3116-S50-SMA-B20170217.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46828 β€Ό

In JetBrains IntelliJ IDEA before 2022.3 a DYLIB injection on macOS was possible.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46825 β€Ό

In JetBrains IntelliJ IDEA before 2022.3 the built-in web server leaked information about open projects.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46827 β€Ό

In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF via requests to custom plugin repositories was possible.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46824 β€Ό

In JetBrains IntelliJ IDEA before 2022.2.4 a buffer overflow in the fsnotifier daemon on macOS was possible.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46826 β€Ό

In JetBrains IntelliJ IDEA before 2022.3 the built-in web server allowed an arbitrary file to be read by exploiting a path traversal vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46831 β€Ό

In JetBrains TeamCity between 2022.10 and 2022.10.1 connecting to AWS using the "Default Credential Provider Chain" allowed TeamCity project administrators to access AWS resources normally limited to TeamCity system administrators.

πŸ“– Read

via "National Vulnerability Database".