πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Security Flaw in Atlassian Products Affecting Multiple Companies πŸ•΄

Jira, Confluence,Trello, and BitBucket affected.

πŸ“– Read

via "Dark Reading".
⚠ COVID-bit: the wireless spyware trick with an unfortunate name ⚠

It's not the switching that's the problem, it's the switching of the switching!

πŸ“– Read

via "Naked Security".
πŸ•΄ Accelerating Vulnerability Identification and Remediation πŸ•΄

Software teams can now fix bugs faster with faster release cycles, but breach pressure is increasing. Using SBoM and automation will help better detect, prevent, and remediate security issues throughout the software development life cycle.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Citrix ADC, Gateway Users Race Against Hackers to Patch Critical Flaw πŸ•΄

Citrix issues a critical update as NSA warns that the APT5 threat group is actively trying to target ADC environments.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-46062 β€Ό

Gym Management System v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45028 β€Ό

A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4454 β€Ό

A vulnerability, which was classified as critical, has been found in m0ver bible-online. Affected by this issue is the function query of the file src/main/java/custom/application/search.java of the component Search Handler. The manipulation leads to sql injection. The name of the patch is 6ef0aabfb2d4ccd53fcaa9707781303af357410e. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215444.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-25078 β€Ό

A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by this vulnerability is the function pacparser_find_proxy of the file src/pacparser.c. The manipulation of the argument url leads to buffer overflow. Attacking locally is a requirement. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is 853e8f45607cb07b877ffd270c63dbcdd5201ad9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215443.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46364 β€Ό

A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27518 β€Ό

Unauthenticated remote arbitrary code execution

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4456 β€Ό

A vulnerability has been found in falling-fruit and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 15adb8e1ea1f1c3e3d152fc266071f621ef0c621. It is recommended to apply a patch to fix this issue. VDB-215446 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4455 β€Ό

A vulnerability, which was classified as problematic, was found in sproctor php-calendar. This affects an unknown part of the file index.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is a2941109b42201c19733127ced763e270a357809. It is recommended to apply a patch to fix this issue. The identifier VDB-215445 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44704 β€Ό

Microsoft Windows Sysmon Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44702 β€Ό

Windows Terminal Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44707 β€Ό

Windows Kernel Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44713 β€Ό

Microsoft Outlook for Mac Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44699 β€Ό

Azure Network Watcher Agent Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44697 β€Ό

Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41121, CVE-2022-44671, CVE-2022-44680.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44696 β€Ό

Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44694, CVE-2022-44695.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45005 β€Ό

IP-COM EW9 V15.11.0.14(9732) was discovered to contain a command injection vulnerability in the cmd_get_ping_output function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44710 β€Ό

DirectX Graphics Kernel Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".