πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-4171 β€Ό

The demon image annotation plugin for WordPress is vulnerable to improper input validation in versions up to, and including 5.0. This is due to the plugin improperly validating the number of characters supplied during an annotation despite there being a setting to limit the number characters input. This means that unauthenticated attackers can bypass the length restrictions and input more characters than allowed via the settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43996 β€Ό

The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-46404 β€Ό

A command injection vulnerability has been identified in Atos Unify OpenScape 4000 Assistant and Unify OpenScape 4000 Manager (8 before R2.22.18, 10 before 0.28.13, and 10 R1 before R1.34.4) that may allow an unauthenticated attacker to upload arbitrary files and achieve administrative access to the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2951 β€Ό

Altair HyperView Player versions 2021.1.0.27 and prior are vulnerable to improper validation of array index vulnerability during processing of H3D files. A DWORD value from a PoC file is extracted and used as an index to write to a buffer, leading to memory corruption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2757 β€Ό

Due to the lack of adequately implemented access-control rules, all versions Kingspan TMS300 CS are vulnerable to an attacker viewing and modifying the application settings without authenticating by accessing a specific uniform resource locator (URL) on the webserver.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2950 β€Ό

Altair HyperView Player versions 2021.1.0.27 and prior are vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38628 β€Ό

Nortek Linear eMerge E3-Series 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e were discovered to contain a cross-site scripting (XSS) vulnerability which is chained with a local session fixation. This vulnerability allows attackers to escalate privileges via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4207 β€Ό

The Image Hover Effects Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several values that can be added to an Image Hover in versions 9.8.1 to 9.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, the plugin only allows administrators access to edit Image Hovers, however, if a site admin makes the plugin's features available to lower privileged users through the 'Who Can Edit?' setting then this can be exploited by those users.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update πŸ•΄

Here's what you need to patch now, including six critical updates for Microsoft's final Patch Tuesday of the year.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β™ŸοΈ FBI’s Vetted Info Sharing Network β€˜InfraGard’ Hacked β™ŸοΈ

InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up for sale on an English-language cybercrime forum. Meanwhile, the hackers responsible are communicating directly with members through the InfraGard portal online -- using a new account under the assumed identity of a financial industry CEO that was vetted by the FBI itself.

πŸ“– Read

via "Krebs on Security".
πŸ‘1
⚠ COVID-bit: the wireless spyware trick with an unfortunate name ⚠

It's not the switching that's the problem, it's the switching of the switching!

πŸ“– Read

via "Naked Security".
πŸ‘1
⚠ Patch Tuesday: 0-days, RCE bugs, and a curious tale of signed malware ⚠

Tales of derring-do in the cyberunderground! (And some zero-days.)

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-42141 β€Ό

Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42139 β€Ό

Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42140 β€Ό

Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Command Injection via lform/net_diagnose.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44874 β€Ό

wasm3 commit 7890a2097569fde845881e0b352d813573e371f9 was discovered to contain a segmentation fault via the component op_CallIndirect at /m3_exec.h.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37155 β€Ό

RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via a GET parameter

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40264 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘Ž1
⚠ Apple patches everything, finally reveals mystery of iOS 16.1.2 ⚠

There's an update for everything this time, not just for iOS.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-9420 β€Ό

The login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24377 β€Ό

The package cycle-import-check before 1.3.2 are vulnerable to Command Injection via the writeFileToTmpDirAndOpenIt function due to improper user-input sanitization.

πŸ“– Read

via "National Vulnerability Database".