πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-38143 β€Ό

A heap out-of-bounds write vulnerability exists in the way OpenImageIO v2.3.19.0 processes RLE encoded BMP images. A specially-crafted bmp file can write to arbitrary out of bounds memory, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43599 β€Ό

Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Is a Second-Class Citizen in High-Performance Computing πŸ•΄

Vendors and operators attempt to balance power and security, but right now, power is the highest goal.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-40898 β€Ό

An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47931 β€Ό

IO FinNet tss-lib before 2.0.0 allows a collision of hash values.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40897 β€Ό

An issue discovered in Python Packaging Authority (PyPA) setuptools 65.3.0 and earlier allows remote attackers to cause a denial of service via crafted HTML package or custom PackageIndex page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40899 β€Ό

An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46493 β€Ό

Default version of nbnbk was discovered to contain an arbitrary file upload vulnerability via the component /api/User/download_img.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23513 β€Ό

Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46491 β€Ό

A Cross-Site Request Forgery (CSRF) vulnerability in the Add Administrator function of the default version of nbnbk allows attackers to arbitrarily add Administrator accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47928 β€Ό

In MISP before 2.4.167, there is XSS in the template file uploads in app/View/Templates/upload_file.ctp.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23539 β€Ό

Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, youÒ€ℒll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Apple issues patch for macOS security bypass vulnerability πŸ“’

The Achilles vulnerability enabled malware to slip past Apple’s Gatekeeper security checks

πŸ“– Read

via "ITPro".
πŸ“’ IRS mistakenly publishes 112,000 taxpayer records for the second time πŸ“’

A contractor is thought to be responsible for the error, with the agency reportedly reviewing its relationship with Accenture

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-33324 β€Ό

Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions "32" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "65" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU all versions, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46492 β€Ό

nbnbk commit 879858451d53261d10f77d4709aee2d01c72c301 was discovered to contain an arbitrary file read vulnerability via the component /api/Index/getFileBinary.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32692 β€Ό

Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4665 β€Ό

Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Finding the next Log4j – OpenSSF’s Brian Behlendorf on pivoting to a β€˜risk-centred view’ of open source development πŸ—“οΈ

Apache pioneer says β€˜use at your own risk’ model no longer tenable as OpenSSF ramps up end user engagement

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-4689 β€Ό

Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4684 β€Ό

Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.

πŸ“– Read

via "National Vulnerability Database".