πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-4860 β€Ό

A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The name of the patch is 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-20152 β€Ό

A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36637 β€Ό

A vulnerability was found in Chris92de AdminServ. It has been declared as problematic. This vulnerability affects unknown code of the file resources/core/adminserv.php. The manipulation of the argument text leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3ed17dab3b4d6e8bf1c82ddfbf882314365e9cd7. It is recommended to apply a patch to fix this issue. VDB-217042 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43396 β€Ό

In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-25060 β€Ό

A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4859 β€Ό

A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The name of the patch is 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4858 β€Ό

Insertion of Sensitive Information into Log Files in M-Files Server in M-Files before 22.10.11846.0 could allow to obtain sensitive tokens from logs, if specific configurations were set.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for January 2023 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023 πŸ•΄

Dark Reading's panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ War and Geopolitical Conflict: The New Battleground for DDoS Attacks πŸ•΄

The effectiveness of attacks largely depends on organizations' distributed denial-of-service defenses.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-4861 β€Ό

Incorrect implementation in authentication protocol in M-Files Server before 22.5.11356.0 allows high privileged user to get other users tokens to another resource.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ API Security Is the New Black πŸ•΄

API security is so hot right now.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-4863 β€Ό

Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
⚠ US passes the Quantum Computing Cybersecurity Preparedness Act – and why not? ⚠

Cryptographic agility: the ability and the willingness to change quickly when needed.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep115: True crime stories – A day in the life of a cybercrime fighter [Audio + Text] ⚠

Listen now - you'll be alarmed, amused and educated, all in equal measure. (Full transcript in article.)

πŸ“– Read

via "Naked Security".
⚠ The horror! The horror! NOTEPAD gets tabbed editing (very briefly) ⚠

Is there a special meaning of "don't" that means "go right ahead"?

πŸ“– Read

via "Naked Security".
⚠ Naked Security 33 1/3 – Cybersecurity predictions for 2023 and beyond ⚠

The problem with anniversaries is that there's an almost infinite number of them every day...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-23064 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12579 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3093 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-2058 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".