πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-37774 β€Ό

An issue was discovered in function httpProcDataSrv in TL-WDR7660 2.0.30 that allows attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text] ⚠

As always: entertaining, informative and educational... and not bogged down with jargon! Listen (or read) now...

πŸ“– Read

via "Naked Security".
❀1
πŸ›  Wireshark Analyzer 4.0.3 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ Google pays hacker duo $22k in bug bounties for flaws in multiple cloud projects πŸ—“οΈ

Six payouts issued for bugs uncovered in Theia, Vertex AI, Compute Engine, and Cloud Workstations

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2020-25679 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47195 β€Ό

An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `facebook` field for a user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-10692 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40697 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 3com Γ’β‚¬β€œ Asesor de Cookies para normativa española plugin <= 3.4.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39167 β€Ό

IBM Spectrum Virtualize 8.5, 8.4, 8.3, 8.2, and 7.8, under certain configurations, could disclose sensitive information to an attacker using man-in-the-middle techniques. IBM X-Force ID: 235408.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-10764 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25714 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47745 β€Ό

ZenTao 16.4 to 18.0.beta1 is vulnerable to SQL injection. After logging in with any user, you can complete SQL injection by constructing a special request and sending it to function importNotice.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47197 β€Ό

An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `codeinjection_foot` for a post.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-10765 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47740 β€Ό

Seltmann GmbH Content Management System 6 is vulnerable to SQL Injection via /index.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-1715 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-10694 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-1713 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47194 β€Ό

An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `twitter` field for a user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0406 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1676 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".