πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-23331 β€Ό

Amano Xoffice parking solutions 7.1.3879 is vulnerable to SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45639 β€Ό

OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows attackers to execute arbitrary commands via a crafted value to the m parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ IoT vendors faulted for slow progress in setting up vulnerability disclosure programs πŸ—“οΈ

Manufacturer complacency β€˜translates into an unacceptable risk for consumers’, warns security expert

πŸ“– Read

via "The Daily Swig".
πŸ‘4πŸ”₯1
β™ŸοΈ Administrator of RSOCKS Proxy Botnet Pleads Guilty β™ŸοΈ

Denis Emelyantsev, a 36-year-old Russian man accused of running a massive botnet called RSOCKS that stitched malware into millions of devices worldwide, pleaded guilty to two counts of computer crime violations in a California courtroom this week. The plea comes just months after Emelyantsev was extradited from Bulgaria, where he told investigators, β€œAmerica is looking for me because I have enormous information and they need it.”

πŸ“– Read

via "Krebs on Security".
πŸ”₯2πŸ‘1
⚠ Apple patches are out – old iPhones get an old zero-day fix at last! ⚠

Don't delay, especially if you're still running an iOS 12 device... please do it today!

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Yellowfin tackles auth bypass bug trio that opened door to RCE πŸ—“οΈ

Pre- and post-auth path to pwnage

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β™ŸοΈ Experian Glitch Exposing Credit Files Lasted 47 Days β™ŸοΈ

On Dec. 23, 2022, KrebsOnSecurity alerted big-three consumer credit reporting bureau Experian that identity thieves had worked out how to bypass its security and access any consumer's full credit report -- armed with nothing more than a person's name, address, date of birth, and Social Security number. Experian fixed the glitch, but remained silent about the incident for a month. This week, however, Experian acknowledged that the security failure persisted for nearly seven weeks, between Nov. 9, 2022 and Dec. 26, 2022.

πŸ“– Read

via "Krebs on Security".
πŸ‘1
πŸ—“οΈ Trellix automates tackling open source vulnerabilities at scale πŸ—“οΈ

More than 61,000 vulnerabilities patched and counting

πŸ“– Read

via "The Daily Swig".
πŸ‘1
⚠ GoTo admits: Customer cloud backups stolen together with decryption key ⚠

We were going to write, "Once more unto the breach, dear friends, once more"... but it seems to go without saying these days.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text] ⚠

Lastest episode - listen now! (Or read the transcript.)

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Ruby on Rails apps vulnerable to data theft through Ransack search πŸ—“οΈ

Several applications were vulnerable to brute-force attacks; hundreds more could be at risk

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-42386 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18655.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42378 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18631.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42379 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18648.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42380 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18649.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41140 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the lighttpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13796.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41147 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18286.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41153 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18343.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42382 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18651.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42376 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18529.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42377 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18630.

πŸ“– Read

via "National Vulnerability Database".