🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-48515 ‼

Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-34164 ‼

Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48507 ‼

Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-46892 ‼

Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48510 ‼

Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-37238 ‼

Vulnerability of apps' permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48508 ‼

Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48520 ‼

Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48517 ‼

Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-3456 ‼

Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48509 ‼

Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48516 ‼

Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-48519 ‼

Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-37239 ‼

Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-1695 ‼

Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-25090 ‼

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface and in_acl variables.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-25089 ‼

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when in_acl is -1.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-25091 ‼

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when out_acl is -1.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-25086 ‼

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and dport variables.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-25094 ‼

Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the into_class_node function with either the class_name or old_class_name variable.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-23571 ‼

An access violation vulnerability exists in the eventcore functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to denial of service. An attacker can send a network request to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".