Security
Headlines
HeadlinesLatestCVEs

Tag

#wifi

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room

A group of academics has devised a system that can be used on a phone or a laptop to identify and locate Wi-Fi-connected hidden IoT devices in unfamiliar physical spaces. With hidden cameras being increasingly used to snoop on individuals in hotel rooms and Airbnbs, the goal is to be able to pinpoint such rogue devices without much of a hassle. The system, dubbed Lumos, is designed with this

The Hacker News
#ios#mac#apple#wifi#ssl#The Hacker News
General Motors suffers credential stuffing attack

US car producer General Motors says its Rewards platform was the victim of a credential stuffing attack last month. The post General Motors suffers credential stuffing attack appeared first on Malwarebytes Labs.

CVE-2022-29377: iot-cve/totolink/a3600r at master · molezsbd/iot-cve

Totolink A3600R V4.1.2cu.5182_B20201102 was discovered to contain a stacker overflow in the fread function at infostat.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via the parameter CONTENT_LENGTH.

CVE-2021-43729: Hunting for Vulnerabilities in Low-Cost WiFi Repeaters

Pix-Link MiNi Router 28K.MiniRouter.20190211 was discovered to contain a stored cross-site scripting (XSS) vulnerability due to an unsanitized Security Key parameter.

CVE-2022-28964: NEW Avast Version 22.1 (January 2022)

An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528) allows attackers to cause a Denial of Service (DoS) via a crafted DLL file.

Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

By Deeba Ahmed Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect… This is a post from HackRead.com Read the original post: Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

CVE-2022-30105: Belkin N300 - Exploitee.rs

In Belkin N300 Firmware 1.00.08, the script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root.

Apple Security Advisory 2022-05-16-6

Apple Security Advisory 2022-05-16-6 - tvOS 15.5 addresses bypass, code execution, integer overflow, out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Apple Security Advisory 2022-05-16-5

Apple Security Advisory 2022-05-16-5 - watchOS 8.6 addresses bypass, code execution, integer overflow, out of bounds access, out of bounds write, and use-after-free vulnerabilities.