πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-23607 β€Ό

erohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24026 β€Ό

In MISP 2.4.167, app/webroot/js/event-graph.js has an XSS vulnerability via an event-graph preview payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33642 β€Ό

When a file is processed, an infinite loop occurs in next_inline() of the more_curly() function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33641 β€Ό

When processing files, malloc stores the data of the current line. When processing comments, malloc incorrectly accesses the released memory (use after free).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22726 β€Ό

act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25502 β€Ό

Cybereason EDR version 19.1.282 and above, 19.2.182 and above, 20.1.343 and above, and 20.2.X and above has a DLL hijacking vulnerability, which could allow a local attacker to execute code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0052 β€Ό

SAUTER Controls Nova 200Γ’β‚¬β€œ220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24028 β€Ό

In MISP 2.4.167, app/Controller/Component/ACLComponent.php has incorrect access control for the decaying import function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22884 β€Ό

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow, Apache Software Foundation Apache Airflow MySQL Provider.This issue affects Apache Airflow: before 2.5.1; Apache Airflow MySQL Provider: before 4.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0433 β€Ό

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ“’ European partners expect growth this year, here are three ways they will achieve it πŸ“’

It’s possible to achieve growth at a time of global economic turmoil, provided business objectives are fully aligned with the needs of customers

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ MSI to release securer BIOS settings after critical flaw discovered πŸ“’

The firm has admitted it essentially disabled Secure Boot on its motherboards in an attempt to improve customisability

πŸ“– Read

via "ITPro".
πŸ“’ Windows 11 System Restore bug preventing users from accessing apps πŸ“’

Microsoft has issued a series of workarounds for the issue which is affecting a range of apps including Office and Terminal

πŸ“– Read

via "ITPro".
πŸ“’ Royal Mail ransom note leaked, LockBit’s role remains uncertain πŸ“’

The prolific ransomware operation has denied involvement but researchers remain sceptical

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft releases scripts to restore shortcuts deleted in faulty Windows Defender update πŸ“’

However, some users have resorted to creating their own fixes as they’ve encountered Microsoft’s to be problematic

πŸ“– Read

via "ITPro".
πŸ“’ 'Highly evasive' polymorphic malware generated using ChatGPT πŸ“’

Researchers at CyberArk Labs developed a novel method to generate malware using text that goes largely undetected by signature-based antimalware products

πŸ“– Read

via "ITPro".
πŸ“’ Google Ads malvertising campaign prompts questions around Search security πŸ“’

A leading security researcher has called into question why Google still allows malware links to top search results

πŸ“– Read

via "ITPro".
πŸ“’ Meta sues β€˜data scraping for hire’ service that collected info on 600k users πŸ“’

Meta says tackling data scraping will require a β€œcollective effort” from platforms and policymakers

πŸ“– Read

via "ITPro".
πŸ“’ Windows Defender update deletes Start Menu, Taskbar, Desktop shortcuts πŸ“’

For now, it appears that administrators will have to manually recreate their shortcuts once the issue has been fixed

πŸ“– Read

via "ITPro".
πŸ“’ Hack The Box set to triple workforce and widen global expansion πŸ“’

CEO Haris Pylarinos told IT Pro the startup plans to accelerate international expansion and continue driving security skills awareness

πŸ“– Read

via "ITPro".
πŸ“’ T-Mobile breach leaves customers vulnerable to phishing πŸ“’

T-Mobile confirmed that while customer information was exposed, no financial data or company systems were compromised

πŸ“– Read

via "ITPro".