πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-0446 β€Ό

The My YouTube Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 3.0.12.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23824 β€Ό

Auth. SQL Injection (SQLi) vulnerability in WP-TopBar <= 5.36 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40034 β€Ό

Cross-Site Scripting (XSS) vulnerability found in Rawchen blog-ssm v1.0 allows attackers to execute arbitrary code via the 'notifyInfo' parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23005 β€Ό

Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23560 β€Ό

In certain Lexmark products through 2023-01-12, SSRF can occur because of a lack of input validation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46639 β€Ό

A vulnerability in the descarga_etiqueta.php component of Correos Prestashop 1.7.x allows attackers to execute a directory traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22630 β€Ό

IzyBat Orange casiers before 20221102_1 allows SQL Injection via a getCasier.php?taille= URI.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-20104 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22960 β€Ό

Lexmark products through 2023-01-10 have Improper Control of Interaction Frequency.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21795 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21796.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21796 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21795.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21775 β€Ό

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22484 β€Ό

cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to a polynomial time complexity issue in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21719 β€Ό

Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22483 β€Ό

cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to several polynomial time complexity issues in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. Various commands, when piped to cmark-gfm with large values, cause the running time to increase quadratically. These vulnerabilities have been patched in version 0.29.0.gfm.7.

πŸ“– Read

via "National Vulnerability Database".
⚠ Apple patches are out – old iPhones get an old zero-day fix at last! ⚠

Don't delay, especially if you're still running an iOS 12 device... please do it today!

πŸ“– Read

via "Naked Security".
πŸ‘2
β€Ό CVE-2023-22485 β€Ό

cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior 0.29.0.gfm.7, a crafted markdown document can trigger an out-of-bounds read in the `validate_protocol` function. We believe this bug is harmless in practice, because the out-of-bounds read accesses `malloc` metadata without causing any visible damage.This vulnerability has been patched in 0.29.0.gfm.7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23331 β€Ό

Amano Xoffice parking solutions 7.1.3879 is vulnerable to SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45639 β€Ό

OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows attackers to execute arbitrary commands via a crafted value to the m parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ IoT vendors faulted for slow progress in setting up vulnerability disclosure programs πŸ—“οΈ

Manufacturer complacency β€˜translates into an unacceptable risk for consumers’, warns security expert

πŸ“– Read

via "The Daily Swig".
πŸ‘4πŸ”₯1
β™ŸοΈ Administrator of RSOCKS Proxy Botnet Pleads Guilty β™ŸοΈ

Denis Emelyantsev, a 36-year-old Russian man accused of running a massive botnet called RSOCKS that stitched malware into millions of devices worldwide, pleaded guilty to two counts of computer crime violations in a California courtroom this week. The plea comes just months after Emelyantsev was extradited from Bulgaria, where he told investigators, β€œAmerica is looking for me because I have enormous information and they need it.”

πŸ“– Read

via "Krebs on Security".
πŸ”₯2πŸ‘1