πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-46356 β€Ό

Potential vulnerabilities have been identified in HP Security Manager which may allow escalation of privilege, arbitrary code execution, and information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0474 β€Ό

Use after free in GuestView in Google Chrome prior to 109.0.5414.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a Chrome web app. (Chromium security severity: Medium)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22324 β€Ό

SQL injection vulnerability in the CONPROSYS HMI System (CHS) Ver.3.5.0 and earlier allows a remote authenticated attacker to execute an arbitrary SQL command. As a result, information stored in the database may be obtained.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0473 β€Ό

Type Confusion in ServiceWorker API in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46359 β€Ό

Potential vulnerabilities have been identified in HP Security Manager which may allow escalation of privilege, arbitrary code execution, and information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22333 β€Ό

Cross-site scripting vulnerability in EasyMail 2.00.130 and earlier allows a remote unauthenticated attacker to inject an arbitrary script.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0472 β€Ό

Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46358 β€Ό

Potential vulnerabilities have been identified in HP Security Manager which may allow escalation of privilege, arbitrary code execution, and information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22322 β€Ό

Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion Pro 1.4.6.013 and earlier. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Motion Pro is installed may be disclosed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0266 β€Ό

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45788 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when a malicious project file is loaded onto the controller. Affected Products: EcoStruxureΓ’β€žΒ’ Control Expert (All Versions), EcoStruxureΓ’β€žΒ’ Process Expert (Version V2020 & prior), Modicon M340 CPU (part numbers BMXP34*) (All Versions), Modicon M580 CPU (part numbers BMEP* and BMEH*) (All Versions), Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S) (All Versions), Modicon Momentum Unity M1E Processor (171CBU*) (All Versions), Modicon MC80 (BMKC80) (All Versions), Legacy Modicon Quantum (140CPU65*) and Premium CPUs (TSXP57*) (All Versions)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0240 β€Ό

There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.

πŸ“– Read

via "National Vulnerability Database".
⚠ Hive ransomware servers shut down at last, says FBI ⚠

Unfortunately, you've probably already heard the cliche that "cybercrime abhors a vacuum"...

πŸ“– Read

via "Naked Security".
πŸ›  Proxmark3 4.16191 Custom Firmware πŸ› 

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

πŸ“– Read

via "Packet Storm Security".
πŸ›  OpenStego Free Steganography Solution 0.8.6 πŸ› 

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-26872 β€Ό

AMI Megarac Password reset interception via API

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46087 β€Ό

CloudSchool v3.0.1 is vulnerable to Cross Site Scripting (XSS). A normal user can steal session cookies of the admin users through notification received by the admin user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23334 β€Ό

The Robot application in Ip-label Newtest before v8.5R0 was discovered to use weak signature checks on executed binaries, allowing attackers to have write access and escalate privileges via replacing NEWTESTREMOTEMANAGER.EXE.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0581 β€Ό

The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0512 β€Ό

Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.

πŸ“– Read

via "National Vulnerability Database".
⚠ Serious Security: The Samba logon bug caused by outdated crypto ⚠

Enjoy our Serious Security deep dive into this real-world example of why cryptographic agility is important!

πŸ“– Read

via "Naked Security".