πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-0642 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository squidex/squidex prior to 7.4.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0643 β€Ό

Improper Handling of Additional Special Element in GitHub repository squidex/squidex prior to 7.4.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24307 β€Ό

An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46965 β€Ό

PrestaShop module, totadministrativemandate before v1.7.1 was discovered to contain a SQL injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-46604 β€Ό

An issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46552 β€Ό

D-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security πŸ•΄

Current and former cybersecurity leaders from Microsoft, Google, GitLab, Check Point, OWASP, Fortinet and others have already joined the open framework initiative, which is being led by OX Security.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Managing the Governance Model for Software Development in a No-Code Ecosystem πŸ•΄

Forward-leading business and technology leaders are seeing the value of the "do-It-yourself" approach.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Truffle Security relaunches XSS Hunter tool with new features πŸ—“οΈ

Popular hacking aid resurrected following end-of-life announcement

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter πŸ•΄

Analysts find that 98% of QNAP NAS are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection.

πŸ“– Read

via "Dark Reading".
πŸ›  Zeek 5.0.6 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ”₯2
πŸ›  OpenSSH 9.2p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-0649 β€Ό

A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220036.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0648 β€Ό

A vulnerability, which was classified as critical, was found in dst-admin 1.5.0. This affects an unknown part of the file /home/masterConsole. The manipulation of the argument command leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220035.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0646 β€Ό

A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23110 β€Ό

An exploitable firmware modification vulnerability was discovered in WNR612v2 Wireless Routers firmware version 1.0.0.3 and earlier. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0650 β€Ό

A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The name of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0647 β€Ό

A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0651 β€Ό

A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep120: When dud crypto simply won’t let go [Audio + Text] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".