πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Cyber resiliency and end-user performance πŸ“’

Reduce risk and deliver greater business success with cyber-resilience capabilities

πŸ“– Read

via "ITPro".
πŸ“’ What is spell-jacking? πŸ“’

Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy

πŸ“– Read

via "ITPro".
πŸ“’ TD Synnex launches free security self-assessments for VMware partners πŸ“’

Partners can now offer clients three specially-designed surveys, worth tens of thousands, to help drive new business potential

πŸ“– Read

via "ITPro".
πŸ“’ PowerEdge - Cyber resilient infrastructure for a Zero Trust world πŸ“’

Combat threats with an in-depth security stance

πŸ“– Read

via "ITPro".
πŸ“’ ESXi ransomware campaign strikes Florida Supreme Court, worldwide universities πŸ“’

Threat actors show no sign of stopping following the widespread exploitation of the two-year-old vulnerability in VMware ESXi servers

πŸ“– Read

via "ITPro".
πŸ”₯1
πŸ•΄ Google Cloud Connects Chronicle to Health ISAC Feed πŸ•΄

Members of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ OAuth β€˜masterclass’ crowned top web hacking technique of 2022 πŸ—“οΈ

Single sign-on and request smuggling to the fore in another stellar year for web security research

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Addressing the Elephant in the Room: Getting Developers & Security Teams to Work Together πŸ•΄

Bridging the divide between developers and security can create a culture change organically.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-0771 β€Ό

SQL Injection in GitHub repository ampache/ampache prior to 5.5.7,develop.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23698 β€Ό

Dell Command | Update, Dell Update, and Alienware Update versions before 4.6.0 and 4.7.1 contain Insecure Operation on Windows Junction in the installer component. A local malicious user may potentially exploit this vulnerability leading to arbitrary file delete.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24410 β€Ό

Dell BIOS contains an information exposure vulnerability. An unauthenticated local attacker with physical access to the system and knowledge of the system configuration could potentially exploit this vulnerability to read system information via debug interfaces.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0774 β€Ό

A vulnerability has been found in SourceCodester Medical Certificate Generator App 1.0 and classified as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument lastname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220558 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23592 β€Ό

WALLIX Access Manager 3.x through 4.0.x allows a remote attacker to access sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-10076 β€Ό

A vulnerability was found in dimtion Shaarlier up to 1.2.2. It has been declared as critical. Affected by this vulnerability is the function createTag of the file app/src/main/java/com/dimtion/shaarlier/TagsSource.java of the component Tag Handler. The manipulation leads to sql injection. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e. It is recommended to upgrade the affected component. The identifier VDB-220453 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22832 β€Ό

The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45699 β€Ό

Command injection in the administration interface in APSystems ECU-R version 5203 allows a remote unauthenticated attacker to execute arbitrary commands as root using the timezone parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43501 β€Ό

KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24684 β€Ό

ChurchCRM v4.5.3 and below was discovered to contain a SQL injection vulnerability via the EID parameter at GetText.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24573 β€Ό

Dell Command | Monitor versions prior to 10.9 contain an arbitrary folder delete vulnerability during uninstallation. A locally authenticated malicious user may potentially exploit this vulnerability leading to arbitrary folder deletion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34452 β€Ό

PowerPath Management Appliance with versions 3.3, 3.2*, 3.1 & 3.0* contains sensitive information disclosure vulnerability. An Authenticated admin user can able to exploit the issue and view sensitive information stored in the logs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21939 β€Ό

Sensitive Cookie Without 'HttpOnly' Flag vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie.

πŸ“– Read

via "National Vulnerability Database".