๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2023-24485 โ€ผ

Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-24483 โ€ผ

A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-23936 โ€ผ

Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-23752 โ€ผ

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-24484 โ€ผ

A malicious user can cause log files to be written to a directory that they do not have permission to write to.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-24807 โ€ผ

Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Cybersecurity Jobs Remain Secure Despite Recession Fears ๐Ÿ•ด

Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses ๐Ÿ•ด

Powered by WatchGuardโ€™s Unified Security Platformยฎ architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2022-30303 โ€ผ

An improper neutralization of special elements used in an os command ('OS Command Injection') [CWE-78] in FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions may allow an authenticated attacker to execute arbitrary shell code as `root` user via crafted HTTP requests.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-38378 โ€ผ

An improper privilege management vulnerability [CWE-269] in Fortinet FortiOS version 7.2.0 and before 7.0.7 and FortiProxy version 7.2.0 through 7.2.1 and before 7.0.7 allows an attacker that has access to the admin profile section (System subsection Administrator Users) to modify their own profile and upgrade their privileges to Read Write via CLI or GUI commands.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-23782 โ€ผ

A heap-based buffer overflow in Fortinet FortiWeb version 7.0.0 through 7.0.1, FortiWeb version 6.3.0 through 6.3.19, FortiWeb 6.4 all versions, FortiWeb 6.2 all versions, FortiWeb 6.1 all versions allows attacker to escalation of privilege via specifically crafted arguments to existing commands.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30300 โ€ผ

A relative path traversal vulnerability [CWE-23] in FortiWeb 7.0.0 through 7.0.1, 6.3.6 through 6.3.18, 6.4 all versions may allow an authenticated attacker to obtain unauthorized access to files and data via specifically crafted HTTP GET requests.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30299 โ€ผ

A path traversal vulnerability [CWE-23] in the API of FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions may allow an authenticated attacker to retrieve specific parts of files from the underlying file system via specially crafted web requests.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26345 โ€ผ

Uncontrolled search path element in the Intel(R) oneAPI Toolkit OpenMP before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30339 โ€ผ

Out-of-bounds read in firmware for the Intel(R) Integrated Sensor Solution before versions 5.4.2.4579v3, 5.4.1.4479 and 5.0.0.4143 may allow a privileged user to potentially enable denial of service via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-25905 โ€ผ

Uncontrolled search path element in the Intel(R) oneAPI Data Analytics Library (oneDAL) before version 2021.5 for Intel(R) oneAPI Base Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26425 โ€ผ

Uncontrolled search path element in the Intel(R) oneAPI Collective Communications Library (oneCCL) before version 2021.6 for Intel(R) oneAPI Base Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-0187 โ€ผ

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-43074 โ€ผ

An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26837 โ€ผ

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-26840 โ€ผ

Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".