🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2023-22998

In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

📖 Read

via "National Vulnerability Database".
CVE-2023-22999

In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

📖 Read

via "National Vulnerability Database".
CVE-2023-1100

A vulnerability classified as critical has been found in SourceCodester Online Catering Reservation System 1.0. This affects an unknown part of the file /reservation/add_message.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222003.

📖 Read

via "National Vulnerability Database".
📢 Paying ransomware gangs could fund up to ten additional attacks 📢

The research from Trend Micro highlights the potential domino effect of paying ransoms

📖 Read

via "ITPro".
📢 How to build a cyber-resilient business read to innovate and thrive 📢

Outperform your peers in your successful business outcomes

📖 Read

via "ITPro".
📢 MWC 2023: Huawei launches 'world's best' ransomware detection system 📢

Huawei claims its Cyber Engine database security system has a 99.9% detection rate, but experts have been quick to weaken the sentiment

📖 Read

via "ITPro".
📢 State-sponsored hackers are diversifying tactics, targeting small businesses 📢

Research has warned that state-sponsored threat actors will increasingly target smaller enterprises in 2023

📖 Read

via "ITPro".
📢 What you need to know about Gmail's new client-side encryption feature 📢

The new encryption feature will bolster security and give businesses greater control over access to data

📖 Read

via "ITPro".
👏1
📢 Australia commits to establishing second national cyber security agency 📢

The country is still aiming to be the most cyber-secure country in the world by 2030

📖 Read

via "ITPro".
📢 How to turn on Windows Defender 📢

Find out how to switch on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary

📖 Read

via "ITPro".
📢 News Corp admits China-linked hackers breached company for two years 📢

The News Corp breach follows recent news that threat actors had access to GoDaddy systems for three years

📖 Read

via "ITPro".
👏1
CVE-2023-24045

In Dataiku DSS 11.2.1, an attacker can download other Dataiku files that were uploaded to the myfiles section by specifying the target username in a download request.

📖 Read

via "National Vulnerability Database".
CVE-2023-1104

Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.

📖 Read

via "National Vulnerability Database".
CVE-2023-26608

SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor.

📖 Read

via "National Vulnerability Database".
CVE-2023-1103

Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.

📖 Read

via "National Vulnerability Database".
CVE-2023-1105

External Control of File Name or Path in GitHub repository flatpressblog/flatpress prior to 1.3.

📖 Read

via "National Vulnerability Database".
CVE-2023-22773

Authenticated path traversal vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files in the underlying operating system.

📖 Read

via "National Vulnerability Database".
CVE-2023-0952

Improper access controls on entries in Devolutions Server 2022.3.12 and earlier could allow an authenticated user to access sensitive data without proper authorization.

📖 Read

via "National Vulnerability Database".
CVE-2022-20952

A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked. This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.

📖 Read

via "National Vulnerability Database".
CVE-2022-38736

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.

📖 Read

via "National Vulnerability Database".
CVE-2023-22774

Authenticated path traversal vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files in the underlying operating system.

📖 Read

via "National Vulnerability Database".