πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-1244 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1237 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1241 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1245 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyber Security Works to Rebrand As Securin Inc. πŸ•΄

Securin Inc. will provide tech-enabled security solutions, vulnerability intelligence and deep domain expertise.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ransomware's Favorite Target: Critical Infrastructure and Its Industrial Control Systems πŸ•΄

The health, manufacturing, and energy sectors are the most vulnerable to ransomware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-26955 β€Ό

onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Admin Group module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36669 β€Ό

The JetBackup Γ’β‚¬β€œ WP Backup, Migrate & Restore plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.3.9. This is due to missing nonce validation on the backup_guard_get_import_backup() function. This makes it possible for unauthenticated attackers to upload arbitrary files to the vulnerable site's server via a forged request, granted they can trick a site's administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44197 β€Ό

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26954 β€Ό

onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the User Group module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4330 β€Ό

The Envato Elements & Download and Template Kit Γ’β‚¬β€œ Import plugins for WordPress are vulnerable to arbitrary file uploads due to insufficient validation of file type upon extracting uploaded Zip files in the installFreeTemplateKit and uploadTemplateKitZipFile functions. This makes it possible for attackers with contributor-lever permissions and above to upload arbitrary files and potentially gain remote code execution in versions up to and including 1.0.13 of Template Kit Γ’β‚¬β€œ Import and versions up to and including 2.0.10 of Envato Elements & Download.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36668 β€Ό

The JetBackup Γ’β‚¬β€œ WP Backup, Migrate & Restore plugin for WordPress is vulnerable to sensitive information disclosure in versions up to, and including, 1.4.0 due to a lack of proper capability checking on the backup_guard_get_manual_modal function called via an AJAX action. This makes it possible for subscriber-level attackers, and above, to invoke the function and obtain database table information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44196 β€Ό

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36667 β€Ό

The JetBackup Γ’β‚¬β€œ WP Backup, Migrate & Restore plugin for WordPress is vulnerable to unauthorized back-up location changes in versions up to, and including 1.4.1 due to a lack of proper capability checking on the backup_guard_cloud_dropbox, backup_guard_cloud_gdrive, and backup_guard_cloud_oneDrive functions. This makes it possible for authenticated attackers, with minimal permissions, such as a subscriber to change to location of back-ups and potentially steal sensitive information from them.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Remcos RAT Spyware Scurries Into Machines via Cloud Servers πŸ•΄

Attackers use phishing emails that appear to come from reputable organizations, dropping the payload using public cloud servers and an old Windows UAC bypass technique.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-27522 β€Ό

HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1254 β€Ό

A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file birthing_print.php. The manipulation of the argument birth_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222484.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25690 β€Ό

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4332 β€Ό

The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation.

πŸ“– Read

via "National Vulnerability Database".