πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-1253 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Health Center Patient Record Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222483.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4932 β€Ό

The Total Upkeep plugin for WordPress is vulnerable to information disclosure in versions up to, and including 1.14.13. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4931 β€Ό

The BackupWordPress plugin for WordPress is vulnerable to information disclosure in versions up to, and including 3.12. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24781 β€Ό

Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36670 β€Ό

The NEX-Forms. plugin for WordPress is vulnerable to unauthorized disclosure and modification of data in versions up to, and including 7.7.1 due to missing capability checks on several AJAX actions. This makes it possible for authenticated attackers with subscriber level permissions and above to invoke these functions which can be used to perform actions like modify form submission records, deleting files, sending test emails, modifying plugin settings, and more.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4333 β€Ό

The WP Statistics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 13.1.1. This is due to missing or incorrect nonce validation on the view() function. This makes it possible for unauthenticated attackers to activate and deactivate arbitrary plugins, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-10087 β€Ό

** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in UpThemes Theme DesignFolio Plus 1.2 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 53f6ae62878076f99718e5feb589928e83c879a9. It is recommended to apply a patch to fix this issue. The identifier VDB-221809 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4331 β€Ό

The Plus Addons for Elementor plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin adds a registration form to the Elementor page builders functionality. As part of the registration form, users can choose which role to set as the default for users upon registration. This field is not hidden for lower-level users so any user with access to the Elementor page builder, such as contributors, can set the default role to administrator. Since contributors can not publish posts, only author+ users can elevate privileges without interaction via a site administrator (to approve a post).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26953 β€Ό

onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Administrator module.

πŸ“– Read

via "National Vulnerability Database".
⚠ DoppelPaymer ransomware supsects arrested in Germany and Ukraine ⚠

Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in DΓΌsseldorf.

πŸ“– Read

via "Naked Security".
πŸ•΄ Scams Security Pros Almost Fell For πŸ•΄

By working together as an industry, we can develop the technologies needed to account for human error.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Palo Alto Survey Reveals 90% of Organizations Cannot Resolve Cyberthreats Within an Hour πŸ•΄

Third annual report identifies top security gaps and challenges for organizations operating in the cloud.

πŸ“– Read

via "Dark Reading".
⚠ Serious Security: TPM 2.0 vulns – is your super-secure data at risk? ⚠

Security bugs in the very code you've been told you must have to improve the security of your computer...

πŸ“– Read

via "Naked Security".
πŸ•΄ Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears πŸ•΄

More than 4% of employees have put sensitive corporate data into the large language model, raising concerns that its popularity may result in massive leaks of proprietary information.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-25223 β€Ό

CRMEB <=1.3.4 is vulnerable to SQL Injection via /api/admin/user/list.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40676 β€Ό

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 allows attacker to execute unauthorized code or commands via specially crafted http requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25611 β€Ό

A improper neutralization of formula elements in a CSV file vulnerability in Fortinet FortiAnalyzer 6.4.0 - 6.4.9, 7.0.0 - 7.0.5, and 7.2.0 - 7.2.1 allows local attacker to execute unauthorized code or commands via inserting spreadsheet formulas in macro names.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23776 β€Ό

An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4 and 6.4.0 through 6.4.10 may allow a remote authenticated attacker to read the client machine password in plain text in a heartbeat response when a log-fetch request is made from the FortiAnalyzer

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25605 β€Ό

A improper access control vulnerability in Fortinet FortiSOAR 7.3.0 - 7.3.1 allows an attacker authenticated on the administrative interface to perform unauthorized actions via crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".