πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-0322 β€Ό

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Talent Software UNIS allows Reflected XSS.This issue affects UNIS: before 28376.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Why Security Practitioners Should Understand Their Business πŸ•΄

The sooner CISOs become proactive in understanding the flip side of the organizations they protect, the better they'll be at their jobs.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Microsoft Patch Tuesday, March 2023 Edition β™ŸοΈ

Microsoft on Tuesday released updates to quash at least 74 security bugs in its Windows operating systems and software. Two of those flaws are already being actively attacked, including an especially severe weakness in Microsoft Outlook that can be exploited without any user interaction.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2023-24729 β€Ό

Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27781 β€Ό

jpegoptim v1.5.2 was discovered to contain a heap overflow in the optimize function at jpegoptim.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0100 β€Ό

In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27103 β€Ό

Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24732 β€Ό

Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the gender parameter in the user profile update function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44580 β€Ό

SQL Injection (SQLi) vulnerability in RichPlugins Plugin for Google Reviews plugin <= 2.2.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24730 β€Ό

Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the company parameter in the user profile update function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24731 β€Ό

Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the query parameter in the user profile update function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27102 β€Ό

Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24726 β€Ό

Art Gallery Management System v1.0 was discovered to contain a SQL injection vulnerability via the viewid parameter on the enquiry page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26084 β€Ό

The armv8_dec_aes_gcm_full() API of Arm AArch64cryptolib before 86065c6 fails to the verify the authentication tag of AES-GCM protected data, leading to a man-in-the-middle attack. This occurs because of an improperly initialized variable.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34148 β€Ό

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JetBackup JetBackup Γ’β‚¬β€œ WP Backup, Migrate & Restore plugin <= 1.6.9.0 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38456 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ernest Marcinko Ajax Search Lite plugin <= 4.10.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24728 β€Ό

Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the contact parameter in the user profile update function.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ GoatRAT Android Banking Trojan Targets Mobile Automated Payment System πŸ•΄

The new malware was discovered targeting three banks in Brazil.

πŸ“– Read

via "Dark Reading".
❀1
πŸ•΄ Meet Data Privacy Mandates With Cybersecurity Frameworks πŸ•΄

Protection laws are always evolving. Here's how you can streamline your compliance efforts .

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2023-1418 β€Ό

A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-1379 β€Ό

A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127.

πŸ“– Read

via "National Vulnerability Database".