πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-1527 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository tsolucio/corebos prior to 8.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2016-15029 β€Ό

A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the argument link/search leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.10.0 is able to address this issue. The name of the patch is 67e87f0f0c1ac238fcd050f4c3db298229bc9679. It is recommended to upgrade the affected component. VDB-223402 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1545 β€Ό

SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27984 β€Ό

A CWE-20: Improper Input Validation vulnerability exists in Custom Reports that could cause a macro to be executed, potentially leading to remote code execution when a user opens a malicious report file planted by an attacker. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27981 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists in Custom Reports that could cause a remote code execution when a victim tries to open a malicious report. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Bitwarden to release fix for four-year-old vulnerability πŸ“’

The password manager knew about the issue since 2018, exploits for which were highlighted in a Flashpoint report earlier in March

πŸ“– Read

via "ITPro".
πŸ“’ Podcast transcript: The changing face of cyber warfare πŸ“’

Read the full transcript for this episode of ITPro Podcast

πŸ“– Read

via "ITPro".
πŸ“’ ITPro Podcast: The changing face of cyber warfare πŸ“’

Russian-sponsored cyber attacks may not have had the feared impact, but for Europe they’re here to stay

πŸ“– Read

via "ITPro".
πŸ“’ Latitude hack leaves customers unable to protect their accounts πŸ“’

The cyber attack has affected around 330,000 customers, although the company has said this is likely to increase

πŸ“– Read

via "ITPro".
πŸ“’ Hacker who ran BreachForums could face 20 years in prison πŸ“’

The hacker behind BreachForums is thought to have been involved in a string of cyber attacks

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Free decryptor released for Conti ransomware variant infecting hundreds of organisations πŸ“’

Hundreds of organisations and state institutions are believed to have been impacted by the strain

πŸ“– Read

via "ITPro".
πŸ•΄ Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority πŸ•΄

Third-party breaches have a wide effect that legacy security practices can no longer detect.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-1153 β€Ό

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pacsrapor allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Pacsrapor: before 1.22.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27979 β€Ό

A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists in the Data Server that could allow the renaming of files in the IGSS project report directory, this could lead to denial of service when an attacker sends specific crafted messages to the Data Server TCP port. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1314 β€Ό

A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory. An attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process. Exploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised. The cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27977 β€Ό

A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists in the Data Server that could cause access to delete files in the IGSS project report directory, this could lead to loss of data when an attacker sends specific crafted messages to the Data Server TCP port. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42332 β€Ό

x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tables as well as auxiliary data structures. To migrate or snapshot guests, Xen additionally runs them in so called log-dirty mode. The data structures needed by the log-dirty tracking are part of aformentioned auxiliary data. In order to keep error handling efforts within reasonable bounds, for operations which may require memory allocations shadow mode logic ensures up front that enough memory is available for the worst case requirements. Unfortunately, while page table memory is properly accounted for on the code path requiring the potential establishing of new shadows, demands by the log-dirty infrastructure were not taken into consideration. As a result, just established shadow page tables could be freed again immediately, while other code is still accessing them on the assumption that they would remain allocated.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42331 β€Ό

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42334 β€Ό

x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1154 β€Ό

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pacsrapor allows Reflected XSS.This issue affects Pacsrapor: before 1.22.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42333 β€Ό

x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).

πŸ“– Read

via "National Vulnerability Database".