πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Cyberpion Rebrands As IONIX πŸ•΄

IONIX illuminates exploitable risks across the real attack surface and its digital supply chain providing security teams with critical focus to accelerate risk reduction.

πŸ“– Read

via "Dark Reading".
πŸ•΄ .NET Devs Targeted With Malicious NuGet Packages πŸ•΄

In a possible first for the NuGet repository, more than a dozen components in the .NET code repository run a malicious script upon installation, with no warning or alert.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-1261 β€Ό

Missing MAC layer security in Silicon Labs Wi-SUN SDK v1.5.0 and earlier allows malicious node to route malicious messages through network.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1531 β€Ό

Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0391 β€Ό

MGT-COMMERCE CloudPanel ships with a static SSL certificate to encrypt communications to the administrative interface, shared across every installation of CloudPanel. This behavior was observed in version 2.2.0. There has been no indication from the vendor this has been addressed in version 2.2.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1533 β€Ό

Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1528 β€Ό

Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1530 β€Ό

Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1529 β€Ό

Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1262 β€Ό

Missing MAC layer security in Silicon Labs Wi-SUN Linux Border Router v1.5.2 and earlier allows malicious node to route malicious messages through network.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1532 β€Ό

Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1534 β€Ό

Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ What is 'steal now, crack later'? πŸ“’

The rise in quantum computing this decade is pushing cyber criminals into stealing encrypted business data with the hopes of cracking it in the future

πŸ“– Read

via "ITPro".
πŸ“’ NCSC launches free in-browser security threat checks for SMBs πŸ“’

The new cyber toolkits will help SMBs assess their cyber readiness in a matter of minutes

πŸ“– Read

via "ITPro".
πŸ€”1
πŸ“’ Greek intelligence allegedly uses Predator spyware on Facebook staffer πŸ“’

The employee’s device was infected through a link pretending to confirm a vaccination appointment

πŸ“– Read

via "ITPro".
❀1
β€Ό CVE-2023-27855 β€Ό

In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27857 β€Ό

In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28725 β€Ό

General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45634 β€Ό

An issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS & Android v1.4.4 allows authenticated attacker to gain access to sensitive account information

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27856 β€Ό

In affected versions, path traversal exists when processing a message of type 8 in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37940 β€Ό

Potential security vulnerabilities have been identified in the HPE FlexFabric 5700 Switch Series. These vulnerabilities could be remotely exploited to allow host header injection and URL redirection. HPE has made the following software to resolve the vulnerability in HPE FlexFabric 5700 Switch Series version R2432P61 or later.

πŸ“– Read

via "National Vulnerability Database".