πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Drive to Pervasive Encryption Boosts Key Management πŸ•΄

Key vaults, aka key management as a service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 7 Women Leading the Charge in Cybersecurity Research & Analysis πŸ•΄

From rising stars to veterans heading up research teams, check out our profiles of women making a big impact in cyber defense as the threat landscape expands.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-0589 β€Ό

The WP Image Carousel WordPress plugin through 1.0.2 does not sanitise and escape some parameters, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0498 β€Ό

The WP Education WordPress plugin before 1.2.7 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0660 β€Ό

The Smart Slider 3 WordPress plugin before 3.5.1.14 does not properly validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0441 β€Ό

The Gallery Blocks with Lightbox WordPress plugin before 3.0.8 has an AJAX endpoint that can be accessed by any authenticated users, such as subscriber. The callback function allows numerous actions, the most serious one being reading and updating the WordPress options which could be used to enable registration with a default administrator user role.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0336 β€Ό

The OoohBoi Steroids for Elementor WordPress plugin through 2.1.3 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber to delete attachment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0495 β€Ό

The HT Slider For Elementor WordPress plugin before 1.4.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0955 β€Ό

The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27245 β€Ό

A cross-site scripting (XSS) vulnerability in File Management Project 1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Edit User module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1093 β€Ό

The OAuth Single Sign On WordPress plugin before 6.24.2 does not have CSRF checks when discarding Identify providers (IdP), which could allow attackers to make logged in admins delete all IdP via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0816 β€Ό

The Formidable Forms WordPress plugin before 6.1 uses several potentially untrusted headers to determine the IP address of the client, leading to IP Address spoofing and bypass of anti-spam protections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1400 β€Ό

The Modern Events Calendar Lite WordPress plugin through 5.16.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48426 β€Ό

In JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possible

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1399 β€Ό

N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected deviceÒ€ℒs default configuration and achieve remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0497 β€Ό

The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0823 β€Ό

The Cookie Notice & Compliance for GDPR / CCPA WordPress plugin before 2.4.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0502 β€Ό

The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25828 β€Ό

Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its Ò€œalbumsҀ� module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1654 β€Ό

Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48429 β€Ό

In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possible

πŸ“– Read

via "National Vulnerability Database".