πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-48426 β€Ό

In JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possible

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1399 β€Ό

N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected deviceÒ€ℒs default configuration and achieve remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0497 β€Ό

The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0823 β€Ό

The Cookie Notice & Compliance for GDPR / CCPA WordPress plugin before 2.4.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0502 β€Ό

The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25828 β€Ό

Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its Ò€œalbumsҀ� module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1654 β€Ό

Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48429 β€Ό

In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possible

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1069 β€Ό

The Complianz WordPress plugin before 6.4.2, Complianz Premium WordPress plugin before 6.4.2 do not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0335 β€Ό

The WP Shamsi WordPress plugin through 4.3.3 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber delete attachment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27847 β€Ό

SQL injection vulnerability found in PrestaShop xipblog v.2.0.1 and before allow a remote attacker to gain privileges via the xipcategoryclass and xippostsclass components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27241 β€Ό

SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0499 β€Ό

The QuickSwish WordPress plugin before 1.1.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28627 β€Ό

pymedusa is an automatic video library manager for TV Shows. In versions prior 1.0.12 an attacker with access to the web interface can update the git executable path in /config/general/ > advanced settings with arbitrary OS commands. An attacker may exploit this vulnerability to take execute arbitrary OS commands as the user running the pymedusa program. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28655 β€Ό

A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28640 β€Ό

Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25878 β€Ό

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27927 β€Ό

An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28652 β€Ό

An authenticated malicious user could successfully upload a malicious image could lead to a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25908 β€Ό

Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28597 β€Ό

Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from ZoomÒ€ℒs web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.

πŸ“– Read

via "National Vulnerability Database".