πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-25260 β€Ό

Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26923 β€Ό

Musescore 3.0 to 4.0.1 has a stack buffer overflow vulnerability that occurs when reading misconfigured midi files. If attacker can additional information, attacker can execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
⚠ Cops use fake DDoS services to take aim at wannabe cybercriminals ⚠

Thinking of trying a bit of DDoSsing to get a feel for life at the fringes of the Dark Side? Don't do it!

πŸ“– Read

via "Naked Security".
⚠ Apple patches everything, including a zero-day fix for iOS 15 users ⚠

Got an older iPhone that can't run iOS 16? You've got a zero-day to deal with! That super-cool Studio Display monitor needs patching, too.

πŸ“– Read

via "Naked Security".
πŸ•΄ North Korea's Kimsuky Evolves into Full-Fledged, Prolific APT πŸ•΄

In cyberattacks against the US, South Korea, and Japan, the group (aka APT43 or Thallium) is using advanced social engineering and cryptomining tactics that set it apart from other threat actors.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ UK Sets Up Fake Booter Sites To Muddy DDoS Market β™ŸοΈ

The United Kingdom's National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. 

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2023-0775 β€Ό

An invalid Γ’β‚¬Λœprepare write requestÒ€ℒ command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27821 β€Ό

Databasir v1.0.7 was discovered to contain a remote code execution (RCE) vulnerability via the mockDataScript parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Millions of Pen Tests Show Companies' Security Postures Are Getting Worse πŸ•΄

A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-27247 β€Ό

An issue in Cynet Client Agent v4.6.0.8010 allows attackers with Administrator rights to disable the EDR functions via disabling process privilege tokens.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27246 β€Ό

An arbitrary file upload vulnerability in the Virtual Disk of MK-Auth 23.01K4.9 allows attackers to execute arbitrary code via uploading a crafted .htaccess file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23124 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15870.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0194 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23125 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24908 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. Crafted data in a JP2 image can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16187.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23122 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23123 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15830.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24673 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the SLP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15845.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24672 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CADM service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15802.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1229 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.2.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16581.

πŸ“– Read

via "National Vulnerability Database".