πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-14140 β€Ό

When Xiaomi router firmware is updated in 2020, there is an unauthenticated API that can reveal WIFI password vulnerability. This vulnerability is caused by the lack of access control policies on some API interfaces. Attackers can exploit this vulnerability to enter the background and execute background command injection.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Spira Takes Aim at Identity Security Posture Management πŸ•΄

ISPM is a combination of identity attack surface management, and risk reduction, as well as identity threat prevention, detection, and response.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-1013 β€Ό

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Virames Vira-Investing allows Cross-Site Scripting (XSS).This issue affects Vira-Investing: before 1.0.84.86.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1014 β€Ό

Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26117 β€Ό

All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26118 β€Ό

All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26116 β€Ό

All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23670 β€Ό

Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Team Heateor Fancy Comments WordPress plugin <= 1.2.10 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23675 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Catchsquare WP Smart Preloader plugin <= 1.15 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23677 β€Ό

Reflected Cross-Site Scripting (XSS) vulnerability in GTmetrix GTmetrix for WordPress plugin <= 0.4.5 versions.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-1712 β€Ό

Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28935 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache UIMA DUCC. When using the "Distributed UIMA Cluster Computing" (DUCC) module of Apache UIMA, an authenticated user that has the permissions to modify core entities can cause command execution as the system user that runs the web process. As the "Distributed UIMA Cluster Computing" module for UIMA is retired, we do not plan to release a fix for this issue. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1699 β€Ό

Rapid7 Nexpose versions 6.6.186 and below suffer from a forced browsing vulnerability. This vulnerability allows an attacker to manipulate URLs to forcefully browse to and access administrative pages. This vulnerability is fixed in version 6.6.187.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-28733 β€Ό

AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28731 β€Ό

AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28732 β€Ό

Missing access control in AnyMailing Joomla Plugin allows to list and access files containing sensitive information from the plugin itself and access to system files via path traversal, when being granted access to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin in versions below 8.3.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23681 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Labib Ahmed Image Hover Effects For WPBakery Page Builder plugin <= 4.0 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25040 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Vova Anokhin WordPress Shortcodes Plugin Ò€” Shortcodes Ultimate plugin <= 5.12.6 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24399 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.2 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Stop Blaming the End User for Security Risk πŸ•΄

Don't count on securing end users for system security. Instead, focus on better securing the systems β€” make them closed by default and build with a security-first approach.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep128: So you want to be a cybercriminal? [Audio + Text] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".