πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ An EDR buyer's guide πŸ“’

How to pick the best endpoint detection and response solution for your business

πŸ“– Read

via "ITPro".
πŸ“’ Western Digital suffers cyber attack, shuts down systems πŸ“’

Customers are taking to Twitter to report they’re unable to log into their storage products through Western Digital’s online portal

πŸ“– Read

via "ITPro".
πŸ“’ 2022 Magic quadrant for Security Information and Event Management (SIEM) πŸ“’

SIEM is evolving into a security platform with multiple features and deployment models

πŸ“– Read

via "ITPro".
πŸ“’ Nearly half of security practitioners told to β€˜keep data breaches under wraps’ πŸ“’

Security professionals are increasingly worried about legal action due to a mismanaged data breach response

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-27730 β€Ό

Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27727 β€Ό

Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27728 β€Ό

Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27719 β€Ό

D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_478360 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27720 β€Ό

D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_48d630 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27718 β€Ό

D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_498308 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27729 β€Ό

Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29215 β€Ό

In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EengineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27602 β€Ό

In Apache Linkis <=1.3.1, The PublicService module uploadsΓ‚ files without restrictions on the path to the uploadedΓ‚ files, and file types. We recommend users upgrade the version of Linkis to version 1.3.2.Γ‚  For versions <=1.3.1, we suggest turning on the file path check switch in linkis.properties `wds.linkis.workspace.filesystem.owner.check=true` `wds.linkis.workspace.filesystem.path.check=true`

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27603 β€Ό

In Apache Linkis <=1.3.1, due to the Manager module engineConn material upload does not check the zip path,Γ‚ This is a Zip Slip issue, which will lead to aΓ‚ potential RCE vulnerability. We recommend users upgrade the version of Linkis to version 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27987 β€Ό

In Apache Linkis <=1.3.1,Γ‚ due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack.Γ‚ Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26120 β€Ό

This affects all versions of the package com.xuxueli:xxl-job. HTML uploaded payload executed successfully through /xxl-job-admin/user/add and /xxl-job-admin/user/update.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29216 β€Ό

In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45985 β€Ό

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Rethinking Cybersecurity's Structure & the Role of the Modern CISO πŸ•΄

A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-26860 β€Ό

SQL injection vulnerability found in PrestaShop Igbudget v.1.0.3 and before allow a remote attacker to gain privileges via the LgBudgetBudgetModuleFrontController::displayAjaxGenerateBudget component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26774 β€Ό

An issue found in Sales Tracker Management System v.1.0 allows a remote attacker to access sensitive information via sales.php component of the admin/reports endpoint.

πŸ“– Read

via "National Vulnerability Database".