πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-27730 β€Ό

Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27727 β€Ό

Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27728 β€Ό

Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27719 β€Ό

D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_478360 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27720 β€Ό

D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_48d630 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27718 β€Ό

D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_498308 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27729 β€Ό

Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29215 β€Ό

In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EengineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27602 β€Ό

In Apache Linkis <=1.3.1, The PublicService module uploadsΓ‚ files without restrictions on the path to the uploadedΓ‚ files, and file types. We recommend users upgrade the version of Linkis to version 1.3.2.Γ‚  For versions <=1.3.1, we suggest turning on the file path check switch in linkis.properties `wds.linkis.workspace.filesystem.owner.check=true` `wds.linkis.workspace.filesystem.path.check=true`

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27603 β€Ό

In Apache Linkis <=1.3.1, due to the Manager module engineConn material upload does not check the zip path,Γ‚ This is a Zip Slip issue, which will lead to aΓ‚ potential RCE vulnerability. We recommend users upgrade the version of Linkis to version 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27987 β€Ό

In Apache Linkis <=1.3.1,Γ‚ due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack.Γ‚ Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26120 β€Ό

This affects all versions of the package com.xuxueli:xxl-job. HTML uploaded payload executed successfully through /xxl-job-admin/user/add and /xxl-job-admin/user/update.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29216 β€Ό

In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45985 β€Ό

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Rethinking Cybersecurity's Structure & the Role of the Modern CISO πŸ•΄

A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-26860 β€Ό

SQL injection vulnerability found in PrestaShop Igbudget v.1.0.3 and before allow a remote attacker to gain privileges via the LgBudgetBudgetModuleFrontController::displayAjaxGenerateBudget component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26774 β€Ό

An issue found in Sales Tracker Management System v.1.0 allows a remote attacker to access sensitive information via sales.php component of the admin/reports endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36077 β€Ό

SQL injection vulnerability found in Tailor Mangement System v.1 allows a remote attacker to execute arbitrary code via the customer parameter of the orderadd.php file

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26788 β€Ό

Veritas Appliance v4.1.0.1 is affected by Host Header Injection attacks. HTTP host header can be manipulated and cause the application to behave in unexpected ways. Any changes made to the header would just cause the request to be sent to a completely different Domain/IP address.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-10099 β€Ό

A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1426 β€Ό

The WP Tiles WordPress plugin through 1.1.2 does not ensure that posts to be displayed are not draft/private, allowing any authenticated users, such as subscriber to retrieve the titles of draft and privates posts for example. AN attacker could also retrieve the title of any other type of post.

πŸ“– Read

via "National Vulnerability Database".