🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2023-26394 ‼

Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26386 ‼

Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26383 ‼

Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26384 ‼

Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26390 ‼

Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26389 ‼

Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-2014 ‼

Cross-site Scripting (XSS) - Generic in GitHub repository microweber/microweber prior to 1.3.3.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-25954 ‼

KYOCERA Mobile Print' v3.2.0.230119 and earlier, 'UTAX/TA MobilePrint' v3.2.0.230119 and earlier, and 'Olivetti Mobile Print' v3.2.0.230119 and earlier are vulnerable to improper intent handling. When a malicious app is installed on the victim user's Android device, the app may send an intent and direct the affected app to download malicious files or apps to the device without notification.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-45064 ‼

The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power. Please update to Apache Sling Engine >= 2.14.0 and enable the "Check Content-Type overrides" configuration option.

📖 Read

via "National Vulnerability Database".
🕴 Google Tackles Open Source Security With New Dependency Service 🕴

With deps.dev API and Assured OSS, Google is addressing the common challenges software developers face in securing the software supply chain.

📖 Read

via "Dark Reading".
🕴 How to Define Tier-Zero Assets in Active Directory Security 🕴

There are plenty of AD objects and groups that should be considered tier zero in every environment, but some will vary among organizations.

📖 Read

via "Dark Reading".
‼ CVE-2022-45358 ‼

Auth. (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Silkalns Activello theme <= 1.4.4 versions.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-2021 ‼

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.3.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-44625 ‼

Auth. (admin+) Stored Cross-Site Scripting') vulnerability in Zephilou Cyklodev WP Notify plugin <= 1.2.1 versions.

📖 Read

via "National Vulnerability Database".
📢 The 'cyber aSaaSin' manual 📢

Providing valuable insights to identify SaaS data enemies and win the battle against SaaS data threats

📖 Read

via "ITPro".
🔥1
📢 The complete SaaS backup buyer's guide 📢

Informing you about the realities of SaaS data protection and why an SaaS back up is essential

📖 Read

via "ITPro".
🕴 Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users 🕴

A novel credential harvester compromises SMTP services to steal data from a range of hosted services and providers, and can also launch SMS-based spam attacks against devices using US mobile carriers.

📖 Read

via "Dark Reading".
🕴 Majority of US IT Pros Told to Keep Quiet About Data Breaches 🕴

To report or not report? While more than half of all companies have suffered a data breach, 71% of IT professionals say they have been told to not report an incident, which could mean legal jeopardy.

📖 Read

via "Dark Reading".
🛠 Wireshark Analyzer 4.0.5 🛠

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

📖 Read

via "Packet Storm Security".
🛠 Faraday 4.3.5 🛠

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

📖 Read

via "Packet Storm Security".
📢 Best practices for Microsoft 365 business continuity 📢

Discover how to mitigate the effects of large-scale, high-cost data loss disasters

📖 Read

via "ITPro".