๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2023-2153 โ€ผ

A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php of the component POST Parameter Handler. The manipulation of the argument value with the input 1><script>alert(666)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226274 is the identifier assigned to this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-2155 โ€ผ

A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file classes/Master.php?f=save_cargo_type. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226276.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-28863 โ€ผ

AMI MegaRAC SPx12 and SPx13 devices have Insufficient Verification of Data Authenticity.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-29774 โ€ผ

Dreamer CMS 3.0.1 is vulnerable to stored Cross Site Scripting (XSS).

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-44632 โ€ผ

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Denis Buka Content Repeater รขโ‚ฌโ€œ Custom Posts Simplified plugin <=ร‚ 1.1.13 versions.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-2152 โ€ผ

A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-2154 โ€ผ

A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/?page=reminders/view_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226275.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-45836 โ€ผ

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in W3 Eden, Inc. Download Manager plugin <=ร‚ 3.2.59 versions.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ“ข A comprehensive guide for your Customer Identity Maturity journey ๐Ÿ“ข

A flexible approach to help any company advance its identity posture

๐Ÿ“– Read

via "ITPro".
โš  Ex-CEO of breached pyschotherapy clinic gets prison sentence for bad data security โš 

Did the sentence fit the crime? Read the backstory, and then have your say in our comments! (You may post anonymously.)

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Why Your Anti-Fraud, Identity & Cybersecurity Efforts Should Be Merged ๐Ÿ•ด

To address the rising risk of online fraud, stolen identities, and cyberattacks, innovative organizations have begun converging their security functions โ€” here's how yours can prepare.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ“ข Business customer identity for SaaS apps - simplified ๐Ÿ“ข

Accelerate business growth with a scalable enterprise identity solution purpose-build for SaaS apps

๐Ÿ“– Read

via "ITPro".
๐Ÿ•ด APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks ๐Ÿ•ด

China-linked APT41 group targeted a Taiwanese media organization and an Italian job agency with standard, open source penetration test tools, in a change in strategy.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2023-2160 โ€ผ

Weak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-1548 โ€ผ

A CWE-269: Improper Privilege Management vulnerability exists that could cause a local user to perform a denial of service through the console server service that is part of EcoStruxure Control Expert. Affected Products:ร‚ EcoStruxure Control Expert (V15.1 and above)

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-27976 โ€ผ

A CWE-668: Exposure of Resource to Wrong Sphere vulnerability exists that could cause remote code execution when a valid user visits a malicious link provided through the web endpoints. Affected Products:ร‚ EcoStruxure Control Expert (V15.1 and above)

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-28141 โ€ผ

An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-28142 โ€ผ

A Race Condition exists in the Qualys Cloud Agent for Windows platform in versions from 3.1.3.34 and before 4.5.3.1. This allows attackers to escalate privileges limited on the local machine during uninstallation of the Qualys Cloud Agent for Windows. Attackers may gain SYSTEM level privileges on that asset to run arbitrary commands. At the time of this disclosure, versions before 4.0 are classified as End of Life.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-28140 โ€ผ

An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-28143 โ€ผ

Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Where There's No Code, There's No SDLC ๐Ÿ•ด

How can we build security back into software development in a low-code/no-code environment?

๐Ÿ“– Read

via "Dark Reading".